Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Project Management Life Cycle: A Complete Step-By-Step Methodology for Initiating, Planning, Executing & Closing a Project Successfully
The Project Management Life Cycle: A Complete Step-By-Step Methodology for Initiating, Planning, Executing & Closing a Project Successfully
Over the past 20 years, businesses around the world have undergone rapid change. No longer are customers happy with their ‘status quo’ products or services: they expect businesses to adapt rapidly to the changing environment by providing more offerings, cheaper and faster than before. This rate of change has forced businesses to...
Subversion Version Control: Using the Subversion Version Control System in Development Projects (Bruce Perens Open Source)
Subversion Version Control: Using the Subversion Version Control System in Development Projects (Bruce Perens Open Source)

In any software development project, many developers contribute changes over a period of time. Using a version control system to track and manage these changes is vital to the continued success of the project. This book introduces you to Subversion, a free, open-source version control system, which is both more powerful and much less complex...

Knowledge Management and Management Learning:: Extending the Horizons of Knowledge-Based Management
Knowledge Management and Management Learning:: Extending the Horizons of Knowledge-Based Management
Over the last few years, both knowledge management and management
learning (including e-learning) have received sufficient coverage in
publications. I am glad to refer, amongst others, to my own publications
with Gert Van der Linden: The Hybrid Business School: developing
knowledge management through management learning
...
Fundamentals of X Programming: Graphical User Interfaces and Beyond
Fundamentals of X Programming: Graphical User Interfaces and Beyond
This book provides an overview of the X Window System focusing on characteristics that have significant impact on the development of both application programs and widgets. We pay special attention to applications that go beyond graphical user interfaces (GUIs); therefore we discuss issues affecting video games, visualization and imaging programs,...
IBM Certification Study Guide Aix Communications
IBM Certification Study Guide Aix Communications
The AIX and RS/6000 certifications offered through the Professional Certification Program from IBM are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of AIX and RS/6000. A complete set of professional certifications are available. They include:
Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, INAP
Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, INAP
Knowledge means power – but only if it is available at the right time, the right place, and in the hands of the right people. Structured, engineered, repeatable methods to gather, transport, and apply knowledge are collectively called knowledge management.

Declarative programming strives for the ideal of programming by wish: the
...
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Optimize Your Entire Requirements Process–and Use Requirements to Build More Successful Software

 

Using IBM® Rational® RequisitePro®, you can systematically improve the way you create and maintain requirements–and use those requirements to build...

Crimeware: Understanding New Attacks and Defenses (Symantec Press)
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
This book represents a milestone in the synthesis of temporal and spatial database concepts and techniques. It unifies and organizes the existing research into a coherent whole and presents substantial new results and approaches in many areas. In each case it begins with what is known, then it introduces the new concepts in an abstract and...
The Principles of Semiconductor Laser Diodes and Amplifiers: Analysis and Transmission Line Laser Modeling
The Principles of Semiconductor Laser Diodes and Amplifiers: Analysis and Transmission Line Laser Modeling

Optical communications technology is growing increasingly in importance, with a rapid pace of development. Innovative optical devices have emerged from the integration of semiconductor laser diodes, amplifiers and filters with optical waveguide technology. This well-researched volume traces the evolution of semiconductor laser amplifiers...

Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise
Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise

A must-have for all companies undertakingservice-oriented architecture (SOA) governance

As SOA interest and adoption have accelerated rapidly, the challenges of governance have risen to the forefront across the entire industry. Without an SOA governance model, SOA adoption is stilted and hampered by a lack of...

unlimited object storage image
Result Page: 835 834 833 832 831 830 829 828 827 826 825 824 823 822 821 820 819 818 817 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy