Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design
Here are those little gems of advice that a skilled mentor who peered over your shoulder would tell you. If you lack such a mentor, this book is the next best thing, explaining just what you need to do in a straightforward, easy-to-read, easy-to-understand manner.

--Don Norman, Nielsen Norman group, Prof., Northwestern
...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Implementing IBM(R) Rational(R) ClearQuest(R): An End-to-End Deployment Guide (The developerWorks Series)
Implementing IBM(R) Rational(R) ClearQuest(R): An End-to-End Deployment Guide (The developerWorks Series)

IBMВ® RationalВ® ClearQuestВ® gives organizations unprecedented control over software development, helping them fix defects, make enhancements, manage issues, update documentation, and deliver better products, faster. Now there's an easy-to-use ClearQuest deployment guide for every team member--in development, product...

Multithreaded Programming with Java Technology
Multithreaded Programming with Java Technology
Multithreading gives developers using the Java 2 platform a powerful tool for dramatically improving the responsiveness and performance of their programs on any platform, even those without inherent multithreading support. Multithreaded Programming with Java Technology is the first complete guide to multithreaded development with the Java 2...
SOA and Web Services Interface Design: Principles, Techniques, and Standards (The MK/OMG Press)
SOA and Web Services Interface Design: Principles, Techniques, and Standards (The MK/OMG Press)
With the introduction of increasingly complex Web services over the last decade, there has been an explosion of interest in service-oriented architecture (SOA), a structural style whose goal is to achieve a coupling of interacting services - functionalities such as filling out an online application for an account, viewing an online bank statement,...
Architectures for E-Business Systems: Building the Foundation for Tomorrow's Success
Architectures for E-Business Systems: Building the Foundation for Tomorrow's Success
As dot.com companies grapple with rigid market conditions and we keep hearing how the big technology players are being punished on Wall Street, it becomes easy to think of the Internet as a fad. The Internet frenzy may have subsided, but interest in the Internet as a business and marketing tool is still strong. It will continue to impact...
Production Planning in Production Networks: Models for Medium and Short-term Planning
Production Planning in Production Networks: Models for Medium and Short-term Planning
Distributed production networks are structures which are considered able to provide the organisational agility and efficiency necessary to compete in the global market. The performance of such organisations heavily depends on the ability of those involved in the network to coordinate their activities. Two approaches are available for managing...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Forest Analytics with R: An Introduction (Use R!)
Forest Analytics with R: An Introduction (Use R!)
R is an open-source and free software environment for statistical computing and graphics. R compiles and runs on a wide variety of UNIX platforms (e.g., GNU/Linux and FreeBSD), Windows, and Mac OSX. Since the late 1990s, R has been developed by hundreds of contributors and new capabilities are added each month....
The Art of Investigative Interviewing, Third Edition
The Art of Investigative Interviewing, Third Edition

The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative interviewing, such as human psychology, proper interview preparation,...

Analysis of Air-Based Mechanization and Vertical Envelopment Concepts and Technologies
Analysis of Air-Based Mechanization and Vertical Envelopment Concepts and Technologies
The Army After Next (AAN) concept of rapidly deployable mechanized battleforces in a tactical environment requires the forces to be readilytransported by vertical, or near-vertical, lift aircraft. In the nonlinearAAN battlefield, this may require the forces to be deployed near the enemy1ssecond echelon. The authors examined the performance of the...
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy