This is an academic book that explains in reahty, examines theoretically, and analyzes statistically information system investment ...
Continue reading
As Web services technology is becoming widely established in enterprise computing applications, Web services research is ...
Continue reading
As Web services technology is becoming widely established in enterprise computing applications, Web services research is ...
Continue readingInteroperability: the ability of a system or a product to work with other systems or products without special effort from ...
Continue reading
This book provides original, up-to-date case studies of “ethics dumping” that were largely facilitated by loopholes in ...
Continue readingThis book is a fascinating window on the evolution of teaching and learning paradigms in intelligent environments. The three ...
Continue reading
This book is a guide to the implementation of good processes in a .NET environment. Author Marc Holmes focuses on actual ...
Continue readingHelps its readers better analyze M&A transactions using information provided in financial statements. Covering accounting ...
Continue reading
This book is the ultimate guide to Flash 8 video it offers practical advice, technical guidance, and a full series of creative ...
Continue reading
The only beginning book of its kind, this book will teach you SAP/ABAP developers the skills you need for Java 5 programming. ...
Continue reading
The book describes a method for creating models of telecom systems. The method is intended for practicing network architects ...
Continue reading
Addresses real issues commonly faced in the workplace. The essential concepts are explained in a practical way to enable ...
Continue reading
Addresses real issues commonly faced in the workplace. The essential concepts are explained in a practical way to enable ...
Continue reading
Natural and anthropogenic disasters have caused a large number of victims and significant social and economic losses in the ...
Continue reading
The GLP regulations have developed from rules on how to exactly document the planning, conduct and reporting of toxicity ...
Continue reading
In this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...
Continue reading
Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...
Continue reading
The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, ...
Continue reading
The handbook provides a cross-national perspective on these issues and draws a clear picture of the situation in quality ...
Continue reading
In the process of converting to IFRS, a number of practical questions arise concerning the structures of the accounting area ...
Continue reading