Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Case for Virtual Business Processes : Reduce Costs, Improve Efficiencies, and Focus on Your Core Business
The Case for Virtual Business Processes : Reduce Costs, Improve Efficiencies, and Focus on Your Core Business

The dot-com collapse generally discredited the idea of leveraging the Internet to build viable businesses. Many market pundits have decried the concept without examining the underlying dynamics associated with these companies' failures. The truth is, prior business models were built on a flawed business case, not bad technology....

Powerhouse Partners : A Blueprint for Building Organizational Culture for Breakaway Results
Powerhouse Partners : A Blueprint for Building Organizational Culture for Breakaway Results
For any manager or executive committed to achieving business goals through effective strategic partnership, this book gathers successes of some of the world's leading companies to deliver a tool kit for shaping a partnering culture.

From the author who introduced the groundbreaking concept of Partnering Intelligence come the...

Pragmatic ADO.NET: Data Access for the Internet World
Pragmatic ADO.NET: Data Access for the Internet World

"This is my favorite book on ADO.NET. The author clearly has an extensive understanding of the subject matter. It is useful not only for expert data access programmers but also for weekend code warriors."
—Glenn Thimmes, Senior Software Engineer, New Dawn Technologies.Formerly Develop Support Engineer (WebData),
...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
Mechanical Trading Systems: Pairing Trader Psychology with Technical Analysis
Mechanical Trading Systems: Pairing Trader Psychology with Technical Analysis
In 1987 my father and I purchased a seat on the New York Futures Exchange
for $100 and established a trading account with $25,000. The goal, he explained,
was to make $2,500 a week. Although this seemed like an extraordinary
annualized return on investment, I had heard of legendary traders
who had taken meager sums and
...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Software Architecture Design Patterns in Java
Software Architecture Design Patterns in Java
 Partha Kuchana is an experienced enterprise systems architect. He understands that patterns are not about things that are just good ideas, but that patterns are about capturing knowledge bred from experience. This hard-won knowledge is what Partha is sharing with readers of his book. Here are some of the things I really like about what he has...
CONCUR 2004 -- Concurrency Theory
CONCUR 2004 -- Concurrency Theory

This book constitutes the refereed proceedings of the 15th International Conference on Concurrency Theory, CONCUR 2004, held in London, UK in August/September 2004.

The 29 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 134 submissions. Among the topics covered are concurrency...

Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
Wireless sensor networks will revolutionise applications such as environmental monitoring, home automation, and logistics.

Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the most important issues and questions that have to be addressed in a wireless sensor network....

Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Oracle Data Warehousing and Business Intelligence Solutions
Oracle Data Warehousing and Business Intelligence Solutions
Up-to-date, comprehensive coverage of the Oracle database and business intelligence tools

Written by a team of Oracle insiders, this authoritative book provides you with the most current coverage of the Oracle data warehousing platform as well as the full suite of business intelligence tools. You'll learn how to...

unlimited object storage image
Result Page: 816 815 814 813 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy