Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Assessing the Value of E-learning Systems
Assessing the Value of E-learning Systems
Assessing the Value of E-Learning Systems provides an extensive literature review pulling theories from the field of information systems, psychology and cognitive sciences, distance and online learning, as well as marketing and decision sciences. This book provides empirical evidence for the power of measuring value in the context of e-learning...
Infographics For Dummies
Infographics For Dummies

Create stunning infographics with this hands-on guide

Infographics For Dummies is a comprehensive guide to creating data visualization with viral appeal. Written by the founder of Infographic World, a New York City based infographic agency, and his top designers, the book focuses on the how-to of data, design,...

Social, Ethical and Policy Implications of Information Technology
Social, Ethical and Policy Implications of Information Technology

Legal and ethical issues have become a standard part of engineering and business schools’ curricula. This has not been the case for computer science or management information systems programs although there has been increased emphasis on the social skills of these students. This leaves a frightening void in the student’s professional...

Statistical Analysis of Financial Data in R (Springer Texts in Statistics)
Statistical Analysis of Financial Data in R (Springer Texts in Statistics)

Although there are many books on mathematical finance, few deal with the statistical aspects of modern data analysis as applied to financial problems. This textbook fills this gap by addressing some of the most challenging issues facing financial engineers. It shows how sophisticated mathematics and modern statistical techniques can...

Organizational Data Mining: Leveraging Enterprise Data Resources for Optimal Performance
Organizational Data Mining: Leveraging Enterprise Data Resources for Optimal Performance

The adage “knowledge is power” is widely accepted in corporate circles and tremendous amounts of data have and are being accumulated towards the goal of acquiring more knowledge. But corporations are increasingly realizing that there is a wide gap between “data” and “knowledge.” Data warehousing and data...

Strategies for Information Technology and Intellectual Capital
Strategies for Information Technology and Intellectual Capital
"Due to the increasing importance of the intangible assets of a company, firms are now concerned with how best to manage and measure knowledge and other intangibles. In addition to this, information technology has drastically changed the way these measurements are managed. Strategies for Information Technology and Intellectual Capital:...
Financial Management: Theory & Practice (with Thomson ONE - Business School Edition 1-Year Printed Access Card)
Financial Management: Theory & Practice (with Thomson ONE - Business School Edition 1-Year Printed Access Card)
When we wrote the first edition of Financial Management: Theory and Practice, we had four goals: (1) to create a text that would help students make better financial decisions; (2) to provide a book that could be used in the introductory MBA course, but one that was complete enough for use as a reference text in follow-on case...
Corporate Finance (3rd Edition) (Pearson Series in Finance)
Corporate Finance (3rd Edition) (Pearson Series in Finance)

NOTE: This ISBN is a standalone book. This ISBN does not include My Finance Lab access Card


Directed primarily toward MBA/graduate students, this text also provides practical content to current and aspiring
...

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy