Flylib.com
Criminal Law
↵
Investigative Data Mining for Security and Criminal Detection
2005
0750676132
Show 1-1/1
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
The Second Wave ERP Market: An Australian Viewpoint
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Agile Project Management: Creating Innovative Products (2nd Edition)
The Guiding Principles of Agile Project Management
Employ Iterative, Feature-Based Delivery
The Business of APM
Phase: Explore
Practice: Product Vision Box and Elevator Test Statement
Metrics and Models in Software Quality Engineering (2nd Edition)
In-Process Quality Metrics
Collecting Software Engineering Data
Literature Review
Cost Effectiveness of Phase Defect Removal
The Summarization Phase
Software Configuration Management
Configuration Change Management
Configuration Management and Software Engineering Standards Reference
Appendix Q Problem Trouble Report (PTR)
Appendix U Acronyms and Glossary
Appendix V Functional Configuration Audit (FCA) Checklist
C++ GUI Programming with Qt 3
Implementing the Edit Menu
Implementing the Other Menus
Layout Management
Painting with QPainter
Communicating with the GUI Thread
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Social Actors
Credibility and the World Wide Web
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies