Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Strategy Gap: Leveraging Technology to Execute Winning Strategies
The Strategy Gap: Leveraging Technology to Execute Winning Strategies

Praise for The Strategy Gap

"With a better handle on the financial pulse of the business, enterprises will be better able to meet the Street’s expectations of financial transparency and corporate accountability. The writers do a masterful job of getting readers to this point of awareness, and further display their insight...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

The Value Factor: How Global Leaders Use Information for Growth and Competitive Advantage
The Value Factor: How Global Leaders Use Information for Growth and Competitive Advantage

Capitalizing on the information a company owns about its customers, suppliers and partners is now the value proposition for sustainable long-term growth. Authors Mark Hurd and Lars Nyberg go inside companies to see the value proposition in practice. Combining case studies and analysts’ insights with common sense and surprisingly simple...

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Mike Meyers' Comptia RFID+ Certification Passport
Mike Meyers' Comptia RFID+ Certification Passport
From the #1 Name in Professional Certification

Get on the fast track to becoming CompTIA RFID+ certified with this affordable, portable study tool. Inside, RFID experts guide you on your career path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA...

Enterprise-Wide Change: Superior Results Through Systems Thinking (Jossey-Bass Series)
Enterprise-Wide Change: Superior Results Through Systems Thinking (Jossey-Bass Series)

Leave piecemeal strategic change approaches behind and learn how to plan, facilitate, and integrate your change efforts for lasting success. Enterprise-Wide Change takes you through the "Rollercoaster of Change," showing you how to deal with resistance, regard skeptics as your best friends, and build a buy-in and stay-in strategy among...

Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives is a fundamental breakthrough in the business and technology perspectives of service oriented architecture (SOA). A valuable resource to help you understand and realize the benefits of SOA in today's companies, this guide will show you how to plan, implement, and achieve SOA value....
Handbook of Research on Green ICT: Technology, Business and Social Perspectives (2 vol)
Handbook of Research on Green ICT: Technology, Business and Social Perspectives (2 vol)

The Handbook of Research on Green ICT: Technology, Business and Social Perspectives is the outcome of various debates, discussions, investigations and actions into a vital topic of today – Information and Communications Technology (ICT) -based business activities and the environment. This handbook draws on thoughts, insights,...

The Power of Real-Time Social Media Marketing: How to Attract and Retain Customers and Grow the Bottom Line in the Globally Connected World
The Power of Real-Time Social Media Marketing: How to Attract and Retain Customers and Grow the Bottom Line in the Globally Connected World

Today's Hottest Trends for On-the-Spot Marketing!

"A must read for media and marketers.”
—Alan Cohen, CEO, OMD USA

"What do fish tacos, data storage, and disaster relief all have in common? Each has harnessed the power of marketing that amplifies via the real-time social web....

The Orange Code: How ING Direct Succeeded by Being a Rebel with a Cause
The Orange Code: How ING Direct Succeeded by Being a Rebel with a Cause

How championing consumers led to ING Direct's revolutionary rise in the banking industry In an industry dominated by big banks with little patience for their customers, ING Direct has always strived to be different-a rebel with a cause, if you will-and in doing so, they've become the most successful online banking venture in history....

How to Speak Tech: The Non-Techie's Guide to Technology Basics in Business
How to Speak Tech: The Non-Techie's Guide to Technology Basics in Business

"A great book everyone can use to understand how tech startups work." --Rene Reinsberg, GM/VP at GoDaddy, CEO and Co-founder at Locu

"Finally a book non-techies can use to understand the web technologies that are changing our
...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy