Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Breakthrough Business Negotiation: A Toolbox for Managers
Breakthrough Business Negotiation: A Toolbox for Managers

Although there are many how-to books on negotiating, they provide little useful guidance on how to conduct complex realworld negotiations. Advice on conducting two-party negotiations about a modest number of issues isn’t hard to come by, but few negotiations are that simple. While dealing with the other side, negotiators typically also...

Developing RESTful Web Services with Jersey 2.0
Developing RESTful Web Services with Jersey 2.0

Learn how to design and implement a test automation framework block by block

Overview

  • A simple and easy demonstration of the important concepts will enable you to translate abstract ideas into practice
  • Each chapter begins with an outline and a brief statement of content to help the reader...
SFML Game Development by Example
SFML Game Development by Example

Create and develop exciting games from start to finish using SFML

About This Book

  • Familiarize yourself with the SFML library and explore additional game development techniques
  • Craft, shape, and improve your games with SFML and common game design elements
  • A practical guide...
Mathematical Models of Spoken Language
Mathematical Models of Spoken Language
Humans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,...
How to Program Visual Basic 5.0: Control Creation Edition
How to Program Visual Basic 5.0: Control Creation Edition
A world in which every piece of software has the ability to interact with every other piece of software ain't gonna happen anytime soon. But you can always dream. I personally hope to someday put a software chip in a small house pet-a cat, perhaps-and control it through the use of Visual Basic properties and methods.

But perhaps I'm
...
Modelling Distributed Systems (Texts in Theoretical Computer Science. An EATCS Series)
Modelling Distributed Systems (Texts in Theoretical Computer Science. An EATCS Series)
A distributed system is driven by separate components that are executed in parallel, and protocols for such systems form a major aspect of system design in todays world of wireless and mobile networking. Process algebras are languages for the description of elementary parallel systems and are used to study the behavioural properties of distributed...
XML Schema Essentials
XML Schema Essentials
The definitive how-to guide that will get you quickly up to speed on the practical application of XML Schema!

Replacing XML DTDs (Document Type Definitions) as the way in which XML documents are described and validated, XML Schema allows you to describe the structure of information in an XML document and is essential for ensuring
...
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.

As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration...

The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance
The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance
SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005, because it brings increased ability to deliver data across more platforms, and thus many different types of devices. New functionality also...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Measurement and Instrumentation: Theory and Application
Measurement and Instrumentation: Theory and Application

Measurement and Instrumentation introduces undergraduate engineering students to the measurement principles and the range of sensors and instruments that are used for measuring physical variables. Based on Morris's Measurement and Instrumentation Principles, this brand new text has been fully updated with coverage of...

unlimited object storage image
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy