Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Supply Chain Planning, Second Edition: An Analytics-based Approach
Supply Chain Planning, Second Edition: An Analytics-based Approach
The book is intended for supply chain professionals, as well as for graduate and advanced undergraduate students. Practitioners will obtain valuable new insights and examples of implementable frameworks and methods for managing their supply chain functions and organizations. Students will develop an understanding of real-world approaches for...
Microsoft .NET Compact Framework (Core Reference)
Microsoft .NET Compact Framework (Core Reference)

There are two main factors driving increased usage of handheld devices in the enterprise. The first is the ever-decreasing cost of hardware. In the week that I write this, Dell is launching its first Pocket PC at a price that is intended to undercut rivals, Hewlett Packard has announced new low-end and high-end iPaqs, and...

IP Addressing Fundamentals
IP Addressing Fundamentals

The reader-friendly explanation of how the IP address space works and how it is used

* A reader-friendly introduction to the complex and confusing topic of IP addressing
* Thorough and understandable explanations of the binary mathematics behind IP addressing
* Complete coverage of the IPv4 address space without distractions of
...

Geographic Information Systems and Science
Geographic Information Systems and Science

Geographic Information Systems and Science has become the pre-eminent textbook in its field, for students and practitioners alike. Its unique approach communicates the richness and diversity of GIS in a lucid and accessible format. This fully revised and updated second edition reinforces the view of GIS as a gateway to science and...

SharePoint Server 2010 Administration 24 Hour Trainer (Wrox Programmer to Programmer)
SharePoint Server 2010 Administration 24 Hour Trainer (Wrox Programmer to Programmer)
SHAREPOINT IS ONE THE MOST SUCCESSFUL products in Microsoft’s history. It can be found in small businesses, universities, and Fortune 500 companies. SharePoint 2010, the latest release, contains many new areas for existing and new SharePoint server administrators and site administrators. This book will help you meet the new...
Common Sense Project Management
Common Sense Project Management

From the earliest cities on earth through the Great Wall of China on to the Three Rivers Gorges Dam project, project management has been a part of the march of civilization. Common Sense Project Management is a straightforward, often entertaining workbook approach to organizing and managing projects of virtually any size or complexity. Its...

The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal
The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal

We live in digital time. Our pace is rushed, rapid-fire, and relentless. Facing crushing workloads, we try to cram as much as possible into every day. We're wired up, but we're melting down. Time management is no longer a viable solution. As bestselling authors Jim Loehr and Tony Schwartz demonstrate in this groundbreaking book,...

Trust, Institutions and Managing Entrepreneurial Relationships in Africa: An SME Perspective (Palgrave Studies of Entrepreneurship in Africa)
Trust, Institutions and Managing Entrepreneurial Relationships in Africa: An SME Perspective (Palgrave Studies of Entrepreneurship in Africa)

This book highlights the importance of understanding how trust and indigenous African cultural institutions enhance the development of entrepreneurial networks and relationships in Africa. Drawing on institutional theories, the author re-examines the way that entrepreneurial behaviour can be shaped, with a focus on trust, networks...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Managing And Customizing Opencms 6 Websites: Java/jsp Xml Content Management
Managing And Customizing Opencms 6 Websites: Java/jsp Xml Content Management
OpenCms is an open-source enterprise-grade content management system based on Java and XML technology, and is designed specifically for creating and maintaining websites. It provides a full set of tools for dealing with content creation, editorial workflow, publishing, and versioning.

The focus of this book is on using and administrating
...
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in mobile computing and wireless communication. The focus of this lecture is on a systems approach...
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
The loss of sensitive data continues to be a signifi cant concern for both organizations as well as individuals whose information may be at risk of a breach. Organizations that experience a data breach can suffer reputational damage, loss of customer and constituent confi dence, legal and regulatory scrutiny, and the direct costs of managing an...
unlimited object storage image
Result Page: 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy