This is an academic book that explains in reahty, examines theoretically, and analyzes statistically information system investment ...
Lee mas
As Web services technology is becoming widely established in enterprise computing applications, Web services research is ...
Lee mas
As Web services technology is becoming widely established in enterprise computing applications, Web services research is ...
Lee masInteroperability: the ability of a system or a product to work with other systems or products without special effort from ...
Lee mas
This book provides original, up-to-date case studies of “ethics dumping” that were largely facilitated by loopholes in ...
Lee masThis book is a fascinating window on the evolution of teaching and learning paradigms in intelligent environments. The three ...
Lee mas
This book is a guide to the implementation of good processes in a .NET environment. Author Marc Holmes focuses on actual ...
Lee masHelps its readers better analyze M&A transactions using information provided in financial statements. Covering accounting ...
Lee mas
This book is the ultimate guide to Flash 8 video it offers practical advice, technical guidance, and a full series of creative ...
Lee mas
The only beginning book of its kind, this book will teach you SAP/ABAP developers the skills you need for Java 5 programming. ...
Lee mas
The book describes a method for creating models of telecom systems. The method is intended for practicing network architects ...
Lee mas
Addresses real issues commonly faced in the workplace. The essential concepts are explained in a practical way to enable ...
Lee mas
Addresses real issues commonly faced in the workplace. The essential concepts are explained in a practical way to enable ...
Lee mas
Natural and anthropogenic disasters have caused a large number of victims and significant social and economic losses in the ...
Lee mas
The GLP regulations have developed from rules on how to exactly document the planning, conduct and reporting of toxicity ...
Lee mas
In this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...
Lee mas
Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...
Lee mas
The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, ...
Lee mas
The handbook provides a cross-national perspective on these issues and draws a clear picture of the situation in quality ...
Lee mas
In the process of converting to IFRS, a number of practical questions arise concerning the structures of the accounting area ...
Lee mas