 |
|
 The Profit Impact of Business IntelligenceBusiness Intelligence (BI): Its not just a technology. Its not just a methodology. Its a powerful new management approach that when done right can deliver knowledge, efficiency, better decisions, and profit to almost any organization that uses it.
When BI first came on the scene, it promised a lot but often failed to deliver. The... |  |  Coding Theory: A First Course"This book is well written and highly recommended for students and professionals in engineering, computer science, mathematics and related fields." Mathematical Reviews
Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications.... |  |  The 8051 Microcontroller: Architecture, Programming, and ApplicationsDesigned as a main or supplementary text for courses on microprocessors or microcontrollers. Packaged with a customized disk containing an 8051 assembler and 8051 simulator. Focuses on programming the Intel 8051 microcontroller, one of the most common microprocessors used in controls or instrumentation applications using assembly code. Text has... |
|
|
 Flash 3D: Animation, Interactivity, and GamesPush your creative ideas to the next level in content delivery. Use real and simulated 3D space in your Flash games and interactive systems.
3D possibilities offer an untapped creative approach to thinking and designing with Flash. Tap into this medium by: * Creating reusable templates to reduce costs and cycle time for... |  |  |  |  Sams Teach Yourself Microsoft Access 2002 Programming in 24 HoursSams Teach Yourself Access 2002 Programming in 24 Hours will considerably improve the quality of the database applications that the reader can create with Microsoft Access. Concise tutorials that quickly bring the reader up to speed will be the goal of each chapter. Having completed this book, the readers will be able to understand any sample VBA... |
|
 |  |  Information Assurance: Managing Organizational IT Security RisksWritten by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted... |  |  Open Source: Technology and Policy"Provide[s] a well laid out review of the open source movement, including its technologies, policies, and impact and implications.... Overall, this book ties together the many interlocking pieces within the development and history of the open source movement." -- A. Hollister, State University of Cortland, CHOICE
The open... |
|
Result Page: 977 976 975 974 973 972 971 970 969 968 967 966 965 964 963 962 961 960 959 |