Home | Amazing | Today | Tags | Publishers | Years | Search 
Supplier Relationship Management: How to Maximize Vendor Value and Opportunity
Supplier Relationship Management: How to Maximize Vendor Value and Opportunity

There’s a new buzz phrase in the air: Supplier Relationship Management (SRM). Corporate executives know it’s necessary, but there’s only one problem. Nobody yet knows how to do it. Or they think it’s all about bashing your vendors over the head until they reduce the price another 4%. Supplier Relationship...

Introduction to Financial Forecasting in Investment Analysis
Introduction to Financial Forecasting in Investment Analysis

Forecasting—the art and science of predicting future outcomes—has become a crucial skill in business and economic analysis. This volume introduces the reader to the tools, methods, and techniques of forecasting, specifically as they apply to financial and investing decisions. With an emphasis on "earnings per share"...

Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck...

Data Structures & Algorithms in Swift: Implementing practical data structures with Swift 4
Data Structures & Algorithms in Swift: Implementing practical data structures with Swift 4

Learn data structures and algorithms in Swift! Understanding how data structures and algorithms work in code is crucial for creating efficient and scalable apps. Swift’s Standard Library has a small set of general purpose collection types, yet they definitely don’t cover every case! In this book, you’ll learn how to...

User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

An Introduction to Quantum Computing Algorithms
An Introduction to Quantum Computing Algorithms
In 1994 Peter Shor [65] published a factoring algorithm for a quantum computer that finds the prime factors of a composite integer N more efficiently than is possible with the known algorithms for a classical com­ puter. Since the difficulty of the factoring problem is crucial for the se­ curity of a public key encryption system,...
Electrical Machines with MATLAB®
Electrical Machines with MATLAB®

Electrical Machines with MATLAB® encapsulates the invaluable insight and experience that eminent instructor Turan Gönen has acquired in almost 40 years of teaching. With simple, versatile content that separates it from other texts on electrical machines, this book is an ideal self-study tool for advanced...

Seamless R and C++ Integration with Rcpp (Use R!)
Seamless R and C++ Integration with Rcpp (Use R!)
Rcpp is the glue that binds the power and versatility of R with the speed and efficiency of C++.  With Rcpp, the transfer of data between R and C++ is nearly seamless, and high-performance statistical computing is finally accessible to most R users.  Rcpp should be part of every statistician's toolbox.  -- Michael...
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Mastering AutoCAD 2017 and AutoCAD LT 2017
Mastering AutoCAD 2017 and AutoCAD LT 2017
The bestselling guide to AutoCAD, updated and expanded for the AutoCAD 2017 release

Mastering AutoCAD 2017 and AutoCAD LT 2017 is the premier guide to the world's leading CAD program. With clear explanation, focused examples, and step-by-step instruction, this guide walks you through everything you need to...

Data Mining in Proteomics: From Standards to Applications (Methods in Molecular Biology)
Data Mining in Proteomics: From Standards to Applications (Methods in Molecular Biology)

Through the rapid development of proteomics methods and technologies, an enormous amount of data was created, leading to a wide-spread rethinking of strategy design and data interpretation. In Data Mining in Proteomics: From Standards to Applications, experts in the field present these new insights within the proteomics community, taking the...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Result Page: 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy