|
|
|
|
| | Organizational Behavior: Securing Competitive AdvantageIn today’s business environment, competition arises when other organizations seek to do what your company does, only better. Advantage is gained when you can do something your competitors find difficult to duplicate. Competitive advantage is further secured when competitors cannot duplicate your company’s special ability at all. ... | | Inspire!: Why Customers Come Back
8 POWERFUL WAYS TO INSPIRE TODAY’S TOUGH CUSTOMERS IN TOUGH TIMES AND MAKE THEM STICK!
“With Jim Champy’s well-proven gift for keen management analysis, today’s essential notions of business... |
|
| | | | Rightshore!: Successfully Industrialize SAP® Projects OffshoreAt a time when business demands urge companies to innovate and CIOs face increasing cost pressures, offshore delivery offers the opportunity to industrialize the implementation processes for system harmonization, consolidation, and enhancement, thereby realizing substantial cost savings and quality improvements. Rightshore® - a... |
|
Mastering Red Hat Linux 7Join the Red Hat Revolution! Newly revised and updated, Mastering Red Hat Linux is the essential guide to the world's leading Linux distribution. Inside, you'll find everything you need to know to install, configure, use, and optimize Red Hat Linux. You'll even find the operating system itself-the Publisher's Edition of Red Hat Linux 7.1,... | | Canon EOS Digital Rebel XSi/450D (Focal Digital Camera Guides)Focal Digital Camera Guides: Canon EOS Digital Rebel XSi/450D
Just bought a Canon EOS Digital Rebel XSi/450D and looking to combine practical know-how with inspiration? This one-stop, easy-to-read guide covers all the basic functions of the camera, and everything beyond.
For the basics, turn to the quick start guide, which... | | Starting an Online Business All-in-One Desk Reference For DummiesFor two decades, the Internet has continued to prove itself a viable tool for building, managing, and growing a business. Little doubt remains that you can make money online and find success in doing so. In fact, since beginning our own online endeavors, we have had the privilege of meeting and working with a variety of entrepreneurs — people... |
|
Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... | | Modern Compiler Implementation in ML
Over the pasi decade, there have been several shifts in the way compilers are
built. New kinds of programming languages are being used: object-oriented
languages with dynamic methods, functional languages with nested scope
and first-class function closures; and many of these languages require garbage
collection. New machines have... | | Being Geek: The Software Developer's Career Handbook
As a software engineer, you recognize at some point that there's much more to your career than dealing with code. Is it time to become a manager? Tell your boss he’s a jerk? Join that startup? Author Michael Lopp recalls his own make-or-break moments with Silicon Valley giants such as Apple, Netscape, and Symantec in... |
|
|
Result Page: 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 |