Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Definitive Guide to SQLite (Expert's Voice in Open Source)
The Definitive Guide to SQLite (Expert's Voice in Open Source)

The Definitive Guide to SQLite, Second Edition is your one-stop resource for integrating one of the most advanced and innovative open source database management systems into your development projects. SQLite is freely-available and comes with an amazingly small foot print of less than 300 kilobytes for a full-blown implementation....

Ransomware: Defending Against Digital Extortion
Ransomware: Defending Against Digital Extortion

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the...

Resumes For Dummies
Resumes For Dummies

Write a winning resume and land that job interview!

Is your job search stalling out after you submit a resume but before you're offered an interview? With a recession that has caused a 10% unemployment rate affecting 15.3 million Americans, having a winning resume is vital to securing an interview-and it demands a fresh look at...

Osteoarthritis: Diagnosis and Medical / Surgical Management
Osteoarthritis: Diagnosis and Medical / Surgical Management
Written by the foremost experts, this text is a comprehensive clinical reference on osteoarthritis. Chapters review current information on the epidemiology, etiopathogenesis, and pathology of osteoarthritis, the biochemistry and molecular and cell biology of articular cartilage, and experimental models of osteoarthritis. Major sections focus on...
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Trust-Based Selling: Finding and Keeping Customers for Life
Trust-Based Selling: Finding and Keeping Customers for Life

The first year of developing a new sales territory or establishing new customers is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on products, grab a customer list, start calling for appointments, discover opportunities, and close deals. In...

Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)
Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)

Publius Syrus stated back in 42 B.C., “You cannot put the same shoe on every foot.” (Maxim 596) Though written long before the advent of forensic science, Syrus’ maxim summarizes the theme of Forensic Medicine of the Lower Extremity: Human Identification and Trauma Analysis of the Thigh, Leg, and Foot. Put simply, the lower...

The Focal Easy Guide to Final Cut Pro 6
The Focal Easy Guide to Final Cut Pro 6
"This book will help you learn how to use Final Cut Pro 5 quickly and confidently." - Stills Audio Motion

"In such a relatively short book as compared to the 800 page tomes I usually find, there is not much that Rick Young does not cover in order to get the new user up and running as soon and as painlessly as
...
Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time  Using Trust as Your Weapon
Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time Using Trust as Your Weapon

The first year of developing a new sales territory is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing more than...

The Principles of Project Management (SitePoint: Project Management)
The Principles of Project Management (SitePoint: Project Management)

The Principles of Project Management lays out clear steps that anyone can follow to get projects done right, and delivered on time.

This full color book covers:

Why Project Management is important The 6 fundamental truths of project management Getting started: Discovering, Initiating, Planning
...
Result Page: 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy