Describes the development of quality over various stages, from product inspection, through quality control to the present ...
Continue readingThe book describes a method for creating models of telecom systems. The method is intended for practicing network architects ...
Continue readingForensic psychologists and psychiatrists are increasingly asked to provide expertise to courts and attorneys in the criminal ...
Continue readingThis work reviews underlying concepts and shows how they are applied through real-life examples of CAFR, financial statements ...
Continue readingProvides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security. ...
Continue readingAddresses real issues commonly faced in the workplace. The essential concepts are explained in a practical way to enable ...
Continue readingAddresses real issues commonly faced in the workplace. The essential concepts are explained in a practical way to enable ...
Continue readingInformation is a valuable resource to an organization. Computer software provides an efficient means of processing information, ...
Continue readingThis book covers the key principles of risk management and how to deal with the different types of risk organizations face. ...
Continue readingProvides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems ...
Continue readingNatural and anthropogenic disasters have caused a large number of victims and significant social and economic losses in the ...
Continue readingTheformulationofmanypracticalproblemsnaturallyinvolvesconstraintsonthe variables entering the mathematical model of a real-life ...
Continue readingThe GLP regulations have developed from rules on how to exactly document the planning, conduct and reporting of toxicity ...
Continue readingIn this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...
Continue readingGuide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...
Continue readingHDPE (High-density polyethylene) geomembranes are nowadays widely used for large-area liners and construction sealings in ...
Continue readingSpecial functions are pervasive in all fields of science and industry. The most well-known application areas are in physics, ...
Continue readingThe Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, ...
Continue readingThis new book by Marc Pansu and Jacques Gautheyrou provides a synopsis of the analytical procedures for the physicochemical ...
Continue readingThis book provides an international review of the current state of teacher education, with chapters from an international ...
Continue reading