Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Instant GIMP Starter
Instant GIMP Starter

Image manipulation is being used by professionals all over the world. Beautiful pictures can be achieved by combining technology with art. GIMP. the GNU Image Manipulation Program, makes them accessible to everyone. GIMP is. With it, anyone can express their emotional and intellectual capability in a new dimension.

"Instant...

Lead with a Story: A Guide to Crafting Business Narratives That Captivate, Convince, and Inspire
Lead with a Story: A Guide to Crafting Business Narratives That Captivate, Convince, and Inspire

Storytelling has come of age in the business world. Today, many of the most successful companies use storytelling as a leadership tool. At Nike, all senior executives are designated "corporate storytellers." 3M banned bullet points years ago and replaced them with a process of writing "strategic narratives." Procter &...

Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Developing Effective Engineering Leadership (IEE Management of Technology Series, 21)
Developing Effective Engineering Leadership (IEE Management of Technology Series, 21)

Engineering companies and other organizations face many serious challenges in the 21st Century. One that is now becoming widely recognized is the loss of corporate knowledge through staff turnover, whether it is natural or forced through downsizing or de-layering. The company’s store of knowledge and expertise is an asset built up through...

Pragmatic Guide to Subversion (Pragmatic Guides)
Pragmatic Guide to Subversion (Pragmatic Guides)

Subversion sets the standard in version control systems. Championed by open-source developers, Subversion is behind some of today's biggest and most important software, including Apache, FreeBSD, Ruby, and MediaWiki. But more than just a tool for open-source collaboration, Subversion has made a significant impact in the corporate...

Adobe InDesign CS2 @work: Projects You Can Use on the Job
Adobe InDesign CS2 @work: Projects You Can Use on the Job

Adobe InDesign CS2 is a powerful, but complicated, page layout technology. Sure, learning how to use the various tools and techniques is important, but what you really need and want to know is how to put those tools and techniques to use to complete projects at work. That's where Adobe InDesign CS2 @...

Copyediting & Proofreading For Dummies (Language & Literature)
Copyediting & Proofreading For Dummies (Language & Literature)
Turn your knack for language into a lucrative career

Must-know techniques and resources for maximizing your accuracy and speed

Interested in becoming a copyeditor or proofreader? Want to know more about what each job entails? This friendly guide helps you position yourself for success. Polish...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
The Secret Language of Money: How to Make Smarter Financial Decisions and Live a Richer Life
The Secret Language of Money: How to Make Smarter Financial Decisions and Live a Richer Life
If money were about math, none of us would be carrying any debt.

The numbers are simple. What’s complicated is what we do with money. We use money to soothe our feelings and buy respect, to show how much we care or how little. We don’t simply earn, save, and spend money: we flirt with it, crave it,...

Advances In Quantitative Analysis Of Finance And Accounting
Advances In Quantitative Analysis Of Finance And Accounting
Advances in Quantitative Analysis of Finance and Accounting is an annual publication designed to disseminate developments in the quantitative analysis of finance and accounting. The publication is a forum for statistical and quantitative analyses of issues in finance and accounting, as well as applications of quantitative methods to problems in...
unlimited object storage image
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy