for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book presents methods for analyzing software engineering problems, designing solutions, coding effectively, and testing software.
Bemærk: Kan ikke leveres før jul.
The book provides a common operating framework in which best practices, process improvements, and cost avoidance activities can be shared, and quality assurance... Læs mere
Bemærk: Kan ikke leveres før jul.
eWork and eBusiness in Architecture, Engineering and Construction 2016... Læs mere
Bemærk: Kan ikke leveres før jul.
This book addresses major issues and challenges in drone-based solutions proposed for IoT-enabled cellular/computer networks, routing/communication protocols, surveillances... Læs mere
Bemærk: Kan ikke leveres før jul.
As information technology is constantly progressing, the remote laboratory (RL) development needs to keep up with the brisk pace. To address... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Radio frequency identification (RFID) is one of the game-changing technologies of the 21st century. This book... Læs mere
Bemærk: Kan ikke leveres før jul.
Explains various aspects of database design, access, implementation, application development, and management, as well as data analysis for business intelligence. Following an introduction to database components, this book uses case studies to illustrate the modeling process.
Bemærk: Kan ikke leveres før jul.
Helps to learn how to effectively manage the development of a software project and deliver it in line with customer expectations. This title offers real-world case studies about the author's experience at Microsoft successfully implementing TSP to achieve higher quality software.
Bemærk: Kan ikke leveres før jul.
The book is an introduction to essential concepts of cybersecurity and information security and the methods and techniques used to... Læs mere
Bemærk: Kan ikke leveres før jul.
This book addresses significant issues in the cloud and the Internet of Things including personal information and identity crime for cloud of things,... Læs mere
Bemærk: Kan ikke leveres før jul.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.