Home | Amazing | Today | Tags | Publishers | Years | Search 
Corporate Information Strategy and Management
Corporate Information Strategy and Management

"Corporate Information Strategy and Management: Text and Cases 8/e" by Applegate, Austin, and Soule is written for students and managers who desire an overview of contemporary information systems technology management. This new edition examines how information technology (IT) enables organizations to conduct business in radically...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Product-Focused Software Process Improvement: 12th International Conference, PROFES 2011
Product-Focused Software Process Improvement: 12th International Conference, PROFES 2011

On behalf of the PROFES Organizing Committee we are proud to present the proceedings of the 12th International Conference on Product-Focused Software Process Improvement (PROFES 2011), held in Torre Canne, Italy. Since 1999 PROFES has grown in the software engineering community and has become a premium conference that brings together...

Scientific Modeling and Simulations (Lecture Notes in Computational Science and Engineering)
Scientific Modeling and Simulations (Lecture Notes in Computational Science and Engineering)

The conceptualization of a problem (modeling) and the computational solution of this problem (simulation), is the foundation of Computational Science. This coupled endeavor is unique in several respects. It allows practically any complex system to be analyzed with predictive capability by invoking the multiscale paradigm linking...

Object-Oriented Design Using Java
Object-Oriented Design Using Java

This text is an introduction to object-oriented (OO) design for second-year or higher undergraduate computer science students. It discusses software design and implementation in terms of “elegance,” which is defined in Chapter 1. It reviews the concepts of object-oriented programming and then covers fundamental software...

Principles of CAD/CAM/CAE
Principles of CAD/CAM/CAE

With the dramatic changes in computing power and wider availability of software tools for design and production, engineers are now using CAD/CAM/CAE systems for everyday tasks, not just for demonstrations. International competition, de- creased availability of skilled labor, and increased emphasis on quality are also forcing...

Canon Speedlite System Digital Field Guide
Canon Speedlite System Digital Field Guide

Welcome to the new Wiley Digital Field Guide for the Canon Speedlite System. Whether you are holding this book or your new Canon Speedlite in your hands, you are holding a fantastic tool that will assist you in creating awesome photographs that you will be proud to display and share with your family and friends. Much has changed in...

Neural Networks and Their Applications
Neural Networks and Their Applications

Neural Networks started as an academic discipline over 50 years ago with the publication by McCulloch and Pitts of their famous result that any logical problem can be solved by a suitable network composed of so-called binary decision nodes. These are processors which make the simplest possible decision, that is, whether or not to respond to a...

Fundamentals of Digital Logic with VHDL Design
Fundamentals of Digital Logic with VHDL Design

This book is intended for an introductory course in digital logic design, which is a basic course in most electrical and computer engineering programs. A successful designer of digital logic circuits needs a good understanding of basic concepts and a firm grasp of computer-aided design (CAD) tools. The purpose of our book is to provide...

Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)
Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)

The present work grew out of lecture notes I prepared for a Vh hour tutorial that I was invited to give at the 29th IEEE Computer Conference (CompCon) in San Francisco on February 27, 1987. I have just completed a substantial update of the material, including the addition of several topics. My main purpose is to provide a...

Crystallization Process Systems
Crystallization Process Systems

Crystallization from solution is a core technology in major sectors of the chemical process and allied industries. Crystals are produced in varying sizes ranging from as small as a few tens of nanometers to several millimetres or more, both as discrete particles and as structured agglomerates. Well- established examples include bulk...

Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing
Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing

What do people learn when they do not know that they are learning? Until recently all of the work in the area of implicit learning focused on empirical questions and methods. In this book, Axel Cleeremans explores unintentional learning from an information-processing perspective. He introduces a theoretical framework that unifies existing...

Result Page: 581 580 579 578 577 576 575 574 573 572 571 570 569 568 567 566 565 564 563 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy