|
|
|
|
Managing Change (4th Edition)
Aimed at students of change management, strategy and organisational change as part of undergraduate, MBA and MA programmes. Thoroughly revised and updated to reflect modern research, this edition explores the concept and practice of change within the broader context of the history, literature and theories of management. The main approaches on... | | Mastering Object-oriented Python
For those who know the basics of object-oriented Python this book is a must-have. With 750 code samples and a relaxed tutorial approach, it’s the seamless route to more sophisticated programming.
Overview
-
Create applications with flexible logging, powerful configuration and command-line options,...
| | Learning Bing Maps API
Bing Maps are a great resource and very versatile when you know how. And this book will show you how, covering everything from embedding on a web page to customizing with your own styles and geo-data.
Overview
-
Display address information for any point on the map through the location-based REST services...
|
|
Learning SAP Analytics Cloud
Key Features
-
Predict new opportunities and risks in a few mouse clicks
-
Eliminate complexity with tools that let you plan, analyze, and collaborate in context—in real time
-
Discover, visualize, plan, and predict in a single product with agile BI tools
Book... | | | | |
|
|
Telecommunications and Networks (Computer Weekly)Telecommunications is an old and stable technology if you think only of telephones and telegraph. But in the 1960s came computers and the processing of data. Soon, we needed data communications to transmit data to remote PCs connected by networks. Later, these points of communications increased in number, with the transmission being no longer... | | Terrorism Informatics: Knowledge Management and Data Mining for Homeland SecurityTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... | | |
|
|
Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 |