Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Strategies for Knowledge Management Success: Exploring Organizational Efficacy (Premier Reference Source)
Strategies for Knowledge Management Success: Exploring Organizational Efficacy (Premier Reference Source)

Knowledge management captures the right knowledge, to the right user, who in turn uses the knowledge to improve organizational or individual performance to increase effectiveness. Strategies for Knowledge Management Success: Exploring Organizational Efficacy collects and presents key research articles focused on identifying, defining, and...

Statistical Methods, Second Edition
Statistical Methods, Second Edition

This broad text provides a complete overview of most standard statistical methods, including multiple regression, analysis of variance, experimental design, and sampling techniques. Assuming a background of only two years of high school algebra, this book teaches intelligent data analysis and covers the principles of good data collection....

Revolutionary Women: A Book of Stencils
Revolutionary Women: A Book of Stencils

Both a radical feminist history and a street art resource, this handbook combines short biographies with striking and usable stencil images of 30 female activists, anarchists, feminists, freedom fighters, and visionaries. From Harriet Tubman, Emma Goldman, and Angela Davis to Vandana Shiva, Sylvia...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Understanding Luxury Fashion: From Emotions to Brand Building (Palgrave Advances in Luxury)
Understanding Luxury Fashion: From Emotions to Brand Building (Palgrave Advances in Luxury)

Offering an original contribution to the field of luxury and fashion studies, this edited collection takes a philosophical perspective, addressing the idea that humans need luxury. From this framework it delves deep into two particular dimensions of luxury, emotions and society, and concludes with cases of brand building in order to...

Linux Cluster Architecture (Kaleidoscope)
Linux Cluster Architecture (Kaleidoscope)
Cluster computers provide a low-cost alternative to multiprocessor systems for many applications. Building a cluster computer is within the reach of any computer user with solid C programming skills and a knowledge of operating systems, hardware, and networking. This book leads you through the design and assembly of such a system, and shows you how...
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Race, Class, and the Death Penalty: Capital Punishment in American History
Race, Class, and the Death Penalty: Capital Punishment in American History

No scholarly effort is ever conducted without heavy indebtedness to others. This is particularly true of efforts that rest as heavily as this one does upon data collection efforts carried out by others. Our largest debt is, of course, to M. Watt Espy. Without his continuing effort, this study would have been impossible. We are profoundly...

Pro Puppet
Pro Puppet

The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or...

jQuery: Novice to Ninja
jQuery: Novice to Ninja
No matter what kind of ninja you are—a cooking ninja, a corporate lawyer ninja, or an actual ninja ninja—virtuosity lies in first mastering the basic tools of the trade. Once conquered, it’s then up to the full-fledged ninja to apply that knowledge in creative and inventive ways.

...
Advances in Applied Mathematics and Approximation Theory: Contributions from AMAT 2012 (Springer Proceedings in Mathematics & Statistics)
Advances in Applied Mathematics and Approximation Theory: Contributions from AMAT 2012 (Springer Proceedings in Mathematics & Statistics)

Advances in Applied Mathematics and Approximation Theory: Contributions from AMAT 2012 is a collection of the best articles presented at “Applied Mathematics and Approximation Theory 2012,” an international conference held in Ankara, Turkey, May 17-20, 2012. This volume brings together key work from authors in the field...

Computer Science Illuminated
Computer Science Illuminated

Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Fully revised and updated, the Sixth Edition of the best-selling text Computer Science
...

unlimited object storage image
Result Page: 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy