Flylib.com
Criminal Law
↵
Investigative Data Mining for Security and Criminal Detection
2005
0750676132
Show 1-1/1
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Scope Risk
Monitoring and Controlling Risky Projects
Conclusion
Appendix A Selected Detail From the PERIL Database
WebLogic: The Definitive Guide
Packaging and Deployment
Security Configuration
Transactions
Container-Managed Relationships
UDDI
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Individual change
Leading change
Restructuring
Mergers and acquisitions
Cultural change
Twisted Network Programming Essentials
Building Simple Clients and Servers
Web Services and RPC
Installing SOAP Libraries
Listing Mailboxes on an IMAP Server
Setting Up a Custom SSH Server
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 200 Use and Identification of Grounded Conductors
Article 340 Underground Feeder and Branch-Circuit Cable Type UF
Article 390 Underfloor Raceways
Article 422: Appliances
Notes for Tables 11(A) and 11(B)
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies