Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Selling with Emotional Intelligence
Selling with Emotional Intelligence
In today's ultra-competitive business environment, it's not enough for sales professionals to be adept at technical and tactical skills such as getting appointments, making presentations, and closing deals. To really succeed, they must develop and apply their relational skills-or what is known as emotional intelligence-to help them connect with...
iPhone SDK 3 Programming: Advanced Mobile Development for Apple iPhone and iPod touch
iPhone SDK 3 Programming: Advanced Mobile Development for Apple iPhone and iPod touch

Get the expert guidance you need to begin building native applications for Apple's new iPhone 3G as well as the iPod Touch

Apple's iPhone is the hottest mobile device on the planet. More than one million iPhone 3G phones were sold in the first three days of release and millions more are sure to be in the hands of iPhone fans each year....

Mobile Robot Navigation with Intelligent Infrared Image Interpretation
Mobile Robot Navigation with Intelligent Infrared Image Interpretation

Mobile robots require the ability to make decisions such as "go through the hedges" or "go around the brick wall." Mobile Robot Navigation with Intelligent Infrared Image Interpretation describes in detail an alternative to GPS navigation: a physics-based adaptive Bayesian pattern classification model that uses a...

Cost Management: Accounting and Control, 6th Edition
Cost Management: Accounting and Control, 6th Edition
Over the past twenty years, changes in the business environment have profoundly affected cost accounting and cost management. A few examples of these changes are an increased emphasis on providing value to customers, total quality management, time as a competitive element, advances in information and manufacturing technology,...
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Science and the Written Word: Science, Technology, and Society
Science and the Written Word: Science, Technology, and Society

In order to meet the growing scientific requirements of an increasingly complex society, it is essential for us to have an appreciation of the power and breadth of science. Science and the Written Word is a collection of interviews featuring some of the world's greatest scientists and Nobel Prize winners. The interviews examine topics...

Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
Wireless Positioning Technologies and Applications (Technology and Applications)
Wireless Positioning Technologies and Applications (Technology and Applications)
At last--here's a comprehensive book that puts full details on all short-range wireless-positioning methods at your command for instant access and use. This one-stop resource surveys each technique's theory of operation, advantages and disadvantages, applicability in different domains, implementation procedures, and accuracy to help you select the...
Cognitive Behavioural Therapy For Dummies
Cognitive Behavioural Therapy For Dummies

An updated edition of the bestselling guide on reprogramming one's negative thoughts and behaviour

Once the province of mental health professionals, CBT (or Cognitive Behavioural Therapy) has gained wide acceptance as the treatment of choice for anyone looking to overcome anxiety, lose weight, manage anger, beat an...

Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map
Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map

Understanding your company’s data has never been easier than with Microsoft’s new Power BI package for Excel 2013. Consisting of four powerful tools—Power Pivot, Power View, Power Query and Power Maps—Power BI makes self-service business intelligence a reality for a wide range of users, bridging the traditional gap...

Managing Knowledge Networks
Managing Knowledge Networks

Managing knowledge networks (KN) within organizations has taken on enhanced importance in recent years because of the decline of middle management and other changes in formal organizational structures, the growth of information technologies, and our increasingly competitive global economy. KN can be manifested in a variety of forms: project...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy