Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal
The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal

We live in digital time. Our pace is rushed, rapid-fire, and relentless. Facing crushing workloads, we try to cram as much as possible into every day. We're wired up, but we're melting down. Time management is no longer a viable solution. As bestselling authors Jim Loehr and Tony Schwartz demonstrate in this groundbreaking book,...

Trust, Institutions and Managing Entrepreneurial Relationships in Africa: An SME Perspective (Palgrave Studies of Entrepreneurship in Africa)
Trust, Institutions and Managing Entrepreneurial Relationships in Africa: An SME Perspective (Palgrave Studies of Entrepreneurship in Africa)

This book highlights the importance of understanding how trust and indigenous African cultural institutions enhance the development of entrepreneurial networks and relationships in Africa. Drawing on institutional theories, the author re-examines the way that entrepreneurial behaviour can be shaped, with a focus on trust, networks...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Molecular Electronics: Commercial Insights, Chemistry, Devices, Architecture and Programming
Molecular Electronics: Commercial Insights, Chemistry, Devices, Architecture and Programming

This book presents an in-depth discussion on molecular electronics in an easy-to-understand manner, aiming at chemists, computer scientists, surface scientists, physicists, and applied mathematicians. Lighter overviews are provided for the science-minded layperson and the high tech entrepreneur in this nanoscale science. The author has...

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
A Handbook of Management Techniques: A Comprehensive Guide to Achieving Managerial Excellence and Improved Decision Making
A Handbook of Management Techniques: A Comprehensive Guide to Achieving Managerial Excellence and Improved Decision Making
Guide to modern techniques in all fields of management; ideal companion for professional managers, as well as an essential reference book for business and management students. Includes over 100 systematic and analytical methods used to assist in decision-making and to improve efficiency and effectiveness.

Management...
IT Project Portfolio Management
IT Project Portfolio Management
While consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors...
Macromedia FreeHand MX: Training from the Source
Macromedia FreeHand MX: Training from the Source
When faced with a design problem, it shouldn't be because you don't know how to use the design software. If you're learning Macromedia FreeHand MX for the first time, you can rely on Macromedia FreeHand MX: Training from the Sourcefor a thorough ground-up education that you can tackle at your own pace. This popular series from Macromedia Press...
Common Warehouse Metamodel Developer's Guide
Common Warehouse Metamodel Developer's Guide
The official guide on how to develop interoperable data warehouse and business intelligence applications from the authors of the CWM specification

This authoritative guide will show you how to develop interoperable data warehouse and business intelligence applications using the Common Warehouse Metamodel (CWM) specification. It provides you...

VoiceXML: 10 Projects to Voice Enable Your Web Site
VoiceXML: 10 Projects to Voice Enable Your Web Site

Build 10 ready-to-use VoiceXML applications!

Following an introduction to VoiceXML and a review of how to set up your work environment, Mark Miller guides you through the steps to building ten complete programs that utilize VoiceXML and related technologies to create fully functional solutions. Each project begins with a clear...

unlimited object storage image
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy