Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inquiring Organizations: Moving From Knowledge Management To Wisdom
Inquiring Organizations: Moving From Knowledge Management To Wisdom
Inquiring Organizations: Moving from Knowledge Management to Wisdom assembles into one volume a comprehensive collection of the key current thinking regarding the use of C. West Churchman's Design of Inquiring Systems as a basis for computer-based inquiring systems design and implementation. Inquiring systems are systems that go beyond knowledge...
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility
Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility

Never has ethical business conduct received as much attention and focus as it does at present, in the wake of the far-reaching financial and societal effects of the dramatic collapses that have thundered through Corporate America. Whether your company is private, publicly-held, works with the government – either contractually or through...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Online Communication: Linking Technology, Identity, and Culture
Online Communication: Linking Technology, Identity, and Culture
Online Communication provides an introduction to both the technologies of the Internet Age and their social implications. This innovative and timely textbook brings together current work in communication, political science, philosophy, popular culture, history, economics, and the humanities to present an examination of the theoretical and...
Implementing and Managing eGovernment: An International Text
Implementing and Managing eGovernment: An International Text
Check out the companion website at www.sagepub.co.uk/heeks 

Implementing and Managing eGovernment fills an important gap. It provides comprehensive coverage of the e-government issues faced by managers, consultants and other practitioners.

Richard Heeks draws on international examples to guide readers through...

Art Matters: A Critical Commentary on Heideggers The Origin of the Work of Art (Contributions To Phenomenology)
Art Matters: A Critical Commentary on Heideggers The Origin of the Work of Art (Contributions To Phenomenology)
In recent years there has been a great deal of talk about a possible death of art. As the title of Heidegger’s “The Origin of the Work of Art” suggests, the essay challenges such talk, just as it in turn is challenged by such talk, talk that is supported by the current state of the art-world. It was Hegel, who most profoundly...
Mixed Media: Moral Distinctions in Advertising, Public Relations, and Journalism
Mixed Media: Moral Distinctions in Advertising, Public Relations, and Journalism
Media professionals spend a great deal of time talking about "doing the right thing". Why is it then that the consumers of mass media perennially find so much fault with the "ethics" of the disseminators of news, information, and entertainment? What has led the purveyors of mass communication to believe and act the way they do?...
Understanding Luxury Fashion: From Emotions to Brand Building (Palgrave Advances in Luxury)
Understanding Luxury Fashion: From Emotions to Brand Building (Palgrave Advances in Luxury)

Offering an original contribution to the field of luxury and fashion studies, this edited collection takes a philosophical perspective, addressing the idea that humans need luxury. From this framework it delves deep into two particular dimensions of luxury, emotions and society, and concludes with cases of brand building in order to...

Computer Science Illuminated
Computer Science Illuminated

Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Fully revised and updated, the Sixth Edition of the best-selling text Computer Science
...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Press On: Principles of Interaction Programming
Press On: Principles of Interaction Programming

Interactive systems and devices, from mobile phones to office copiers, do not fulfill their potential for a wide variety of reasons--not all of them technical. Press On shows that we can design better interactive systems and devices if we draw on sound computer science principles. It uses state machines and graph theory as a powerful and...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy