Home | Amazing | Today | Tags | Publishers | Years | Search 
Reliability, Survivability and Quality of Large Scale Telecommunication Systems: Case Study: Olympic Games
Reliability, Survivability and Quality of Large Scale Telecommunication Systems: Case Study: Olympic Games
The design and implementation of large scale telecommunication systems requires the interconnection and integration of diverse subsystems which need to provide a highly reliable system capable of offering high quality services. Over recent years, large scale systems designers have only had to deal with wireline systems and large scale operations...
The New Workplace: A Guide to the Human Impact of Modern Working Practices
The New Workplace: A Guide to the Human Impact of Modern Working Practices

We are all increasingly familiar with modern business terms such as total quality management, just-in-time production, e-business, lean manufacturing and teleworking. But what really lies behind these terms and what effect do these and other new practices have on productivity and performance and, crucially, what is their social and psychological...

Time-Saver Standards for Urban Design
Time-Saver Standards for Urban Design
The global scale and impact of urban settlements and cities will determine the course of the emergent 21st century. Cities are no longer isolated and responding only to local and regional influences. Very large cities—megacities—are exploding in size and growth, for the most part in newly developing regions of the globe. The impact of...
Schaum's Easy Outline Differential Equations
Schaum's Easy Outline Differential Equations
Boiled-down essentials of the top-selling Schaum's Outline series, for the student with limited time

What could be better than the bestselling Schaum's Outline series? For students looking for a quick nuts-and-bolts overview, it would have to be Schaum's Easy Outline series. Every book in this series is a pared-down,...

The Power of Persuasion: How We're Bought and Sold
The Power of Persuasion: How We're Bought and Sold

"An engaging, highly readable survey of the sophisticated methods of persuasion we encounter in various situations. From television to telemarketing and from self-deception to suicide cults, Levine takes a hard look at all the ways we attempt to persuade each other--and how and why they work (or don't). . . . The next time you wonder...

.NET Web Services: Architecture and Implementation
.NET Web Services: Architecture and Implementation

.NET Web Services is the authoritative guide to designing and architecting better Web services using Microsoft technologies. Written by Keith Ballinger, a Program Manager for XML Web Services at Microsoft, this book explains what Web...

Just Enough CRM
Just Enough CRM

The decision-maker's guide to competitive advantage with CRM

  • Getting real benefits from CRM--fast

  • A complete roadmap for auditing and

  • improving your current CRM processes

  • ...
High-Speed Signal Propagation: Advanced Black Magic
High-Speed Signal Propagation: Advanced Black Magic

Raves for Dr. Johnson's previous classic, High-Speed Digital Design!

"....one of the finest efforts to come along in the field of applied high-speed digital design because of its focus on providing tools for the whole design team bringing a high-speed product to life. For all the PCB designers and...

Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the...
CMMI : Guidelines for Process Integration and Product Improvement
CMMI : Guidelines for Process Integration and Product Improvement

Many organizations use Capability Maturity Models® (CMMs®) to assess development and maintenance processes, implement improvements, and measure progress. Although consistent in purpose, these models differ in terminology and design-enough sometimes to cause conflict and confusion when used within the same...

IT Security: Risking the Corporation
IT Security: Risking the Corporation

Even the world's largest and most sophisticated networks are vulnerable to attack-and so is yours. The scenarios described in IT Security:Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software-as well as the vulnerability caused by poor training,...

Auditing Information Systems
Auditing Information Systems

Auditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly...

Result Page: Previous 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy