Home | Amazing | Today | Tags | Publishers | Years | Search 
NetSuite OneWorld Implementation 2011 R2
NetSuite OneWorld Implementation 2011 R2
When I first heard of NetLedger in an internal Oracle e-mail around the turn of the century, it was one of those 'aha' moments that we all have in life. There was, at this time, a fledgling industry of Application Service Providers (ASPs), who offered to host enterprise software at a data center. But I was skeptical, since I...
Molecular Forensics
Molecular Forensics

Molecular Forensics offers a comprehensive coverage of the increasingly important role that molecular analysis plays within forensic science. Starting with a broad introduction of modern forensic molecular technologies, the text covers key issues from the initial scenes of crime sampling to the use of evidential material in the...

Multi-criteria Decision Analysis: Methods and Software
Multi-criteria Decision Analysis: Methods and Software
People face making decisions both in their professional and private lives. A manager in a company, for example, may need to evaluate suppliers and develop partnerships with the best ones. A household may need to choose an energy supplier for their family home. Students cannot ignore university rankings. Often candidates for a job...
Managing Business Risk: A Practical Guide to Protecting Your Business
Managing Business Risk: A Practical Guide to Protecting Your Business
The balance between risk and reward is the very essence of business: you have to take risks in order to generate returns and, generally speaking, higher returns involve greater risks. However, there is a difference between risks taken as a result of careful judgement and those taken unwittingly.

In a world of
...
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World

Digital communications technology has immeasurably enhanced our capacity to store, retrieve, and exchange information. But who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and eminently user-friendly overview of...

Guide to Cloud Computing: Principles and Practice (Computer Communications and Networks)
Guide to Cloud Computing: Principles and Practice (Computer Communications and Networks)

This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment. The book not only considers the technologies for designing and creating cloud computing platforms, but also the business models and frameworks in real-world...

Competitive Intelligence: Gathering, Analysing And Putting It to Work
Competitive Intelligence: Gathering, Analysing And Putting It to Work

Every business manager needs intelligence to find suppliers, mobilize capital, win customers and fend off rivals. Obtaining this is often an unplanned, instinctive process. The manager who has a conscious, systematic approach to acquiring intelligence will be better placed to recognize and seize opportunities whilst safeguarding the...

Do More Faster: TechStars Lessons to Accelerate Your Startup
Do More Faster: TechStars Lessons to Accelerate Your Startup

Practical advice from some of today's top early stage investors and entrepreneurs

TechStars is a mentorship-driven startup accelerator with operations in three U.S. cities. Once a year in each city, it funds about ten Internet startups with a small amount of capital and surrounds them with around fifty top Internet...

International Marketing: Strategy and Theory
International Marketing: Strategy and Theory

Marketing is a universal activity that is widely applicable, regardless of the political, social or economic systems of a particular country. However, this doesn't mean that consumers in different parts of the world should be satisified in the same way.

The 4th edition of International Marketing has been written
...

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

Fabricated: The New World of 3D Printing
Fabricated: The New World of 3D Printing

Fabricated tells the story of 3D printers, humble manufacturing machines that are bursting out of the factory and into homes, businesses, schools, kitchens, hospitals, even the fashion catwalk. The magic happens when you plug a 3D printer into today's mind-boggling digital technologies. Add to that the Internet, tiny, low cost...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy