 |
|
 Information and Communications Technology for Competitive IntelligenceCompetitive Intelligence can be described as producing and processing information about the environment of an organization for strategic purposes. To formulate a strategy, an organization needs to collect and process information about its environment—about, for instance, competitors, customers, suppliers, governments, technological trends or... |  |  Pro VB 2005 and the .NET 2.0 Platform, Second EditionThe initial release of the .NET platform (circa 2001) caused quite a stir within the Visual Basic programming community. One the one hand, many die-hard VB 6.0 developers were up in arms at the major differences between VB 6.0 and Visual Basic .NET. Individuals in this group were a bit stunned to see that VB .NET was not in fact “VB... |  |  Writing Apache Modules with Perl and CThis book was designed for application developers who already have some experience with web programming. We assume that you understand CGI scripting, know how to produce HTML pages dynamically, and can create fill-out forms and process their contents. We also assume that you know the basics of web server administration—if not with the Apache... |
|
|
 Windows Forms Programming with C#The .NET Framework contains such a large selection of topics that it is impossible to cover all of them in a single book of any depth. This section introduces the focus of this book, and provides an overview of the contents and conventions used in the text. The end of this section describes the online forum available for any questions or comments... |  |  Wireless Communications Systems and NetworksWireless Communications Systems and Networks covers the breadth of research in wireless communications. It begins by detailing the essential background, such as wireless standards, spread spectrum and CDMA systems, and goes on to discuss advanced topics in next generation wireless systems. Discussions of advanced-level materials progress in a... |  |  USB Mass Storage: Designing and Programming Devices and Embedded HostsA mass-storage device can provide access to data for just about any purpose. Every time you load an application or save a file on a PC, you’re using a mass-storage device. A computer’s hard drive is a mass-storage device, as are flash, CD, and DVD drives. Devices with dedicated functions—data loggers, robots, and other embedded... |
|
 Handbook of Psychology in Legal ContextsThe second edition of this popular international handbook highlights the developing relationship between psychology and the law. Consisting of all-new material and drawing on the work of practitioners and academics from the UK, Europe, North America and elsewhere, this volume looks not only at the more traditional elements of psychology and the law... |  |  Multimedia Messaging Service: An Engineering Approach to MMSThe Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for... |  |  CYA Securing IIS 6.0Network System Administrators operate in a high-stress environment, where the competitive demands of the business often run counter to textbook “best practices”. Design and planning lead times can be nonexistent and deployed systems are subject to constant end-runs; but at the end of the day, you, as the Administrator, are held... |
|
Result Page: 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 |