“An excellent summary of the state of supply chain management going into the twenty-first century. Explains the essential concepts clearly and offers practical, down-to-earth advice for making supply chains more efficient and adaptive. Truly a survival guide for executives as they struggle to cope with the increasing competition between...
Authors Michael Turner and Steve Shah deliver sound instruction and valuable information in this structured learning tool. Valuable to systems and network administrators migrating from Windows to Linux, it is also perfect for novice users. Coverage includes all areas of administering the open-source operating...
Linux is a full-fledged operating system. It provides full multitasking in a multiuser environment. It gives a high quality of software for a cost far lower than other commercial versions of UNIX. Red Hat has opted to take Linux a step further.
Red Hat Software is a computer software development company that sells products and provides...
Master the power of Active Directory™ Whether you're a networking newcomer or a veteran administrator, working with Windows® 2000 Server requires a thorough knowledge of Active Directory. This complete guide delivers all the information you need. Logically organized and packed with real-world examples, it shows you...
This introduction to compilers is the direct descendant of the well-known book by Aho and Ullman, Principles of Compiler Design. The authors present updated coverage of compilers based on research and techniques that have been developed in the field over the past few years. The book provides a thorough introduction to compiler...
Information security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may...
E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...
Combines the theoretical foundations of intelligent problem-solving with he data structures and algorithms needed for its implementation. The book presents logic, rule, object and agent-based architectures, along with example programs written in LISP and PROLOG. The practical applications of AI have been kept within the context of its broader goal:...
This book opens up three new topics in modern Chinese literary history: the intimate lives of Lu Xun and Xu Guangping as a couple; real and imagined love-letters in modern Chinese literature; and concepts of privacy in China. The scandalous affair between modern China's greatest writer and his former student is revealed in their letters to each...
"The Promise of Mediation has been the single most significant influence on the modern ADR movement. This brilliant work serves as a constant reminder that mediation is about more than settling cases. Any serious student of the mediation...