 |
|
 Management &Organisational Behaviour (7th Edition)
Helps students of today become effective managers of tomorrow by truly understanding organisational behaviour.
For undergraduate and graduate courses in Organisational Behaviour and Management.
Taking a managerial approach and demonstrating the application of behavioural science within the workplace, this text... |  |  Corporate Accounting Information Systems
We live in a world dominated almost exclusively by flows of knowledge and information - by technologies designed to not only sustain but also increase the socio-economic need and desire for more and more information. This book offers a unique insight into the nature, role and context of accounting related information within the... |  |  |
|
|
 Dictionary of DNA and Genome Technology
DNA technology is evolving rapidly, with new methods and a fast-growing vocabulary. This unique dictionary offers current, detailed and accessible information on DNA technology to lecturers, researchers and students throughout the biomedical and related sciences.
The third edition is a major update, with over 3000 references from... |  |  Interventions for Autism Spectrum Disorders: Translating Science into Practice
Children are being diagnosed with autism spectrum disorders at a staggering rate—as many as one in 110, according to some studies. To this sobering statistic add the familiar figures of the toddler disengaged from his peers, the middle schooler shunned in the lunchroom, and the adult struggling with social cues on the job, and... |  |  Learning Metasploit Exploitation and Development
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security... |
|
 Auditing Cloud Computing: A Security and Privacy Guide
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just... |  |  Fiber Reinforced Polymer (FRP) Composites for Infrastructure Applications
This book was made possible by the exceptional support provided by the US Army
Engineer Research and Development Center (ERDC), Construction Engineering
Research Laboratory (CERL), and University of the Pacific School of Engineering
and Computer Science.
The authors, as listed in this book, took the time to prepare... |  |  Test Equating, Scaling, and Linking: Methods and Practices
This book provides an introduction to test equating, scaling and linking, including those concepts and practical issues that are critical for developers and all other testing professionals. In addition to statistical procedures, successful equating, scaling and linking involves many aspects of testing, including procedures to develop tests,... |
|
| Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |