Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention

Turn unstructured data into valuable business insight

Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructured data analysis (UDA) concepts in a practical way, highlighting...

Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation
Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation

Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation: An Action Guide for Business and IT Leaders explains how to increase IT delivery capabilities through the use of Agile and Kanban. Factoring in constant change, communication, a sense of urgency, clear and measurable goals, political realities, and...

LinkedIn For Dummies, 4th Edition
LinkedIn For Dummies, 4th Edition

Build your network, find a job, and been seen as a thought leader

LinkedIn is your number-one personal branding tool, and this friendly guide shows you how to harness it to build connections and relationships—and stand out in the world's largest professional network. LinkedIn For Dummies walks you step by...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

RapidMiner: Data Mining Use Cases and Business Analytics Applications
RapidMiner: Data Mining Use Cases and Business Analytics Applications

Powerful, Flexible Tools for a Data-Driven World
As the data deluge continues in today’s world, the need to master data mining, predictive analytics, and business analytics has never been greater. These techniques and tools provide unprecedented insights into data, enabling better decision making and forecasting, and
...

Time Mastery: How Temporal Intelligence Will Make You A Stronger, More Effective Leader
Time Mastery: How Temporal Intelligence Will Make You A Stronger, More Effective Leader
"To be most effective, leaders must move beyond time management to time mastery. Time managers are reliant on clocks and calendars; time masters develop an intuitive sense of timing. Time managers see time as a fixed, rigid constant; time masters view it as relative and malleable. Time masters have what John Clemens and Scott Dalrymple call...
The McKinsey Mind: Understanding and Implementing the Problem-Solving Tools and Management Techniques
The McKinsey Mind: Understanding and Implementing the Problem-Solving Tools and Management Techniques

The First Step-by-Step Manual for Achieving McKinsey-Style Solutions­­and Success

International bestseller The McKinsey Way provided a through-the-keyhole look at McKinsey & Co., history's most prestigious consulting firm. Now, the follow-up implementation manual, The McKinsey Mind,...

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...

Microservices: Flexible Software Architecture
Microservices: Flexible Software Architecture

The Most Complete, Practical, and Actionable Guide to Microservices

 

Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates...

GPRS in Practice : A Companion to the Specifications
GPRS in Practice : A Companion to the Specifications
GPRS is now an established technology allowing packet-data access to the internet and intranets and it is expected that consumer demand for the service will continue to increase, especially when the higher data rates are made available.

The GPRS technology is also carried forward to the 3G systems and it is vital that engineers working in...

The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)
The Scrumban [R]Evolution: Getting the Most Out of Agile, Scrum, and Lean Kanban (Agile Software Development Series)

Create Thriving, High-Performing Teams and Organizations with Scrumban

 

Scrumban allows you to use Kanban as a catalyst for increasingly valuable changes to your existing software development processes, amplifying and expanding upon Scrum’s...

Result Page: 66 65 64 63 62 61 60 59 58 57 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy