Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Virtual Sales Handbook: A Hands-on Approach to Engaging Customers
The Virtual Sales Handbook: A Hands-on Approach to Engaging Customers

Learn to engage your B2B customers through effective virtual sales meetings and presentations

The global COVID-19 pandemic has radically changed how business-to-business companies interact with their customers. The traditional face-to-face meeting has quickly become a thing of the past—the virtual customer...

Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Now you can provide users with the same rich experience and functionality on the web that they've become accustomed to on the desktop computer. This book will show you how to take AJAX and Ruby on Rails to the next level by combining numerous cutting-edge technologies in order to develop full-fledged web applications. It explores a number of...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Cleft Lip and Palate: Diagnosis and Management
Cleft Lip and Palate: Diagnosis and Management

The second edition of Cleft Lip and Palate: Perspectives In Management is an unparalleled review of treatment concepts in all areas of cleft involvement presented by an international team of experienced clinicians. This text can never be duplicated since it largely consists of longitudinal facial and palatal growth studies of dental casts,...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Organizational Patterns of Agile Software Development
Organizational Patterns of Agile Software Development
You will find no books on the bookshelf here that tell you how to start up a new discipline. Software has been seeking its own way as a
relatively young discipline for the past 40 years. Every new discipline struggles to find practices suitable to its survival and growth. Sometimes this struggle is incremental. Sometimes disciplines undergo
...
Depth Map and 3D Imaging Applications: Algorithms and Technologies
Depth Map and 3D Imaging Applications: Algorithms and Technologies
This book has three editors, and all of us are involved in image processing and computer vision research. We have contributed to the 3D imaging research, especially in the field of passive optical 3D shape recovery methods. Over the last decade, significant progress had been made in 3D imaging research. As a result, 3D imaging...
Cross-Modal Analysis of Speech, Gestures, Gaze and Facial Expressions: COST Action 2102 International Conference Prague, Czech Republic, October
Cross-Modal Analysis of Speech, Gestures, Gaze and Facial Expressions: COST Action 2102 International Conference Prague, Czech Republic, October

This volume brings together the peer-reviewed contributions of the participants at the COST 2102 International Conference on “Cross-Modal Analysis of Speech, Gestures, Gaze and Facial Expressions” held in Prague, Czech Republic, October 15–18, 2008. The conference was sponsored by COST (European Cooperation in the Field of...

Deploying IPv6 in 3GPP Networks: Evolving Mobile Broadband from 2G to LTE and Beyond
Deploying IPv6 in 3GPP Networks: Evolving Mobile Broadband from 2G to LTE and Beyond

Deploying IPv6 in 3GPP Networks – Evolving Mobile Broadband from 2G to LTE and Beyond 

A practical guide enabling mobile operators to deploy IPv6 with confidence

The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of...

Setting Foundations for the Creation of Public Value in Smart Cities (Public Administration and Information Technology)
Setting Foundations for the Creation of Public Value in Smart Cities (Public Administration and Information Technology)

 This book seeks to contribute to prior research facing the discussion about public value creation in Smart Cities and the role of governments.  In the early 21st century, the rapid transition to a highly urbanized population has made societies and their governments around the world to be meeting unprecedented challenges...

Mac OS X Hacks
Mac OS X Hacks
Mac OS X Hacks reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH,...
unlimited object storage image
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy