Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Brazil Reader: History, Culture, Politics (The Latin America Readers)
The Brazil Reader: History, Culture, Politics (The Latin America Readers)
From the first encounters between the Portuguese and indigenous peoples in 1500 to the current political turmoil, the history of Brazil is much more complex and dynamic than the usual representations of it as the home of Carnival, soccer, the Amazon, and samba would suggest. This extensively revised and expanded second edition of...
Mars, A Cosmic Stepping Stone: Uncovering Humanity's Cosmic Context
Mars, A Cosmic Stepping Stone: Uncovering Humanity's Cosmic Context
The questions of our origin and cosmic abundance of life are among the most compelling facing humanity. We have determined much about the nature and origin of the Universe and our place in it, but with virtually all evidence of our origin long since gone from our world and an unimaginably vast Universe still to explore, defining answers are...
FileMaker Pro 10 Bible
FileMaker Pro 10 Bible

FileMaker Pro 10 Bible provides information that grows with you no matter what your level when you start. Topics range from the general (how databases fit into real life and your business needs; comparisons with other database development tools; a broad discussion of integration with existing systems and software) through the...

Refactoring in Ruby
Refactoring in Ruby

The First Hands-On, Practical, All-Ruby Refactoring Workbook!

Refactoring the art of improving the design of existing code has taken the world by storm. So has Ruby. Now, for the first time, there's a refactoring...

IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
Cisco Unified Customer Voice Portal: Building Unified Contact Centers (Networking Technology: IP Communications)
Cisco Unified Customer Voice Portal: Building Unified Contact Centers (Networking Technology: IP Communications)

The definitive guide to deploying Cisco Unified Customer Voice Portal IVRs in any contact center environment

 

Thousands of companies are replacing legacy ACD/TDM-based contact centers with pure IP-based unified contact center solutions. One of these...

Visual C++.Net in 24 Hours (Teach Yourself)
Visual C++.Net in 24 Hours (Teach Yourself)
This book is for developers who want to develop .NET applications using Visual C++ 7.0 as the programming language. It covers the new features of Visual C++ which support .NET while lightly covering the new MFC and ATL enhancements as they relate to the .NET architecture, but focuses heavily on developing for the .NET framework. The book takes the...
Upgrading and Repairing PCs (15th Edition)
Upgrading and Repairing PCs (15th Edition)

Upgrading and Repairing PCs is the runaway best-selling PC hardware book of all time and one of the best-selling computer books ever! This 15th Edition is loaded with the most up-to-date hardware information anywhere. World-renowned PC hardware expert Scott Mueller has taught thousands...

Object Oriented Reengineering Patterns (The Morgan Kaufmann Series in Software Engineering and Programming)
Object Oriented Reengineering Patterns (The Morgan Kaufmann Series in Software Engineering and Programming)
"This book speaks with experience. It gives you the building blocks for a plan to tackle a difficult code base and the context for techniques like refactoring. It is a sad fact that there are too few of these kinds of books out there, when reengineering is such a common event. But I'm at least glad to see that while there aren't many books in...
Least Privilege Security for Windows 7, Vista, and XP
Least Privilege Security for Windows 7, Vista, and XP

Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on...

The Routledge Guidebook to Aristotle's Nicomachean Ethics (The Routledge Guides to the Great Books)
The Routledge Guidebook to Aristotle's Nicomachean Ethics (The Routledge Guides to the Great Books)

Written by one of the most important founding figures of Western philosophy, Aristotle’s Nicomachean Ethics represents a critical point in the study of ethics which has influenced the direction of modern philosophy. The Routledge Guidebook to Aristotle’s Nicomachean Ethics introduces the major themes in...

Seduced by Success: How the Best Companies Survive the 9 Traps of Winning
Seduced by Success: How the Best Companies Survive the 9 Traps of Winning

Don't let success put your company on the road to ruin

In Seduced by Success, Robert J. Herbold, the former Chief Operating Officer of Microsoft, shows you how to avoid the nine traps of success-the “legacy practices” that almost felled such giants as General Motors, Kodak and Sony. Herbold, a...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy