Home | Amazing | Today | Tags | Publishers | Years | Search 
Functional Verification of Programmable Embedded Architectures: A Top-Down Approach
Functional Verification of Programmable Embedded Architectures: A Top-Down Approach
It is widely acknowledged that the cost of validation and testing comprises a significant
percentage of the overall development costs for electronic systems today,
and is expected to escalate sharply in the future. Many studies have shown that
up to 70% of the design development time and resources are spent on functional...
Knowledge Management and Management Learning:: Extending the Horizons of Knowledge-Based Management
Knowledge Management and Management Learning:: Extending the Horizons of Knowledge-Based Management
Over the last few years, both knowledge management and management
learning (including e-learning) have received sufficient coverage in
publications. I am glad to refer, amongst others, to my own publications
with Gert Van der Linden: The Hybrid Business School: developing
knowledge management through management learning
...
Sams Teach Yourself Red Hat Fedora 4 All in One
Sams Teach Yourself Red Hat Fedora 4 All in One

Linux operating systems are quickly becoming a viable alternative to the more expensive Microsoft platform with the Red Hat distribution of the Linux desktop system being at the top of the list. Perhaps you've also caught the Red Hat Linux fever and are planning to use it for your operating and desktop systems but need help...

The Second Self: Computers and the Human Spirit -- Twentieth Anniversary Edition
The Second Self: Computers and the Human Spirit -- Twentieth Anniversary Edition
In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she...
Managing Successful IT Outsourcing Relationships
Managing Successful IT Outsourcing Relationships
Even though the IT outsourcing market has grown tremendously over the past years, many organizations do not have a reflective understanding of the complex process of IT outsourcing. The process does affect both technological and business goals and activities, and companies must establish both strategies and structures adjusted to their degree of...
SAS Guide to Report Writing: Examples
SAS Guide to Report Writing: Examples
Sue Hakomaki Academic & Distributed Computing Services Office of Information Technology University of Minnesota
I found this book very user-friendly with simple examples to more detailed examples. Each featured option is explained clearly.

Jump-start your report-writing skills! Report writing has never
...
E-health Systems Diffusion And Use: The Innovation, the User And the Use It Model
E-health Systems Diffusion And Use: The Innovation, the User And the Use It Model
E-Health Systems Diffusion and Use: The Innovation, the User and the Use IT Model offers an overview of the use and diffusion of information systems in the health care sector with particular attention to the role of the user. This book starts with classic contributions and modifications and then continues with contemporary contributions, which...
Electronic Business in Developing Countries: Opportunities and Challenges
Electronic Business in Developing Countries: Opportunities and Challenges
Most of the literature covering electronic business focused on the developed world. Electronic Business in Developing Countries: Opportunities and Challenges provides a chance to get to know more electronic business applications, successes, failures, challenges and opportunities in the developing world. These studies are gaining importance for...
A Practical Guide to Linux(R) Commands, Editors, and Shell Programming
A Practical Guide to Linux(R) Commands, Editors, and Shell Programming

The essential reference for core commands that Linux users need daily, along with superior tutorial on shell programming and much moreSystem administrators, software developers,  quality assurance engineers and others  working on a Linux system need to work from the command line in order to be effective.  Linux is...

PHP|Architect's Guide to PHP Design Patterns
PHP|Architect's Guide to PHP Design Patterns
You have probably heard a lot about Design Patterns—a technique that helps you design rock-solid solutions to practical problems that programmers everywhere encounter in their day-to-day work.

Even though there has been a lot of buzz, however, no-one has yet come up with a comprehensive resource on design patterns for PHP...

Agile Web Development with Rails: A Pragmatic Guide (Pragmatic Programmers)
Agile Web Development with Rails: A Pragmatic Guide (Pragmatic Programmers)

Rails is a full-stack, open source web framework that enables you to create full-featured, sophisticated web-based applications, but with a twist... A full Rails application probably has less total code than the XML you'd need to configure the same application in other frameworks. With this book you'll learn how to use...

Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
Result Page: Previous 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy