Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines
Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines
A penetrating guide to artificial intelligence: what it is, what it does, and how it will change our lives

At a breathtaking pace, artificial intelligence is getting better and faster at making complex decisions. AI can already identify malignant tumors on CT scans, give legal advice, out-bluff the best
...
The Coaching Secret: How to be an exceptional coach
The Coaching Secret: How to be an exceptional coach

Coaching as a field has mushroomed in recent years. Thousands of new coaches enter the field after only completing short and superficial training programmes. The problem with this is that coaching is not i) something you can simply learn in a short programme ii) a superficial practice.

The books available on coaching tend to just...

Database Nation (Hardback)
Database Nation (Hardback)
Forget the common cold for a moment. Instead, consider the rise of "false data syndrome," a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like "data shadow" and "datasphere" in Database Nation, offering a...
ISO 9001: 2000 for Software and Systems Providers:  An Engineering Approach
ISO 9001: 2000 for Software and Systems Providers: An Engineering Approach
This volume incorporates more than a decade of experience with ISO 9001, a standard created by committees of volunteers working under the aegis of the International Organization for Standardization (ISO). This volume is intended for individuals who are responsible for using ISO 9001 to implement or revitalize systematic process improvement in...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Legal Strategies: How Corporations Use Law to Improve Performance
Legal Strategies: How Corporations Use Law to Improve Performance

Far from regarding the law as supreme, corporations approach law as an element of executive thought and action aimed at optimizing competitiveness.

The objective of this book is to identify, explore and define corporate legal strategies that seek advantage in the opportunities revealed when the Law is perceived as a resource to be...

Understanding Telephone Electronics, Fourth Edition (Newnes)
Understanding Telephone Electronics, Fourth Edition (Newnes)
Covers conventional telephone fundamentals! Explores how telephone systems operate and how digital electronics replace them. "Introduces state-of-the-art speech circuits, dialing, ringing, and central office electronics. Dissects modems and digital transmission techniques. Studies microcomputers and cellular phones. Helps readers increase...
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility
Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility

Never has ethical business conduct received as much attention and focus as it does at present, in the wake of the far-reaching financial and societal effects of the dramatic collapses that have thundered through Corporate America. Whether your company is private, publicly-held, works with the government – either contractually or through...

Engaged Knowledge Management: Engagement with New Realities
Engaged Knowledge Management: Engagement with New Realities
"Exactly what's needed to breathe new life into a field now dying for lack of a practical, results-oriented perspective. Desouza and Awazu show us how to capture the essence of good management - knowledge - while actively engaged in the nitty-gritty of complex organizations. You will be engaged by this book."
--William E.
...
The End of Software: Transforming Your Business for the On Demand Future
The End of Software: Transforming Your Business for the On Demand Future
Twenty-five years ago, the high-tech business was small, computers were largely relegated to accounting, and the money major corporations spent on information technology barely made a dent in their overall budgets. Today that has all changed. High-tech businesses are some of the largest in the world. The Dow Jones Industrial Average includes four...
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy