Home | Amazing | Today | Tags | Publishers | Years | Search 
Strategic Employee Communication: Building a Culture of Engagement
Strategic Employee Communication: Building a Culture of Engagement

Employee engagement (or a lack thereof) can often be linked to poor communication and a detachment from company goals. Companies of all sizes are looking for ways to boost communication, recognizing its impact on key business outcomes, such as productivity and profitability.

This book offers fresh insights about...

Bioenergy for Sustainability and Security
Bioenergy for Sustainability and Security

This book discusses the generation of green energy, providing fundamental scientific information on the availability of sustainable biological resources. It addresses inter- and multidisciplinary topics, including policies and strategies for sustainable energy; the environment and advanced renewable energy technology; electricity...

Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
Azure Arc-Enabled Data Services Revealed: Early First Edition Based on Public Preview
For many years, major software companies like Microsoft and Oracle made previously unfathomable profits by selling enterprise software that companies would buy and operate in their own data centers. In the last 20 years, we have seen a gradual transition to a wide variety of software and services models – SaaS, IaaS, PaaS...
Financial Accounting For Dummies, 2nd Edition
Financial Accounting For Dummies, 2nd Edition

Learn to speak fluent finance—and ace your exams!  

Warren Buffett said that “accounting is the language of business.’’ And for many accounting and business students, the obscure terminology of accounting...

Doing Business in Africa: From Economic Growth to Societal Development (Palgrave Studies of Internationalization in Emerging Markets)
Doing Business in Africa: From Economic Growth to Societal Development (Palgrave Studies of Internationalization in Emerging Markets)

This book presents insights from cutting-edge international business and management research relating to Africa. Economic growth and foreign investment in the region remains strong, despite some slowing down in recent years. This trend of economic growth and its impact on international trade and FDI has attracted Western businesses,...

The New Accounts Payable Toolkit (Wiley Corporate F&A)
The New Accounts Payable Toolkit (Wiley Corporate F&A)
THE NEW ACCOUNTS PAYABLE TOOLKIT

In The New Accounts Payable Toolkit, accomplished entrepreneur, consultant, and finance expert Christine H. Doxey delivers a unique and powerful approach to the accounts payable process and discusses the impact of the automation of the Procure to Pay (P2P) process. The toolkit explores...

Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity

Are you looking for the right Guide to improve your technical skills in programming and cybersecurity?

Would you like to start your own business or look for a job with better knowledge in computer programming and data protection?

Would you like to be sure to have in your hands a manual...

Big Breaches: Cybersecurity Lessons for Everyone
Big Breaches: Cybersecurity Lessons for Everyone
Neil and Moudy have written a book that will help us reduce our exposure as a society to future “big breaches” but also to many of the technology risks we face in an increasingly digitized society. They do this not by presenting a “recipe” for success but by making the subject accessible to audiences who...
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Case Studies on Social Marketing: A Global Perspective (Management for Professionals)
Case Studies on Social Marketing: A Global Perspective (Management for Professionals)
Social marketing has become an indispensable tool for all types of organizations worldwide. This book presents high-quality cases on the development, implementation, and analysis of different social marketing campaigns that have been created by non-governmental organizations, public administrations, and even businesses. The respective...
The Making of a Democratic Economy: How to Build Prosperity for the Many, Not the Few
The Making of a Democratic Economy: How to Build Prosperity for the Many, Not the Few
Our economy is designed by the 1 percent, for the 1 percent. This book offers a compelling vision of an equitable, ecologically sustainable alternative that meets the essential needs of all people.

We live in a world where twenty-six billionaires own as much wealth as half the planet's population. The extractive
...
Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy