 |
|
 Six Sigma Software Development, Second EditionEven though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development. Removing the mystique surrounding this technique, Six Sigma Software Development, Second Edition demonstrates how Six Sigma tools and concepts... |  |  Practical Problems in VLSI Physical Design AutomationPractical Problems in VLSI Physical Design Automation contains problems and solutions related to various well-known algorithms used in VLSI physical design automation. Dr. Lim believes that the best way to learn new algorithms is to walk through a small example by hand. This knowledge will greatly help understand, analyze, and improve... |  |  Encyclopedia of Data Warehousing and Mining, Second EditionThe Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400... |
|
 Pro Tools for Music Production, Second Edition: Recording, Editing and MixingIf you are a music producer, recording engineer, musician, or composer there is definitely something in this book for you. If you are about to purchase new equipment, wish to troubleshoot technical problems, need guidance on how to achieve professional sounding results, or are looking for inspiration for new ideas - keep this book by your side.... |  |  Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |  |  |
|
 Information Security Management Handbook, Fourth Edition, Volume IIIA wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent. - Technical Support, Dec. 2004
This is a must-have book for those preparing for the CISSP exam and for any information security professional. - Zentralblatt MATH 1054, May 2005... |  |  Computational Systems Bioinformatics: Csb2007 Conference Proceedings, University of California, San Diego, USA, 13-17 August 2007This volume contains about 40 papers covering many of the latest developments in the fast-growing field of bioinformatics. The contributions span a wide range of topics, including computational genomics and genetics, protein function and computational proteomics, the transcriptome, structural bioinformatics, microarray data analysis, motif... |  |  The Video Game Theory Reader 2"The Video Game Theory Reader 2" picks up where the first "Video Game Theory Reader" (Routledge, 2003) left off, with a group of leading scholars turning their attention to next-generation platforms - the Nintendo Wii, the PlayStation 3, the Xbox 360 - and to new issues in the rapidly expanding field of video games studies. The... |
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |