Home | Amazing | Today | Tags | Publishers | Years | Search 
The Art of Profitability
The Art of Profitability
'Interesting, concise... This little book packs quite a punch.' - Miami Herald

What do Barbie dolls, Nokia phones, and American Express credit cards have in common? They all represent a powerful business model called pyramid profit. How about Intel, Microsoft, and Stephen King? They all exploit another model called value chain
...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences
Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences
This book is directed to academics, educators, and government policy-makers who are concerned about addressing emerging cyber-bullying and anti-authority student expressions through the use of cell phone and Internet technologies. There is a current policy vacuum relating to the extent of educators' legal responsibilities to intervene when such...
Constructive Modeling Of Structural Turbulence And Hydrodynamic Instabilities
Constructive Modeling Of Structural Turbulence And Hydrodynamic Instabilities
The book provides an original approach in the research of structural analysis of free developed shear compressible turbulence at high Reynolds number on the base of direct numerical simulation (DNS) and instability evolution for ideal medium (integral conservation laws) with approximate mechanism of dissipation (FLUX dissipative monotone...
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.

Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by...

Contractual Correspondence for Architects and Project Managers
Contractual Correspondence for Architects and Project Managers
'This book appeals to both practitioners and non-practitioners of procurement and contractual procedures and should be essential reading for both students on the undergraduate built environment-related degrees and practitioners involved within the project life-cycle' Building Engineer May 2006

This book provides over 160 model
...
Moodle 1.9 Multimedia
Moodle 1.9 Multimedia
This book provides you with everything you need to include pictures, sound, video, animations, and more in your Moodle courses. You'll develop Moodle courses that you are proud of, and that your students enjoy.

This book was written around the design of an online course called Music for an everyday life using Moodle, where teachers and
...
The Physics of Football: Discover the Science of Bone-Crunching Hits, Soaring Field Goals, and Awe-Inspiring Passes
The Physics of Football: Discover the Science of Bone-Crunching Hits, Soaring Field Goals, and Awe-Inspiring Passes
"Whether your primary interest is popular science or pro football, you will enjoy FOOTBALL PHYSICS." (Bill Belichick, head coach, New England Patriots )

"Football Physics is great fun. It taught me more about football than 50 years of watching the game." (Robert K. Adair, Ph.D., author of Physics of Baseball )...
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Going to Extremes: How Like Minds Unite and Divide
Going to Extremes: How Like Minds Unite and Divide
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?

In
...
Imposing Values: Liberalism and Regulation (Oxford Pllitical Philosophy)
Imposing Values: Liberalism and Regulation (Oxford Pllitical Philosophy)
A major question for liberal politics and liberal political theory concerns the proper scope of government. Liberalism has always favored limited government, but there has been wide-ranging dispute among liberals about just how extensive the scope of government should be. Included in this dispute are questions about the extent of state ownership of...
The World Heroin Market: Can Supply Be Cut? (Studies in Crime and Public Policy)
The World Heroin Market: Can Supply Be Cut? (Studies in Crime and Public Policy)
Heroin is universally considered the world's most harmful illegal drug. This is due not only to the damaging effects of the drug itself, but also to the spread of AIDS tied to its use. Burgeoning illegal mass consumption in the 1960s and 1970s has given rise to a global market for heroin and other opiates of nearly 16 million users. The production...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy