|
|
|
|
Applying Design for Six Sigma to Software and Hardware Systems
The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS
Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two... | | Microsoft Visual Studio 2010 Unleashed
This end-to-end deep dive into Microsoft Visual Studio 2010 Professional will help working developers squeeze maximum productivity out of Visual Studio 2010’s extraordinarily rich toolbox, whether they are writing code for the Web, Windows, Silverlight, or Microsoft’s Azure cloud computing environment.
... | | S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management
This book constitutes the refereed proceedings of the First Workshop on Subject-Oriented Business Process Management, S-BPM ONE 2009, held in Karlsruhe, Germany, in October 2009. The papers are organized in topical sections on visionary engagements; essential capabilities; and penetration perspectives.
This volume contains a... |
|
|
Cloud Computing Bible
In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the... | | Adobe Creative Suite 6 Production Premium Classroom in a Book
The tools for creating and broadcasting a professional-quality video have never
been as accessible as they are today, thanks to more affordable and powerful
recording equipment and computers, broadband Internet, and user-friendly
software.
The Adobe® Creative Suite® 6 ... | | How to Cheat at Securing Your Network (How to Cheat)
Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and... |
|
|
|
Result Page: 864 863 862 861 860 859 858 857 856 855 854 853 852 851 850 849 848 847 846 |