Flylib.com
Index_V
Previous page
Table of content
Next page
V
vendor contracts, 5, 56, 62, 95, 97, 239
videoconferencing
as control tool, 60
as standardizing tool, 130, 136
for project management, 61
in Japanese GSAs, 186, 191
reciprocity of, 42
with customers, 137 “8
virtual organizations, 172
virtual presence, 127 “8
see also
co-presence, face-to-face contact and proximity
Vladivostok, 17
Previous page
Table of content
Next page
Global IT Outsourcing: Software Development across Borders
ISBN: 0521039487
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Sundeep Sahay
,
Brian Nicholson
,
S. Krishna
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 4.1 Authentication with Public Keys
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.5 How to use OpenSSH Passphrase Agents
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Conclusion
Inside Network Security Assessment: Guarding Your IT Infrastructure
Process for Assessing Risk
Level II Assessments
Determining What Tools to Use
Vulnerability Management
Information Request Form
C++ How to Program (5th Edition)
Wrap-Up
Multidimensional Arrays
Terminology
Finding Strings and Characters in a string
Case Study: Shopping Cart
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Uses of the Quartz Listeners
Quartz Utility Plug-Ins
Using Other J2EE Resources
Quartz and Web Applications
Configuring JobStore Settings
Python Standard Library (Nutshell Handbooks) with
The random Module
The crypt Module
The bdb Module
The filecmp Module
The regex_syntax Module
Digital Character Animation 3 (No. 3)
Chapter Five. Creating Strong Poses
Posing the Body Naturally
Animating Dialogue
Acting Vs. Animating
Acting Technique
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies