Books in Print

Titre : Books in Print
Auteur :
Éditeur :
ISBN-13 : UOM:39015049090585
Libération : 2001

Télécharger Lire en ligne

Books in print is the major source of information on books currently published and in print in the United States. The database provides the record of forthcoming books, books in-print, and books out-of-print.

DOS Programmer s Reference

Titre : DOS Programmer s Reference
Auteur : Terry R. Dettmann
Éditeur : Que
ISBN-13 : PSU:000017088961
Libération : 1989

Télécharger Lire en ligne

The ultimate reference for DOS programmers features many undocumented DOS functions and helps maximize DOS programming performance. Includes in-depth coverage of DOS, BIOS, and DOS programming in other languages.

Yes Africa Can

Titre : Yes Africa Can
Auteur : Punam Chuhan-Pole
Éditeur : World Bank Publications
ISBN-13 : 9780821387450
Libération : 2011-06-24

Télécharger Lire en ligne

Takes an in-depth look at twenty-six economic and social development successes in Sub-Saharan African countries, and addresses how these countries have overcome major developmental challenges.


Titre : Convergence
Auteur : National Defense University (U.S.)
Éditeur : Government Printing Office
ISBN-13 : 0160919231
Libération : 2013-07-05

Télécharger Lire en ligne

The Center for Complex Operations (CCO) has produced this edited volume, Convergence: Illicit Networks and National Security in the Age of Globalization, that delves deeply into everything mentioned above and more. In a time when the threat is growing, this is a timely effort. CCO has gathered an impressive cadre of authors to illuminate the important aspects of transnational crime and other illicit networks. They describe the clear and present danger and the magnitude of the challenge of converging and connecting illicit networks; the ways and means used by transnational criminal networks and how illicit networks actually operate and interact; how the proliferation, convergence, and horizontal diversification of illicit networks challenge state sovereignty; and how different national and international organizations are fighting back. A deeper understanding of the problem will allow us to then develop a more comprehensive, more effective, and more enduring solution. Other related products: YouTube War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on Every Computer can be found here: Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications can be found here: Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes can be found here: Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications can be found here: Legality in Cyberspace: An Adversary View can be found here: Cyberterrorism After Stuxnet can be found here: Fundamentals of War Gaming --Print Paperback format can be found here: -- Print Hardcover format can be found here: Policy Analysis in National Security Affairs: New Methods for a New Era can be found here: Economic Security: Neglected Dimension of National Security --print paperback format can be found here: --ePub format can be found here: Other products produced by the U.S. Army, National Defense University can be found here: Other products produced by the U.S. Army War College, Strategic Studies Institute can be found here:

Lean Enterprise Value

Titre : Lean Enterprise Value
Auteur : E. Murman
Éditeur : Springer
ISBN-13 : 9781403907509
Libération : 2016-01-06

Télécharger Lire en ligne

Lean Production transformed the way that companies think about production and manufacturing. This book provides a new challenge. It arises from the work of the Lean Aerospace Initiative at MIT and provides a new agenda and bold vision for the aerospace industry to take it out of crisis. It also redefines and develops the concept of Lean as a framework for enterprise transformation and this will be relevant and critical for all industries and enterprises.

Game Architecture and Design

Titre : Game Architecture and Design
Auteur : Andrew Rollings
Éditeur : New Riders Pub
ISBN-13 : 0735713634
Libération : 2004

Télécharger Lire en ligne

A guide to computer game design, architecture, and management explores the application of design principles, shares the experiences of game programmers, and offers an overview of game development software.

Growth Through Innovation

Titre : Growth Through Innovation
Auteur : Roman Boutellier
Éditeur : Springer Science & Business Media
ISBN-13 : 9783319040165
Libération : 2014-02-10

Télécharger Lire en ligne

Capitalism produced entrepreneurs and property rights, the two basic pillars of innovation and growth. As the speed of technology is steadily increasing only radical innovation can be the name of the game. This book discusses technology and innovation trends by looking into historical examples and telling the latest business stories. It opens the discourse about pirates, pioneers, innovators and imitators; proposes the framework of dominant, science-driven and high-tech industry for innovation management and gives insights into intellectual property rights, industrial designs and technical risk management. Finally, it offers 8 important innovation principles for technology driven enterprises that have turned out to have a big effect on the outcome – and in the end on growth.

The Privacy Engineer s Manifesto

Titre : The Privacy Engineer s Manifesto
Auteur : Michelle Finneran Dennedy
Éditeur : Apress
ISBN-13 : 9781430263562
Libération : 2014-01-23

Télécharger Lire en ligne

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI. What you’ll learn What's at stake as concerns data privacy become critical considerations for users, developers, and enterprise stakeholders Comprehensive foundational understanding of the issues and how they are interconnected What the emerging job description of "privacy engineer" means Key development models for privacy architecture How to assemble an engineering privacy tool box (including developing privacy use cases and requirements Organizational design implications of privacy engineering Quality Assurance (QA) methodologies for privacy policy compliance Models for valuing data The 10-point Manifesto of the Privacy Engineer Who this book is for The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying, and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. A must read for all practitioners in the personal information economy. Table of Contents Part 1 – Getting Your Head Around Privacy Chapter 1: Technology Evolution and People Chapter 2: Foundational Concepts and Frameworks Chapter 3: Data and Privacy Governance Concepts Part 2 - The Privacy Engineering Proces Chapter 4: Developing Privacy Policies Chapter 5: Developing Privacy Requirements Use Cases Chapter 6: A Privacy Engineering Life Cycle Methodology Chapter 7: The Privacy Component App Chapter 8: A Runner’s App Chapter 9: Privacy Engineering Methodology Using Vacation Planner Chapter 10: Privacy Engineering Quality Assurance and Privacy Impact Assessment Part 3 - Organizing for the Privacy Information Age Chapter 11: Engineering Your Organization to Be Privacy Ready Chapter 12: Organizational Design and Alignment Part 4 - Where Do We Go from Here? Chapter 13: Data Asset or Liability Value and Metrics Chapter 14: A Vision for the Future: The Privacy Engineer's Manifesto Chapter 15: Appendix A - Use Case Metadata

Stir It Up

Titre : Stir It Up
Auteur : Rinku Sen
Éditeur : John Wiley & Sons
ISBN-13 : 0787971405
Libération : 2003-08-16

Télécharger Lire en ligne

Stir It Up--written by renowned activist and trainer Rinku Sen--identifies the key priorities and strategies that can help advance the mission of any social change group. This groundbreaking book addresses the unique challenges and opportunities the new global economy poses for activist groups and provides concrete guidance for community organizations of all orientations. Sponsored by the Ms. Foundation, Stir It Up draws on lessons learned from Sen's groundbreaking work with women's groups organizing for economic justice. Throughout the book, Sen walks readers through the steps of building and mobilizing a constituency and implementing key strategies that can effect social change. The book is filled with illustrative case studies that highlight best organizing practices in action and each chapter contains tools that can help groups tailor Sen's model for their own organizational needs. Stir It Up will show your organization how to: Design and conduct actions that further campaign goals Develop effective leaders Build strong alliances and networks Generate and use solid research Design an effective media strategy Put in place a plan for internal political education and consciousness-raising With the information, tools, and suggestions outlined in this book your organization can use your "good idea" to change the world.

Source Code China

Titre : Source Code China
Auteur : Cyrill Eltschinger
Éditeur : John Wiley & Sons
ISBN-13 : 0470195436
Libération : 2008-01-02

Télécharger Lire en ligne

"The next five years will be [...] a period of opportunity for China to speed up the growth of software and information services outsourcing. China will continue to generate strong market demand for the global software industry." -H.E. Bo Xi Lai Minister, China Central Ministry of Commerce (MOFCOM) Praise for Source Code China The New Global Hub of IT Outsourcing "Cyrill Eltschinger's Source Code China examines the depths of?a remarkable?shift towards a value-added economy.? After reading this book, you'll?see once again how?China is positioning?itself for leadership in this growing area." -William G. Parrett Chief Executive Officer, Deloitte, May 2007 "In his book, Cyrill Eltschinger addresses?an important?perspective: China is not only 'the factory of the world,' it is?also becoming a major technology services hub. For all of us, it is a fascinating experience to participate in this impressive evolution." -Josef M. Mueller Chairman & CEO, Nestle (China) Ltd "Source Code China provides an insightful touch with the reality of how China is reshaping the global market for offshore IT services." -Prof. Dr. Dr. Klaus Wucherer Executive Vice President, SIEMENS "This is a must-read to understand IT outsourcing in China and its impact on the rest of the world." -Dr. Andrew Lai VP/GM, Global Delivery China Center, Hewlett-Packard Company; International Economic Advisor to City Mayor of Chongqing, China; IT Strategy Advisor, City Mayor of Chengdu, China "In his book Source Code China, Mr. Eltschinger provides compelling reasons why any company can benefit from IT outsourcing to China, a country that is rapidly becoming the destination of choice for most enterprises." -Charles Pau Director, Globalization Architecture and Technology, IBM "This book demonstrates China's credentials as the new hub of offshore IT services." -Steve Little Senior Vice President and Chief Information Officer, D.S.I., Schneider Electric "Organizations not sourcing IT services from China are literally missing the boat. Mr. Eltschinger's book takes readers on an intellectual journey explaining how and why China is becoming the premier offshore destination for businesses all over the world. This is a must read for any business executive and I highly recommend you knock this one off your reading list immediately." -David Etzler Chief Executive Officer, OutsourceWorld If you are not in China, you are really not in the game