Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Book: A Futurist's Manifesto: A Collection of Essays from the Bleeding Edge of Publishing
Book: A Futurist's Manifesto: A Collection of Essays from the Bleeding Edge of Publishing

The ground beneath the book publishing industry dramatically shifted in 2007, the year the Kindle and the iPhone debuted. Widespread consumer demand for these and other devices has brought the pace of digital change in book publishing from "it might happen sometime" to "it’s happening right now"—and it...

Microeconomics (7th Edition)
Microeconomics (7th Edition)

KEY BENEFIT: This book is well known for its coverage of modern topics (Game theory, Economics of Information, and Behavioral Economics), clarity of its writing style and graphs, and integrated use of real world examples.

KEY TOPICS: The emphasis on relevance and application to...

AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

Learning SQL on SQL Server 2005
Learning SQL on SQL Server 2005

Anyone who interacts with today's modern databases needs to know SQL (Structured Query Language), the standard language for generating, manipulating, and retrieving database information. In recent years, the dramatic rise in the popularity of relational databases and multi-user databases has fueled a healthy demand for...

Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series)
Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series)
Information extraction regards the processes of structuring and combining content that is explicitly stated or implied in one or multiple unstructured information sources. It involves a semantic classification and linking of certain pieces of information and is considered as a light form of content understanding by the machine. Currently, there is...
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Risk-Pooling Essentials: Reducing Demand and Lead Time Uncertainty (SpringerBriefs in Business)
Risk-Pooling Essentials: Reducing Demand and Lead Time Uncertainty (SpringerBriefs in Business)

This book provides comprehensive and concise definitions of risk pooling and risk-pooling methods, a straightforward statistical explanation, and a value-chain oriented framework for analyzing risk-pooling methods. Risk pooling mitigates demand and lead time uncertainty in logistics and supply chain...

The Handbook of Information Systems Research
The Handbook of Information Systems Research
This book provides a fresh perspective on issues related to IS research by providing chapters from world-renowned leaders in IS research along with chapters from relative newcomers who bring some interesting and often new perspectives to IS research.

The field of information systems research is undergoing subtle changes as it seeks to...

Who Put the Butter in Butterfly?: And Other Fearless Investigations into Our Illogical Language
Who Put the Butter in Butterfly?: And Other Fearless Investigations into Our Illogical Language

When I wrote Imponderables™, I purposely omitted any questions about the origins of words and phrases. An Imponderable was a mystery that couldn’t be answered by standard reference books, and so many wonderful books about words already existed that I couldn’t believe there was a need for more.

As someone who uses...

The McGraw-Hill 36-Hour Course: Project Management, Second Edition
The McGraw-Hill 36-Hour Course: Project Management, Second Edition

Schedule and coordinate projects seamlessly, start to finish!

In today's ultracompetitive world of business, those in charge want results on time and on budget--and they're turning to project managers to deliver. Skilled project managers are in high demand, and the profession is growing at an unprecedented rate.

...

CEH: Certified Ethical Hacker Version 8 Study Guide
CEH: Certified Ethical Hacker Version 8 Study Guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...

unlimited object storage image
Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy