Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
The failure to adequately address the victims and the emotional dimensions of corporate problems changes adverse events into crises and catastrophes. This book aims to arm employees and managers with the tools necessary to manage emotional distress.

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line is an...

Podcasting For Dummies
Podcasting For Dummies

Got something to say? It's easy with a podcast!

Subscribe to podcasts, put together your own, and build a fan base

Podcasting really is twenty-first century communication, and you can be a part of it! This book gives you the scoop on listening to, producing, and distributing podcasts, points you toward the best...

Technological Turf Wars: A Case Study of the Antivirus Industry
Technological Turf Wars: A Case Study of the Antivirus Industry

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that...

Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

Handbook on Information Technology in Finance (International Handbooks on Information Systems)
Handbook on Information Technology in Finance (International Handbooks on Information Systems)
This Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary research in the intersection between IT and finance. Included are recent trends and challenges, IT systems and architectures in finance, essential developments and case studies on management information systems, service...
eMarketing eXcellence, Third Edition: Planning and optimising your digital marketing (Emarketing Essentials)
eMarketing eXcellence, Third Edition: Planning and optimising your digital marketing (Emarketing Essentials)

E-marketing impacts all aspects of marketing from strategy and planning through the marketing mix, marketing communications and buyer behaviour to marketing research. eMarketing eXcellence highlights the most significant opportunities, pitfalls and defines the new marketing approaches needed. It highlights best practice in applying digital...

The Definitive Guide to Interwoven TeamSite (Definitive Guides)
The Definitive Guide to Interwoven TeamSite (Definitive Guides)

Adigital flood is upon us. Content inundates us. It begins as bits of content swirling everywhere—a document, an image, a written corporate procedure, a web page, or an email. The binary mist mixes, combines, and rains down on us. It pools in laptops, on desktops, and in server farms. Creeks and streams meander to corporate reservoirs....

Applied Corporate Finance: Questions, Problems and Making Decisions in the Real World
Applied Corporate Finance: Questions, Problems and Making Decisions in the Real World

Applied Corporate Finance fills a gap in the existing resources available to students and professionals needing an academically rigorous, yet practically orientated, source of knowledge about corporate finance. Written by an expert in investment analysis, this textbook leads readers to truly understand the principles behind corporate...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Herding Chickens: Innovative Techniques for Project Management
Herding Chickens: Innovative Techniques for Project Management
Get The Straight Scoop On Project Management—Ingenious Strategies That Work!

Have you studied the traditional processes of project management, only to discover that in reality they fall short? Are you done with the idealistic theories of how things should function and eager to apply
...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Adobe Photoshop Elements 6 Maximum Performance: Unleash the hidden performance of Elements
Adobe Photoshop Elements 6 Maximum Performance: Unleash the hidden performance of Elements
Unleash the hidden potential for professional image editing in Adobe® Photoshop® Elements with this project-based, real-world guide.

Using step-by-step instructions and accompanying movie tutorials, Mark Galer leads you through the less well-known and most powerful post-production editing techniques Adobe® Photoshop®
...
unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy