 |
|
 |  |  SAP Security: SAP Security EssentialsI have found that a of the materials available in SAP security are either 1) nonexistent 2) too general and pedantic in nature 3) sales materials in disguise. And since there are a very limited number of published books in the area of SAP security, this title was a natural addition to our growing library of practical references for SAP consultants... |  |  SAP Security Configuration and Deployment: The IT Administrator's Guide to Best PracticesThe user's guide to best practices in improving and enhancing security in a SAP landscape.
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and... |
|
 Learn Objective-C on the Mac (Learn Series)Take your coding skills to the next level with this extensive guide to Objective–C, the native programming language for developing sophisticated software applications for Mac OS X. Objective–C is a powerful, object–oriented extension of C, making this book the perfect follow–up to Dave Mark’s... |  |  |  |  Logic Functions and Equations: Examples and ExercisesThe field of binary Logics has two main areas of application, the Digital Design of Circuits (related to Electrical Engineering) and Propositional Logics (related to Mathematics, Artificial Intelligence, Complexity etc.). In both cases it is quite possible to teach the theoretical foundations and to do some exercises, but in both cases the examples... |
|
 |  |  Next Generation SSH2 Implementation: Securing Data in MotionThe most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book... |  |  |
|
 SAP PS FAQ: SAP Project Systems Interview Questions, Answers, and ExplanationsThe Ultimate Reference & Learning Guide for S A P PS Consultants SAP PS Questions, Answers, and Explanations! It' s clear that SAP PS is the future for projects activity in SAP -- but finding resources can be difficult . SAP PS Interview Questions, Answers, and Explanations guides you through your learning process. From helping you to... |  |  Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)Microsoft .NET Architect Evangelist, Jit Ghosh, presents a practical companion guide to developing rich, interactive web applications with Silverlight 2. Common problems, issues, and every–day scenarios are tackled with a detailed discussion of the solution and ready–made code recipes that will save you hours of coding... |  |  An Introduction to 3D Computer Vision Techniques and Algorithms
Computer vision encompasses the construction of integrated vision systems and the application of vision to problems of real-world importance. The process of creating 3D models is still rather difficult, requiring mechanical measurement of the camera positions or manual alignment of partial 3D views of a scene. However using algorithms, it is... |
|
Result Page: 1182 1181 1180 1179 1178 1177 1176 1175 1174 1173 1172 1171 1170 1169 1168 1167 1166 1165 1164 |