Home | Amazing | Today | Tags | Publishers | Years | Search 
Critical Chain Project Management (Artech House Professional Development Library)
Critical Chain Project Management (Artech House Professional Development Library)
Plan and manage projects that yield successful results all the time in half the time you?re used to with this new guide. Providing the theory, tools and techniques you need to implement critical chain project management in your organization, you learn how to reduce stress on a project team, eliminate cost and scheduling over-runs, effectively...
Practical Guide to Software Quality Management
Practical Guide to Software Quality Management

This updated edition of the Practical Guide to Software Quality Management identifies 10 major components that make up a solid program in line with ISO 9001 quality management precepts. Thoroughly revised and with new chapters on software safety and software risk management, this comprehensive primer provides readers with the...

Wireless IP and Building the Mobile Internet
Wireless IP and Building the Mobile Internet
Wireless IP and Building the Mobile Internet is the first book to take a comprehensive
look at the convergence of wireless and Internet technologies
giving rise to the mobile wireless Internet as we know it. In short, the book
endeavors to provide an overview of all the elements required to understand
and develop the future
...
CDMA Systems Capacity Engineering
CDMA Systems Capacity Engineering
The code division multiple access (CDMA) communication system is a wellestablished
technology in the sense that it is one of technically proven methods to
transmit voice information for multiple users via wireless communications during
the last decade. Further, CDMA is an emerging technology for next generation multimedia...
Integrated It Project Management: A Model-Centric Approach
Integrated It Project Management: A Model-Centric Approach
This book is a compilation ofmyextensive project management, enterprise
architecture, and applications development knowledge, skills, and industry
experiences gained during my 28 years as an information technology (IT)
professional in Canada and the United States. It is not intended to be another
theoretical book on project
...
LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

GPRS for Mobile Internet
GPRS for Mobile Internet
This book helps you understand how the GPRS system is used as a major technology building block for the emerging mobile Internet; the book also provides you with detailed coverage of a wide range of important topics.

This ground-breaking book offers you a comprehensive, in-depth presentation of GPRS (general packet radio service). The...

802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
IT Project Portfolio Management
IT Project Portfolio Management
While consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors...
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
An Introduction to Microelectromechanical Systems Engineering, Second Edition
An Introduction to Microelectromechanical Systems Engineering, Second Edition

The past few years have witnessed an increasing maturity of the MEMS industry and a rapid introduction of new products addressing applications ranging from biochemical analysis to fiber-optic telecommunications. The market size for MEMS products has doubled in the past 5 years and is projected to grow at this fast rate for the foreseeable...

Mission-Critical Network Planning
Mission-Critical Network Planning
I wrote this book in the aftermath of the terrorist attacks that took place on September
11, 2001. Until then, I was planning to write this book at a much later time. But
the events of that day compelled me to immediately begin this work. As we have
seen, those events have had far-reaching repercussions in the information
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy