Home | Amazing | Today | Tags | Publishers | Years | Search 
Principles of Financial Accounting
Principles of Financial Accounting

Needles/Powers/Crosson delivers interactive pedagogy by illustrating accounting principles and real-world examples to encourage critical thinking. This revision is based on an understanding of the nature, culture, and motivations of today's students and on extensive feedback from instructors. These substantial changes meet the needs of...

Financial Accounting (Available Titles CengageNOW)
Financial Accounting (Available Titles CengageNOW)

The eleventh edition of FINANCIAL ACCOUNTING guides students through the what, why and how of accounting in today's business world. This textbook offers a solid presentation of concepts and procedures blended with a wealth of real company examples and solved exercises to ensure student success in the practical application of fundamental...

Moral Intelligence: Enhancing Business Performance and Leadership Success
Moral Intelligence: Enhancing Business Performance and Leadership Success

"The authors offer a timely, important, and practical personal guidance system that anyone in the business world would do well to adopt. The world of business would be vastly improved if Moral Intelligence became required reading.”

Daniel Goleman, Author of...

The Coder's Path to Wealth and Independence
The Coder's Path to Wealth and Independence

Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It’s time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence,...

Stem Cells: From Benchtop to Bedside
Stem Cells: From Benchtop to Bedside

Stem cell biology has gained tremendous interest in the recent years, driven by the hope of finding cures for several diseases through transplantation medicine. Various types of stem cells have been identified from preimplantation embryos, the fetus, placenta and adult. The isolation of human embryonic stem cells has been considered the...

Workplace Safety and Health: Assessing Current Practices and Promoting Change in the Profession (Occupational Safety & Health Guide Series)
Workplace Safety and Health: Assessing Current Practices and Promoting Change in the Profession (Occupational Safety & Health Guide Series)

Are the tried and true safety practices still effective in the changing workplace? Is there a better way of safeguarding employees from accidents and injuries? In short, why do you perform the safety activities that you do on a daily basis and do they produce the results necessary to keep your safety program and your company competitive in...

Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)

The innate immune system represents a critical arm of the immune response by providing immediate and robust host defense; however, human studies of its function are often limited by ethical, logistical, and technical obstacles. In Mouse Models of Innate Immunity: Methods and Protocols, experts in the field explore the design and...

Fundamentals of Tissue Engineering and Regenerative Medicine
Fundamentals of Tissue Engineering and Regenerative Medicine

"Fundamentals of Tissue Engineering and Regenerative Medicine" provides a complete overview of the state of the art in tissue engineering and regenerative medicine. Tissue engineering has grown tremendously during the past decade. Advances in genetic medicine and stem cell technology have significantly improved the potential to...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy