Home | Amazing | Today | Tags | Publishers | Years | Search 
Quality of Service: Delivering QoS on the Internet and in Corporate Networks
Quality of Service: Delivering QoS on the Internet and in Corporate Networks
Quality of Service (QoS) is one of the most elusive, confounding, and confusing topics in
data networking today. Why has such an apparently simple concept reached such
dizzying heights of confusion? After all, it seems that the entire communications industry
appears to be using the term with some apparent ease, and with such common
...
Planning for Survivable Networks
Planning for Survivable Networks
Keep your network safe from security disasters with a dependable recovery strategy

Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.

In the information-packed pages of this book, Annlee Hines shares her...

Mastering the SAP Business Information Warehouse
Mastering the SAP Business Information Warehouse
"This book is insightful and thought-provoking for even the most seasoned SAP BW individual."
–Richard M. Dunning, Chair, American SAP Users Group

Written by the leading experts in the field, this comprehensive guide shows you how to implement the SAP Business Information Warehouse (BW) and create useful applications...

Agile Database Techniques: Effective Strategies for the Agile Software Developer
Agile Database Techniques: Effective Strategies for the Agile Software Developer
"I wish I had a book like this eight years ago. You’ll want to be sure to have enough copies for both your development and database folks."
—Jon Kern, Founding Member of the Agile Alliance

"You will find workable, real-world advice here."
—Doug Barry, Author, Web Services and
...

Mastering Data Warehouse Design: Relational and Dimensional Techniques
Mastering Data Warehouse Design: Relational and Dimensional Techniques
At last, a balanced approach to data warehousing that leverages the techniques pioneered by Ralph Kimball and Bill Inmon

Since its groundbreaking inception, the approach to understanding data warehousing has been split into two mindsets: Ralph Kimball, who pioneered the use of dimensional modeling techniques for building the data warehouse, and...

Data Warehousing Fundamentals: A Comprehensive Guide for IT Professionals
Data Warehousing Fundamentals: A Comprehensive Guide for IT Professionals
Data warehousing is revolutionizing the way businesses in a wide variety of industries perform analysis and make strategic decisions. This volume offers IT professionals comprehensive coverage of every significant topic in data warehousing systems.

The author provides a complete overview of data warehousing together with in-depth explanations...

The Worldwide History of Telecommunications
The Worldwide History of Telecommunications
The first comprehensive history of the Information Age how we got there and where we are going

The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in...

Communications Systems
Communications Systems
A new edition that takes students to the cutting edge and back!

Extensively revised and updated, this new fourth edition of COMMUNICATION SYSTEMS is the most complete undergraduate textbook on the theories and principles behind today's most advanced communications systems.

New features...

Building the Data Warehouse (3rd Edition)
Building the Data Warehouse (3rd Edition)
Learn the most recent advances in data warehousing technology from the "Father of Data Warehousing"

Since it was first published in 1990, W. H. Inmon’s Building the Data Warehouse has become the bible of data warehousing–– the first and best introduction to the subject. A lot has changed in data warehousing...

Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

XML in 60 Minutes a Day
XML in 60 Minutes a Day
Get up and running with XML using this innovative virtual classroom approach!

Interested in mastering XML? This revolutionary book and companion online presentation take you through 16 one-hour lessons that quickly get you up to speed on many of XML’s capabilities. With this unique approach and real-world perspective, you’ll be able...

Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Get a data mining recipe for success to increase profits and reduce costs in today’s business world with–This book shows you how to create and implement models of the most commonly asked data mining questions for marketing, sales, risk analysis, and customer relationship management and support. You’ll get proven modeling...
Result Page: 276 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy