Home | Amazing | Today | Tags | Publishers | Years | Search 
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP and Data Warehousing in Organizations: Issues and Challenges
Offering ERP deployment strategies for information as diverse as patient records, police and community relations, and geospatial services, this text addresses the complex issues that IT and communication technologies pose for organizations of all sizes.

The successful implementation and deployment of enterprise resource planning depends...

Practicing Software Engineering in the 21st Century
Practicing Software Engineering in the 21st Century
This technological manual explores how software engineering principles can be used in tandem with software development tools to produce economical and reliable software that is faster and more accurate. Tools and techniques provided include the Unified Process for GIS application development, service-based approaches to business and information...
Computing Information Technology: The Human Side
Computing Information Technology: The Human Side
From the senior management to the clerical and support group levels, this study addresses the possible pitfalls and triumphs of implementing information technology (IT) into organizations in terms of organizational strategies, structures, and communication methods. Issues of human-computer interaction, ethics, privacy, and security are raised to...
Current Issues in IT Education
Current Issues in IT Education
Addressing the ongoing quest for teaching excellence in an increasingly technological society, the information presented in this volume addresses how to effectively implement teaching technologies across disciplinary boundaries. The scholarly dimensions of belief, inquiry, argument, and reflection in information systems are presented with attention...
Electronic Enterprise: Strategy and Architecture
Electronic Enterprise: Strategy and Architecture
The evolution from network-centric commerce (EDI) to e-commerce and e-business up to e-enterprise and virtual enterprise is traced and explained in this discussion of the transformation of a business enterprise from an industrial into an information model. Addressed are the strategy and architecture of an e-enterprise, emphasizing the integration...
Visual Perception of Music Notation: On-Line and Off-Line Recognition
Visual Perception of Music Notation: On-Line and Off-Line Recognition
One of the initial challenges in any Optical Music Recognition (OMR) system is
the treatment of the staves. For musicians, stavelines are required to facilitate
reading the notes. For the machine, however, it becomes an obstacle for making
the segmentation of the symbols very difficult. The task of separating
background from
...
3D Modeling and Animation: Synthesis and Analysis Techniques for the Human Body
3D Modeling and Animation: Synthesis and Analysis Techniques for the Human Body
The emergence of virtual reality applications and human-like interfaces has
given rise to the necessity of producing realistic models of the human body.
Building and animating a synthetic, cartoon-like, model of the human body has
been practiced for many years in the gaming industry and advances in the game
platforms have led to
...
WebLogic Server 6.1 Workbook for Enterprise JavaBeans, 3rd Edition
WebLogic Server 6.1 Workbook for Enterprise JavaBeans, 3rd Edition

The WebLogic workbook is designed to be a companion guide for the book Enterprise Java Beans, 3rd Edition (O'Reilly) by Richard Monson-Haefel. It is published with the approval of O'Reilly & Associates and is produced by Richard Monson-Haefel.

The goal of this WebLogic-specific workbook, like the other vendor-specific...

WebSphere 4.0 AEs Workbook for Enterprise JavaBeans, 3rd Edition
WebSphere 4.0 AEs Workbook for Enterprise JavaBeans, 3rd Edition

The WebSphere workbook is designed to be a companion guide for the book Enterprise Java Beans, 3rd Edition (O'Reilly) by Richard Monson-Haefel. This workbook is published with the approval of O'Reilly & Associates and is produced by Richard Monson-Haefel.

The goal of this WebSphere-specific workbook, like the other...

Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

The term WarDriving originates from WarDialing, a term introduced to the public by Matthew Broderick's character, David Lightman, in the 1983 movie "WarGames." WarDialing is the practice of using a modem attached to a computer to dial an entire exchange of telephone numbers to locate any computers with modems attached to them....

Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition

Snort, Information Security Magazine’s pick for Open Source Product of the year 2003, is one of the best examples of the IT community working together to build a capability. Please notice I did not say a tool, but rather, a capability. Snort’s extensible architecture and open source distribution has long made it an ideal choice...

Result Page: Previous 2996 2997 2998 2999 3000 3001 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy