Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

C# 4.0 How-To
C# 4.0 How-To

Real Solutions for C# 4.0 Programmers

 

Need fast, robust, efficient code solutions for Microsoft C# 4.0? This book delivers exactly what you’re looking for. You’ll find more than 200 solutions, best-practice techniques, and tested code samples...

2021 Microsoft Formulas and Functions: A Simplified Guide With Examples on how to take advantage of built-in Excel Formulas and Functions
2021 Microsoft Formulas and Functions: A Simplified Guide With Examples on how to take advantage of built-in Excel Formulas and Functions

You can master the use of over 101 Microsoft Excel Formulas and Functions if you make the decision to purchase this book. 

This guide is what should be called; a one-fit approach to understanding the basis of Excel formulas. This guide is useful especially for business owners, workers, and financial analysts who...

iOS Game Development By Example
iOS Game Development By Example

Learn how to develop an ace game for your iOS device, using Sprite Kit

About This Book

  • Learn about the Sprite Kit engine and create games on the iOS platform from the ground up
  • Acquaint your Sprite Kit knowledge with Swift programming and turn your 2D game conceptualization into reality...
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

The Complete Idiot's Guide to the Science of Everything
The Complete Idiot's Guide to the Science of Everything
Did you ever wonder how somebody ever figured out all the details of making a cellphone system work? What about those giant MRI machines that can take a picture of your insides without a single incision? Then there is the universe. We think we know at least something about how it started billions of years ago and where it’s going billions of...
Foundations of Computing
Foundations of Computing

It may sound surprising that in computing, a field which develops so fast that the future often becomes the past without having been the present, there is nothing more stable and worthwhile learning than its foundations.

It may sound less surprising that in a field with such a revolutionary methodological impact on all sciences and...

Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind
Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind

Business leaders need bold strategies to stay relevant and win. In "Big Think Strategy", Schmitt shows how to bring bold thinking into your business by sourcing big ideas and executing them creatively. With the tools in this book, any leader can overcome institutionalized 'small think' - the inertia, the narrow-mindedness,...

Submarine Mass Movements and their Consequences: 7th International Symposium
Submarine Mass Movements and their Consequences: 7th International Symposium

This book is a comprehensive collection of state-of-the-art studies of seafloor slope instability and their societal implications. The volume captures the most recent and exciting scientific progress made in this research field.

As the world’s climate and energy needs change, the conditions under which slope instability...

Computational Aesthetics (SpringerBriefs in Applied Sciences and Technology)
Computational Aesthetics (SpringerBriefs in Applied Sciences and Technology)
The essence of natural computing is aesthetics; for example, in cooking, one of the most common forms of natural computation, the decision to add salt, and how much, is based on the aesthetics of taste. Because touch perception is instinctively related to a sense of beauty, the aesthetics of tactile sense are considered as algorithms by using...
Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)
Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)

Smashing WordPress Themes is all about making your WordPress site look beautiful. But, the beautiful part is a very personal thing, because we all have different preferences. So in essence, my book isn’t on Web design, but rather about giving you, dear reader, the tools to build the kind of site that you want to create, using WordPress...

Voice Over IPv6: Architectures for Next Generation VoIP Networks
Voice Over IPv6: Architectures for Next Generation VoIP Networks
IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.

IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater
...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy