Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
The failure to adequately address the victims and the emotional dimensions of corporate problems changes adverse events into crises and catastrophes. This book aims to arm employees and managers with the tools necessary to manage emotional distress.

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line is an...

FiWi Access Networks
FiWi Access Networks

The evolution of broadband access networks toward bimodal fiber-wireless (FiWi) access networks, described in this book, may be viewed as the endgame of broadband access. After discussing the economic impact of broadband access and current worldwide deployment statistics, all the major legacy wireline and wireless broadband access...

Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions
Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions

The American Nurses Association (ANA) Social Policy Statement of 1980 was the first to define nursing as the diagnosis and treatment of human responses to actual and potential health problems. This definition, when combined with the ANA Standards of Practice, has provided impetus and support for the use of nursing diagnosis. Defining nursing...

Citrix XenApp Platinum Edition for Windows: The Official Guide
Citrix XenApp Platinum Edition for Windows: The Official Guide

The Authorized Guide to Citrix XenApp Platinum Edition for Windows

Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs...

Systematics as Cyberscience: Computers, Change, and  Continuity in Science (Inside Technology)
Systematics as Cyberscience: Computers, Change, and Continuity in Science (Inside Technology)
The use of information and communication technology in scientific research has been hailed as the means to a new larger-scale, more efficient, and cost-effective science. But although scientists increasingly use computers in their work and institutions have made massive investments in technology, we still have little idea how computing affects the...
Microsoft SQL Server 2008 Management and Administration
Microsoft SQL Server 2008 Management and Administration

SQL Server 2008 is Microsoft’s latest data platform providing data management and analytical solutions for the enterprise. The platform is trusted, ensures business continuity, and is more predictable and more scalable than ever before. Although similar to SQL Server 2005, SQL Server 2008 offers a tremendous number of new features and...

The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam
The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam
The first commercially available book to offer CISA study material

The CISA certification is a prerequisite for many audit and security job postings in the marketplace today. Becom-ing certified takes years of experience and exposure to information systems and risk and control techniques. In this book, John Kramer refers to his own experiences...

Network Security: A Practical Guide (Computer Weekly Professional)
Network Security: A Practical Guide (Computer Weekly Professional)
Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from
both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those
...
Systems Programming: Designing and Developing Distributed Applications
Systems Programming: Designing and Developing Distributed Applications

Systems Programming: Designing and Developing Distributed Applications explains how the development of distributed applications depends on a foundational understanding of the relationship among operating systems, networking, distributed systems, and programming. Uniquely organized around four viewpoints (process, communication,...

CISA Certified Information Systems Auditor All-in-One Exam Guide
CISA Certified Information Systems Auditor All-in-One Exam Guide

"All-in-One is All You Need."

CISA Certified Information Systems Auditor All in One Exam Guide

Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this...

VCP4 Exam Cram: VMware Certified Professional (2nd Edition)
VCP4 Exam Cram: VMware Certified Professional (2nd Edition)

Virtualization is one of the hottest topics in the tech industry today. The leader in the virtualization space at the present time is without a doubt VMware with its virtual infrastructure offering. As VMware software began to take its place in the data center and demand respect in the industry, the need for a...

Business Continuity Planning and HIPAA: Business Continuity Management in the Health Care Environment
Business Continuity Planning and HIPAA: Business Continuity Management in the Health Care Environment
This book includes the precautions and procedures that address the concerns of HIPAA, but presents them along with other business components in order to emphasize the need for a holistic approach when constructing and maintaining a business plan.

This book examines business continuity planning as adapted to encompass the requirements of...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy