Home | Amazing | Today | Tags | Publishers | Years | Search 
IT Project Portfolio Management
IT Project Portfolio Management
While consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors...
Mastering Visual Basic .NET Database Programming
Mastering Visual Basic .NET Database Programming
Enter a New World of Database Programming

Visual Basic .NET and ADO.NET facilitate the development of a new generation of database applications, including disconnected applications that run on the Web. Mastering Visual Basic .NET Database Programming is the resource you need to thrive in this new world. Assuming no prior experience with...

Alan Simpson's Windows XP Bible
Alan Simpson's Windows XP Bible
If Windows XP can do it, you can do it too ...

Windows XP is the undisputed market leader among operating systems, and the enhancements and security improvements in Service Pack 2 made it even better. So if you already know how to turn on a PC and use a mouse, here's the place to learn how to use every fabulous feature of Windows XP. Let an...

Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Hacking GPS (ExtremeTech)
Hacking GPS (ExtremeTech)
You'll get lost in this book, but nowhere else

Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power...

Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition

Snort, Information Security Magazine’s pick for Open Source Product of the year 2003, is one of the best examples of the IT community working together to build a capability. Please notice I did not say a tool, but rather, a capability. Snort’s extensible architecture and open source distribution has long made it an ideal choice...

Java Programming with Oracle JDBC
Java Programming with Oracle JDBC
Learn how to leverage JDBC, a key Java technology used to access relational data from Java programs, in an Oracle environment. Author Donald Bales begins by teaching you the mysteries of establishing database connections, and how to issue SQL queries and get results back. You'll move on to advanced topics such as streaming large objects, calling...
Professional VSTO 2005 : Visual Studio 2005 Tools for Office (Programmer to Programmer)
Professional VSTO 2005 : Visual Studio 2005 Tools for Office (Programmer to Programmer)
Visual Studio 2005 Tools for Office (VSTO) supports Word, Excel®, and Outlook® and allows developers to build robust Office applications in both the C# and VB languages. This practical guide shows you how to leverage the power of VSTO to write enterprise software targeting Office 2003. Even if you're not entirely familiar with VSTO, you'll...
ASIC and FPGA Verification : A Guide to Component Modeling (The Morgan Kaufmann Series in Systems on Silicon)
ASIC and FPGA Verification : A Guide to Component Modeling (The Morgan Kaufmann Series in Systems on Silicon)
Today it is still very difficult to verify board or larger system designs through simulation or any other technique. This important book addresses the largest ingredient needed to make simulation possiblethe availability of integrated circuit component models. Addressed inside is how to use VITAL extensions and other conventions with VHDL to...
The Executive's Guide to Information Technology
The Executive's Guide to Information Technology
What Every Senior Manager and Consultant Should Know About Managing Effective IT Departments

"This book sheds light on one of the most challenging topics for corporate officers –how to create and manage a high-performance IT department and obtain higher returns from technology-invested capital. The techniques and tools provided show...

A Networking Approach to Grid Computing
A Networking Approach to Grid Computing
In February 1974 this author, as a math major at the Polytechnic Institute of Brooklyn,
(co)invented a now well-rooted but computationally complex concept of “hyperperfect
numbers” and he used an early form of grid computing—also known as
utility computing—to study this concept (see pages 83 and 86). His
...
Emotions in Organizational Behavior
Emotions in Organizational Behavior
This edited volume looks at the range of research on emotions within an organizational behaviour framework and it organized in terms of the individual and interpersonal and organizational levels. Particular emphasis was made to bring in leading researchers from international areas.

This volume was conceived and compiled to meet the need
...
Result Page: 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy