Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Never Apply for a Job Again!: Break the Rules, Cut the Line, Beat the Rest
Never Apply for a Job Again!: Break the Rules, Cut the Line, Beat the Rest

"Never Apply For a Job Again! is what everyone needs to understand how the hidden job market works. Get it and use it before the secrets get out on WikiLeaks."
--Penelope Trunk, the original Brazen Careerist, author, blogger, entrepreneur

"This book is an essential read for insightful, witty, and
...

Process Aware Information Systems: Bridging People and Software Through Process Technology
Process Aware Information Systems: Bridging People and Software Through Process Technology
Process-aware information systems are at the heart of an ongoing “silent revolution.”
From the late 1970s to the early 1990s, the lion’s share of attention in the area
of information systems went to data. The focus was mainly on storing and retrieving
information and, hence, data models were often the starting point
...
Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
Principles of Toxicology Testing
Principles of Toxicology Testing

The evolution of toxicology testing finds its impetus in the continuing growth of the chemical and pharmaceutical industries, as well as the awareness of public health initiatives, needs, and responses that demand faster, more accurate, more economical methods for screening potential toxicity. Concurrent advances in biotechnology enable...

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your...

Model-Driven Software Development: Integrating Quality Assurance (Premier Reference Source)
Model-Driven Software Development: Integrating Quality Assurance (Premier Reference Source)
Model-driven software development (MDSD) drastically alters the software development process, characterized by a high degree of innovation and productivity. However, quality assurance application in the domain of software models and model-driven software development is still in an emergent phase.

Model-Driven Software Development:...

Open Government: Collaboration, Transparency, and Participation in Practice
Open Government: Collaboration, Transparency, and Participation in Practice

In a world where web services can make real-time data accessible to anyone, how can the government leverage this openness to improve its operations and increase citizen participation and awareness? Through a collection of essays and case studies, leading visionaries and practitioners both inside and outside of government share their...

Wireless Sensor Networks for Healthcare Applications
Wireless Sensor Networks for Healthcare Applications

Unlike other books on wireless sensors networks, this unique reference focuses on methods of application, validation and testing based on real deployments of sensor networks in the clinical and home environments. Key topics include healthcare and wireless sensors, sensor network applications, designs of experiments using sensors, data...

Words and Symbols: Language and Communication in Therapy (Core Concepts in Therapy)
Words and Symbols: Language and Communication in Therapy (Core Concepts in Therapy)
This book takes apart, lays out and repositions the most basic of therapeutic tools – the language used to communicate between therapist and client. It begins with a summary of the different schools of thought on language acquisition from infancy onwards. It addresses ways in which philosophical and social contexts may impact on the thoughts...
The Illegal Business of Human Trafficking
The Illegal Business of Human Trafficking

This book offers a brand-new perspective on human trafficking as an illegal business. It also proposes a new form of networked action: combining the perspectives of academic researchers with those of highly skilled professionals involved in policymaking in this area, this book is a unique contribution and a first step toward a networking...

Beyond Red and Blue: How Twelve Political Philosophies Shape American Debates
Beyond Red and Blue: How Twelve Political Philosophies Shape American Debates
On any given night cable TV news will tell us how polarized American politics is: Republicans are from Mars, Democrats are from Canada. But in fact, writes Peter Wenz in Beyond Red and Blue, Americans do not divide neatly into two ideological camps of red/blue, Republican/Democrat, right/left. If they did, what could explain Republicans...
Computational Intelligence: The Experts Speak
Computational Intelligence: The Experts Speak

The definitive survey of computational intelligence from luminaries in the field

Computational intelligence is a fast-moving, multidisciplinary field - the nexus of diverse technical interest areas that include neural networks, fuzzy logic, and evolutionary computation. Keeping up with computational intelligence means understanding...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy