Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Twitterville: How Businesses Can Thrive in the New Global Neighborhoods
Twitterville: How Businesses Can Thrive in the New Global Neighborhoods

Twitter is the most rapidly adopted communication tool in history, going from zero to ten million users in just over two years. On Twitter, word can spread faster than wildfire. Companies no longer have the option of ignoring the conversation.

Unlike other hot social media spaces, Twitterville is dominated by professionals,
...

Five Stars: Putting Online Reviews to Work for Your Business
Five Stars: Putting Online Reviews to Work for Your Business

Create positive visibility for your business with this essential roadmap

Everyone now understands the importance of online reviews on sites such as Yelp. This unique book helps you influence the process and leverage the results to increase sales and revenue. Five Stars is the perfect guide to a timely and crucial...

Managerial Leadership
Managerial Leadership
I remember talking in 1995 with Bob Staton, CEO of Colonial Life & Accident Insurance Company, a division of UNUM, about the lack of leadership throughout the company. Colonial was one of the few large, homegrown companies in Columbia, South Carolina, when it was acquired by UNUM, the Maine-based disability insurance...
.NET Multithreading
.NET Multithreading
With an understanding of the .NET framework, stable and robust multithreaded applications can be developed with minimal effort. Covering the topics related to multithreaded development, this book not only focuses on how a task is performed but also on the more important question of why these tasks are performed. The strengths and weaknesses of each...
Smart Is the New Rich: If You Can't Afford It, Put It Down
Smart Is the New Rich: If You Can't Afford It, Put It Down

A practical way to think about money today

Author and CNN veteran money correspondent Christine Romans believes we should live by three qualifiers: living within our means, living with less debt, and being less vulnerable. While some may say this is old-fashioned, today it's hard to argue with Romans' view.

...

Usability of Complex Information Systems: Evaluation of User Interaction
Usability of Complex Information Systems: Evaluation of User Interaction

Why do enterprise systems have complicated search pages, when Google has a single search box that works better? Why struggle with an expense reimbursement system that is not as easy as home accounting software? Although this seems like comparing apples to oranges, as information and communication technologies increasingly reach into every...

Professional Plone 4 Development
Professional Plone 4 Development

I suspect Martin plied me to write this foreword while out one evening during the 2010 Plone Conference in Bristol. Full from an excellent dinner and even better conversation, beer in hand, who could say no?

I've long envied Martin's ability to write. Text and code flow from his fingers at a rate that I can't even begin...

Expert CAD Management: The Complete Guide
Expert CAD Management: The Complete Guide
You probably started out as a practicing architect, an electrical engineer, or an industrial designer and somehow found yourself in a CAD management position. You may be struggling with dual questions: “How did I get here?” and “What do I do now?” These are reasonable questions and not uncommon for those who find themselves...
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Empirically Engaged Evolutionary Ethics (Synthese Library, 437)
Empirically Engaged Evolutionary Ethics (Synthese Library, 437)

A growing body of evidence from the sciences suggests that our moral beliefs have an evolutionary basis. To explain how human morality evolved, some philosophers have called for the study of morality to be naturalized, i.e., to explain it in terms of natural causes by looking at its historical and biological origins. The present...

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy