Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile Workforce Planning: How to Align People with Organizational Strategy for Improved Performance
Agile Workforce Planning: How to Align People with Organizational Strategy for Improved Performance

As business priorities change and focus shifts to address arising issues, HR professionals need to be able to reorganize talent swiftly and plan for future needs to enable the business to succeed. It covers how to forecast organizational demand for people, resources and skills, analyze the gap between supply and demand and most...

Microbiology For Dummies
Microbiology For Dummies

Microbiology For Dummies (9781119544425) was previously published as Microbiology For Dummies (9781118871188). While this version features a new Dummies cover and design, the content is the same as the prior release and should not be considered a new or updated product.

Microbiology is the study...

Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Some time ago, one of my colleagues asked me, “What do you like about SQL Server the most?” I had heard this question many times before, and so I provided my usual answer: “SQL Server Internals. I like to understand how the product works and solve complex problems with this knowledge.”

His
...
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition

Build customized solutions that fulfil your business requirements using the latest features of Jira 8

Key Features

  • Learn how to customize Jira applications to suit your organizational requirements
  • Extend Jira's capabilities for custom integrations with other products...
Pro .NET Memory Management: For Better Code, Performance, and Scalability
Pro .NET Memory Management: For Better Code, Performance, and Scalability
Understand .NET memory management internal workings, pitfalls, and techniques in order to effectively avoid a wide range of performance and scalability problems in your software. Despite automatic memory management in .NET, there are many advantages to be found in understanding how .NET memory works and how you can best write...
Personal Finance with Python: Using pandas, Requests, and Recurrent
Personal Finance with Python: Using pandas, Requests, and Recurrent
Deal with data, build up financial formulas in code from scratch, and evaluate and think about money in your day-to-day life. This book is about Python and personal finance and how you can effectively mix the two together. 

In Personal Finance with Python you will learn Python and finance at...
Windows Graphics Programming Win32 GDI and DirectDraw®
Windows Graphics Programming Win32 GDI and DirectDraw®

To deliver high-performance Windows applications, you need an in-depth understanding of the Win32 GDI and DirectDraw-but until now, it’s been virtually impossible to discover what’s going on "behind" Microsoft’s API calls. This book rips away the veil, giving experienced Windows programmers all the...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

API Design for C++
API Design for C++

Writing large applications in C++ is a complex and tricky business. However, designing reusable C++ interfaces that are robust, stable, easy to use, and durable is even more difficult. The best way to succeed in this endeavor is to adhere to the tenets of good Application Programming Interface (API) design.

An API presents a...

Extending and Embedding Perl
Extending and Embedding Perl
An explanation of how to expand the functionality and usefulness of the Perl programming language, this guide delves into the complex issues of using real code examples from the Perl source. Detailed is how to use Perl from C programs, such as writing interfaces to C libraries, implementing Perl callbacks for C libraries, and passing...
unlimited object storage image
Result Page: 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy