Home | Amazing | Today | Tags | Publishers | Years | Search 
Information and Communications Technology for Competitive Intelligence
Information and Communications Technology for Competitive Intelligence
Competitive Intelligence can be described as producing and processing information about the environment of an organization for strategic purposes. To formulate a strategy, an organization needs to collect and process information about its environment—about, for instance, competitors, customers, suppliers, governments, technological trends or...
Pro VB 2005 and the .NET 2.0 Platform, Second Edition
Pro VB 2005 and the .NET 2.0 Platform, Second Edition
The initial release of the .NET platform (circa 2001) caused quite a stir within the Visual Basic programming community. One the one hand, many die-hard VB 6.0 developers were up in arms at the major differences between VB 6.0 and Visual Basic .NET. Individuals in this group were a bit stunned to see that VB .NET was not in fact “VB...
Writing Apache Modules with Perl and C
Writing Apache Modules with Perl and C
This book was designed for application developers who already have some experience with web programming. We assume that you understand CGI scripting, know how to produce HTML pages dynamically, and can create fill-out forms and process their contents. We also assume that you know the basics of web server administration—if not with the Apache...
Biosignal and Biomedical Image Processing
Biosignal and Biomedical Image Processing
Relying heavily on MATLAB® problems and examples, as well as simulated data, this text/reference surveys a vast array of signal and image processing tools for biomedical applications, providing a working knowledge of the technologies addressed while showcasing valuable implementation procedures, common pitfalls, and essential application...
Understanding Enterprise SOA
Understanding Enterprise SOA
This book is for anyone in the business world or in the public sector who needs to make sense of the new emerging standards for virtually all major information technology decisions. For business professionals, this book is meant to explain and clarify—in business terms—the way web services and SOA work in a business setting. For IT...
Debugging With GDB: The Gnu Source-Level Debugger
Debugging With GDB: The Gnu Source-Level Debugger
The GNU Debugger allows you to see what is going on "inside" a program while it executes - or what a program was doing at the moment it crashed.

GDB supports C, C++, Java, Fortran and Assembly among other languages; it is also designed to work closely with the GNU Compiler Collection (GCC).

The GNU Debugger Program has four...

Windows Forms Programming with C#
Windows Forms Programming with C#
The .NET Framework contains such a large selection of topics that it is impossible to cover all of them in a single book of any depth. This section introduces the focus of this book, and provides an overview of the contents and conventions used in the text. The end of this section describes the online forum available for any questions or comments...
Wireless Communications Systems and Networks
Wireless Communications Systems and Networks
Wireless Communications Systems and Networks covers the breadth of research in wireless communications. It begins by detailing the essential background, such as wireless standards, spread spectrum and CDMA systems, and goes on to discuss advanced topics in next generation wireless systems. Discussions of advanced-level materials progress in a...
USB Mass Storage: Designing and Programming Devices and Embedded Hosts
USB Mass Storage: Designing and Programming Devices and Embedded Hosts
A mass-storage device can provide access to data for just about any purpose. Every time you load an application or save a file on a PC, you’re using a mass-storage device. A computer’s hard drive is a mass-storage device, as are flash, CD, and DVD drives. Devices with dedicated functions—data loggers, robots, and other embedded...
Handbook of Psychology in Legal Contexts
Handbook of Psychology in Legal Contexts
The second edition of this popular international handbook highlights the developing relationship between psychology and the law. Consisting of all-new material and drawing on the work of practitioners and academics from the UK, Europe, North America and elsewhere, this volume looks not only at the more traditional elements of psychology and the law...
Multimedia Messaging Service: An Engineering Approach to MMS
Multimedia Messaging Service: An Engineering Approach to MMS
The Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for...
CYA Securing IIS 6.0
CYA Securing IIS 6.0
Network System Administrators operate in a high-stress environment, where the competitive demands of the business often run counter to textbook “best practices”. Design and planning lead times can be nonexistent and deployed systems are subject to constant end-runs; but at the end of the day, you, as the Administrator, are held...
Result Page: 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy