Home | Amazing | Today | Tags | Publishers | Years | Search 
Thank God It's Monday!: How to Create a Workplace You and Your Customers Love
Thank God It's Monday!: How to Create a Workplace You and Your Customers Love

Today-s #1 Secret of Profitability and Performance

-Thank God Roxanne is willing to share her special mix of motivation and proven methods to supercharge your workplace. Readers will move from -Thank God It-s Monday- to -I Wish Every Day Could Be Monday.--

Harvey Mackay, author of the New York Times #1...

Leading at a Higher Level, Revised and Expanded Edition: Blanchard on Leadership and Creating High Performing Organizations
Leading at a Higher Level, Revised and Expanded Edition: Blanchard on Leadership and Creating High Performing Organizations

"Leading at a Higher Level makes clear that respect and integrity aren’t pleasant-sounding options; they are essential criteria for an organization’s survival. As inspiring as it is instructive, this book belongs in every leader’s core curriculum."

...

Five Minutes on Mondays: Finding Unexpected Purpose, Peace, and Fulfillment at Work
Five Minutes on Mondays: Finding Unexpected Purpose, Peace, and Fulfillment at Work

Five Minutes on Mondays is a gold mine of enrichment…It is an easy read with a deep and profound impact.”

Martin Rutte, Chair of the Board, The Centre for Spirituality and the Workplace, Saint Mary’s University, co-author of New York Times business...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Integrated Auditing of ERP Systems
Integrated Auditing of ERP Systems

This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...

Information Systems Security: 6th International Conference, ICISS 2010
Information Systems Security: 6th International Conference, ICISS 2010

The number of World Wide Web users has risen to nearly 1.5 billion [58], a fifth of the world’s population. Development of innovative web based technologies has resulted in this explosive growth. Using the Web, end-users have benefited tremendously in numerous areas such as electronic commerce, health care and education. Due to the...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations
IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations

My first encounter with software configuration management was way back in the eighties while at university – and way before I knew that it was called software configuration management. We were doing a student project and were five people working on this group project. I was coding away, slipping into experiments that eventually took the...

Oracle GoldenGate 11g Implementer's guide
Oracle GoldenGate 11g Implementer's guide

Data replication is an important part of any database system that is growing due to today's demand for real-time reporting and regulatory requirements. GoldenGate has recently become Oracle's strategic real-time data replication solution. Until now, very little has been written about how to implement GoldenGate in a production...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

HP-UX 11i Tuning and Performance (2nd Edition)
HP-UX 11i Tuning and Performance (2nd Edition)

Maximizing the performance of Unix systems is a challenge that requires a specialized understanding of operating system behavior, knowledge of the design and tuning capabilities of the applications that run on the system, and an intimate acquaintance with system and application performance measuring tools that assist in...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy