Home | Amazing | Today | Tags | Publishers | Years | Search 
Integrated Auditing of ERP Systems
Integrated Auditing of ERP Systems

This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...

Effortless E-Commerce with PHP and MySQL
Effortless E-Commerce with PHP and MySQL

Electronic commerce has been an important and viable part of the Internet for well over a decade now. From the behemoths like Amazon.com to the mom-and-pop online stores, e-commerce is performed in a number of ways. Despite the dozen, or hundred, of failures for every single commercial success, e-commerce can still be an excellent business...

RFID-Enabled Sensor Design and Applications (Integrated Microsystems)
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)

Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars,...

Identity Management: Concepts, Technologies, and Systems
Identity Management: Concepts, Technologies, and Systems

Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and...

Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.

This is changing, and quickly. Most records...

Database Programming Languages: 9th International Workshop, DBPL 2003, Potsdam, Germany, September 6-8, 2003, Revised Papers
Database Programming Languages: 9th International Workshop, DBPL 2003, Potsdam, Germany, September 6-8, 2003, Revised Papers

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Database Programming Languages, DBPL 2003, held in Potsdam, Germany in September 2003.

The 14 revised full papers presented together with an invited paper were carefully selected during two round of reviewing and revision from 22...

Data Mining with R: Learning with Case Studies
Data Mining with R: Learning with Case Studies

The versatile capabilities and large set of add-on packages make R an excellent alternative to many existing and often expensive data mining tools. Exploring this area from the perspective of a practitioner, Data Mining with R: Learning with Case Studies uses practical examples to illustrate the power of R and data...

PayPal APIs: Up and Running: A Developer's Guide
PayPal APIs: Up and Running: A Developer's Guide

Virtually every application delivery model is experiencing a surging demand for transaction convenience. In this book, I introduce PayPal APIs, along with instructions and resources for their integration in different environments, including websites and mobile applications.

The goal of this book is to help you understand...

Web and Wireless Geographical Information Systems: 10th International Symposium
Web and Wireless Geographical Information Systems: 10th International Symposium

Continuing advances in the development of wireless and Internet technologies generate ever increasing interest in the diffusion, usage, and processing of georeferenced data of all types. Spatially-aware wireless and Internet devices also offer new ways of accessing and analyzing geo-spatial information in both realworld and virtual spaces....

The Investigator's Guide to Computer Crime
The Investigator's Guide to Computer Crime

In the past half-century we have gone from a world where computers were science fiction to a world where computers are everyday fact. Just thirty years ago the computer that flew with the first astronauts to the moon had less computing power than the computer on the average student’s desk today. Computers have grown in popularity,...

Developing J2EE Applications with WebSphere Studio: IBM Certified Enterprise Developer (IBM Certification Study Guides)
Developing J2EE Applications with WebSphere Studio: IBM Certified Enterprise Developer (IBM Certification Study Guides)

To succeed in today's challenging business environment, companies need software developers who can implement integrated enterprise-wide applications and satisfy the demands of customers whose needs continue to evolve. Not only can you become that enterprise developer, but you can also be certified by IBM in the greatest technology...

PostgreSQL 9 Admin Cookbook
PostgreSQL 9 Admin Cookbook

PostgreSQL is a powerful, open source object-relational database system. An enterprise database, PostgreSQL includes features such as Multi-Version Concurrency Control (MVCC), point-in-time recovery, tablespaces, asynchronous replication, nested transactions (savepoints), online/hot backups, a sophisticated query planner/optimizer, and...

Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy