Home | Amazing | Today | Tags | Publishers | Years | Search 
Six Sigma Software Development, Second Edition
Six Sigma Software Development, Second Edition
Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development. Removing the mystique surrounding this technique, Six Sigma Software Development, Second Edition demonstrates how Six Sigma tools and concepts...
Practical Problems in VLSI Physical Design Automation
Practical Problems in VLSI Physical Design Automation
Practical Problems in VLSI Physical Design Automation contains problems and solutions related to various well-known algorithms used in VLSI physical design automation. Dr. Lim believes that the best way to learn new algorithms is to walk through a small example by hand. This knowledge will greatly help understand, analyze, and improve...
Encyclopedia of Data Warehousing and Mining, Second Edition
Encyclopedia of Data Warehousing and Mining, Second Edition
The Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400...
Pro Tools for Music Production, Second Edition: Recording, Editing and Mixing
Pro Tools for Music Production, Second Edition: Recording, Editing and Mixing
If you are a music producer, recording engineer, musician, or composer there is definitely something in this book for you. If you are about to purchase new equipment, wish to troubleshoot technical problems, need guidance on how to achieve professional sounding results, or are looking for inspiration for new ideas - keep this book by your side....
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Single-Sensor Imaging: Methods and Applications for Digital Cameras (Image Processing Series)
Single-Sensor Imaging: Methods and Applications for Digital Cameras (Image Processing Series)
Single-sensor camera image processing methods are becoming increasingly important due to the emergence of digital camera based applications and commercial devices. Presenting the state of the art, Single-Sensor Imaging provides comprehensive coverage of system design, implementation, and application aspects of single-sensor imaging...
Information Security Management Handbook, Fourth Edition, Volume III
Information Security Management Handbook, Fourth Edition, Volume III
A wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent.
- Technical Support, Dec. 2004

This is a must-have book for those preparing for the CISSP exam and for any information security professional.
- Zentralblatt MATH 1054, May 2005
...
Computational Systems Bioinformatics: Csb2007 Conference Proceedings, University of California, San Diego, USA, 13-17 August 2007
Computational Systems Bioinformatics: Csb2007 Conference Proceedings, University of California, San Diego, USA, 13-17 August 2007
This volume contains about 40 papers covering many of the latest developments in the fast-growing field of bioinformatics. The contributions span a wide range of topics, including computational genomics and genetics, protein function and computational proteomics, the transcriptome, structural bioinformatics, microarray data analysis, motif...
The Video Game Theory Reader 2
The Video Game Theory Reader 2
"The Video Game Theory Reader 2" picks up where the first "Video Game Theory Reader" (Routledge, 2003) left off, with a group of leading scholars turning their attention to next-generation platforms - the Nintendo Wii, the PlayStation 3, the Xbox 360 - and to new issues in the rapidly expanding field of video games studies. The...
Leading IT Projects: The IT Manager's Guide
Leading IT Projects: The IT Manager's Guide
Senior level IT managers are responsible for a wide variety of development projects. For the most part, these individual projects are handled by project managers. However, IT managers must be conversant in the field of project management. Additionally, they must understand the dynamics of managing the project manager and be familiar with the skill...
Knowledge Retention: Strategies and Solutions
Knowledge Retention: Strategies and Solutions
‘‘Knowledge Retention: Strategies and Solutions will become paramount toward achieving success in an increasingly competitive environment.’’

—Jay Liebowitz

As the baby boomer generation approaches retirement age, many organizations are facing the potential
...
Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy