Home | Amazing | Today | Tags | Publishers | Years | Search 
Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS Practical Implementation Guide and Workbook Second Edition

A one-stop resource for understanding and applying current International Financial Reporting Standards

The year 2007 proved to be yet another historic year of watershed events for the International Financial Reporting Standards (IFRS) firstly, due to the...

Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks

Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc...

Algorithms and Protocols for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Boukerche is well-known and established international researcher in the field of wireless mobile networks and distributed systems. This is one of the first publications to focus on wireless ad hoc and sensor networks with a concentration on algorithms and protocols providing you with a comprehensive resource to learn about the continuous advances...
A Second Course in Formal Languages and Automata Theory
A Second Course in Formal Languages and Automata Theory
Intended for graduate students and advanced undergraduates in computer science, A Second Course in Formal Languages and Automata Theory treats topics in the theory of computation not usually covered in a first course. After a review of basic concepts, the book covers combinatorics on words, regular languages, context-free languages, parsing and...
Network: Theorizing Knowledge Work in Telecommunications
Network: Theorizing Knowledge Work in Telecommunications
How does a telecommunications company function when its right hand often doesn't know what its left hand is doing? How do rapidly expanding, interdisciplinary organizations hold together and perform their knowledge work? In this book, Clay Spinuzzi draws on two warring theories of work activity - activity theory and actor-network theory - to...
The Optimal Implementation of Functional Programming Languages (Cambridge Tracts in Theoretical Computer Science)
The Optimal Implementation of Functional Programming Languages (Cambridge Tracts in Theoretical Computer Science)
All traditional implementation techniques for functional languages fail to avoid useless repetition of work. They are not "optimal" in their implementation of sharing, often causing a catastrophic, exponential explosion in reduction time. Optimal reduction is an innovative graph reduction technique for functional expressions, introduced...
Maximum MIDI : Music Applications in C++
Maximum MIDI : Music Applications in C++
The seed for this book was planted in 1993. I found myself frustrated by the obstinate, poorly documented, and woefully inadequate MIDI functions available to me as a Windows programmer. So, I set out to write a set of routines that would allow me to write music applications without sweating the MIDI details.

This seemed like a
...
Adoption-centric Usability Engineering: Systematic Deployment, Assessment and Improvement of Usability Methods in Software Engineering
Adoption-centric Usability Engineering: Systematic Deployment, Assessment and Improvement of Usability Methods in Software Engineering
Where should usability techniques and HCD knowledge be considered in the existing software development lifecycle to maximize benefits gained from SE and HCD approaches? This book provides an integrative answer while proposing a systematic approach for the adoption, assessment and deployment of usability engineering methods within software...
Learning Processing: A Beginner's Guide to Programming Images, Animation, and Interaction
Learning Processing: A Beginner's Guide to Programming Images, Animation, and Interaction
Teaches graphic artists the fundamentals of computer programming within a visual playground!

This book teaches you the basic building blocks of programming needed to create cutting-edge graphics applications including interactive art, live video processing, and data visualization. A unique lab-style manual, the book gives graphic
...
3D Shape: Its Unique Place in Visual Perception
3D Shape: Its Unique Place in Visual Perception
The uniqueness of shape as a perceptual property lies in the fact that it is both complex and structured. Shapes are perceived veridically—perceived as they really are in the physical world, regardless of the orientation from which they are viewed. The constancy of the shape percept is the sine qua non of shape perception; you are...
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Every company needs to protect its people and other assets by managing risk in the hiring process!

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be
...
Result Page: 1100 1099 1098 1097 1096 1095 1094 1093 1092 1091 1090 1089 1088 1087 1086 1085 1084 1083 1082 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy