Home | Amazing | Today | Tags | Publishers | Years | Search 
Software Project Secrets: Why Software Projects Fail
Software Project Secrets: Why Software Projects Fail
Previously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the...
Progress on Cryptography: 25 Years of Cryptography in China
Progress on Cryptography: 25 Years of Cryptography in China
This workshop entitled “Progress on Cryptography: 25 Year of Cryptography in China” is being held during the celebration of Professor Guozhen Xiao’s 70th birthday. This proceeding is a birthday gift from all of his current and former graduate students, who have had the pleasure of being supervised by Professor Xiao during the last...
Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Networked Information Technologies: Diffusion and Adoption
Networked Information Technologies: Diffusion and Adoption
Software systems that used to be relatively autonomous entities such as e.g. accounting systems, order-entry systems etc. are now interlinked in large networks comprising extensive information infrastructures. What earlier used to be stand-alone proprietary systems are now for the most part replaced by more or less standardized interdependent...
Hacking Photoshop CS2
Hacking Photoshop CS2
You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command...
Strategic Knowledge Management Technology
Strategic Knowledge Management Technology
Strategic Knowledge Management Technology is based on the premise that it is difficult, if not impossible, to manage a modern business or public organization without at least some understanding of the planning, use, control and benefits of information technology to support knowledge work in the organization. This book applies the knowledge-based...
Encyclopedia of Communities of Practice in Information and Knowledge Management
Encyclopedia of Communities of Practice in Information and Knowledge Management
"This encyclopedia has a breadth and depth that makes it a valuable reference work for anyone." --Prof. Miles Nicholls, RMIT University, Australia

The Encyclopedia of Communities of Practice in Information and Knowledge Management is the leading reference source for dynamic and innovative research in the field of
...
Integrity and Internal Control in Information Systems VI
Integrity and Internal Control in Information Systems VI
The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions:
  • what precisely do business managers need...
Encyclopedia of Virtual Communities and Technologies
Encyclopedia of Virtual Communities and Technologies
Advances in computer and telecommunications technologies during the past several decades, have facilitated the creation of virtual communities and organizations throughout the world. As the growth in virtual communities accelerates, researchers are facing new challenges to learn about the latest of research and practices in this fast growing filed....
Intelligent Document Retrieval: Exploiting Markup Structure
Intelligent Document Retrieval: Exploiting Markup Structure
Collections of digital documents can nowadays be found everywhere in institutions, universities or companies. Examples are Web sites or intranets. But searching them for information can still be painful. Searches often return either large numbers of matches or no suitable matches at all. Such document collections can vary a lot in size and how much...
Advances in Electronic Marketing
Advances in Electronic Marketing
There are many challenges facing organizations today as they incorporate electronic marketing methods into their strategy. Advances in Electronic Marketing examines these challenges within three major themes: the global environment, the strategic/technological realm, and the buyer behavior of online consumers. Each chapter raises important issues,...
Business Applications and Computational Intelligence
Business Applications and Computational Intelligence
Computational intelligence has a long history of applications to business - expert systems have been used for decision support in management, neural networks and fuzzy logic have been used in process control, a variety of techniques have been used in forecasting, and data mining has become a core component of customer relationship management in...
Result Page: 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy