What people are saying - Write a review
We haven't found any reviews in the usual places.
Online and Remote Computer Access
Information System Security and Privacy
7 other sections not shown
Other editions - View all
alternatives Analytic Hierarchy Process applications artificial intelligence backup backward chaining behavior BITNET chance node communication complex computer security Computer-Aided Software Engineering cost customers database decision node decision problem decomposition defined details QUIT display rule electronic mail emerging Enter the number environment evaluation example expert system factors feedback Figure files forecast functions Gantt chart global networks goal hardware help Ctrl-U impact implementation important individual influence diagrams information resources information systems information technologies integrated interactive Internet knowledge maintenance matrix management ment methodologies motivation neural network operating organization organizational performance person phase priorities problem project management protocol prototyping QUIT to save requirements response risk robots save data H serve and volleyer server software development Software Engineering solution specific Step strategy structure system development systems analysis task TCP/IP technical techniques threats tion understanding Yourdon