Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Successful Project Management: Applying Best Practices and Real-World Techniques with Microsoft Project
Successful Project Management: Applying Best Practices and Real-World Techniques with Microsoft Project

Projec t manageme nt has been around for centuries. After all, how do you think the Pyramids were built? Organizations have come to recognize that a lot of the work they do is project-oriented. And when they realize that good project management can save both time and money, that’s about the time that people like you receive the...

Microsoft Office 365: Exchange Online Implementation and Migration
Microsoft Office 365: Exchange Online Implementation and Migration
In the middle of 2006, I was preparing for an important executive review for Jeff Raikes to seek approval to kick off the project to build "CCS"—a communication and collaboration service from Microsoft. As was Jeff's approach to big decision meetings, he would ask for the PowerPoint slides in advance so he could review the...
From Single to Scale: How a Single Person, Small Business, or an Entrepreneur Can Grow Their Business to Profit
From Single to Scale: How a Single Person, Small Business, or an Entrepreneur Can Grow Their Business to Profit
Scale your single-person business to profitability. Increase your audience, create multiple products, and generate more profit. This book takes you through the entire process of building a scalable business from the seemingly impossible place of "being just one person."

Most single-person businesses are
...
Groupware: Design, Implementation, and Use: 9th International Workshop, CRIWG 2003
Groupware: Design, Implementation, and Use: 9th International Workshop, CRIWG 2003

This volume constitutes the proceedings of the 9th International Workshop on Groupware (CRIWG 2003). The conference was held in the city of Autrans, on the spectacular Vercors plateau in the foothills of the French Alps. The organizing committee could not have thought of a better setting to inspire lively discussions and reflection on...

Foundations of XML Processing: The Tree-Automata Approach
Foundations of XML Processing: The Tree-Automata Approach

Computer science, like other mathematical fields, cannot live without a tight relationship with reality. However, such a relationship is, frankly, not very common. This is probably why people so enthusiastically welcome a true meeting of theory and practice. In that sense, the coming together of XML and tree automata theory was a...

The Archaeology of Household Activities
The Archaeology of Household Activities
There were a number of chapters I thought were exceptionally well written and researched... valuable reading for all classical and historic archaeologists unfamiliar with Schiffer's work or with prehistoric archaeology, where point pronveniencing, object functions, use of space, and similar foci are routine. Others will enjoy reading Chapters 3 and...
Advertising, Promotion, and Other Aspects of Integrated Marketing Communications
Advertising, Promotion, and Other Aspects of Integrated Marketing Communications
The field of marketing communications is ever-changing. Brand managers continually attempt to gain advantage over competitors and endeavor to achieve larger market shares and profits for the brands they manage. Marketing communications, or marcom, is just one element of the marketing mix, but advertising, promotions,...
El-Ahwat, A Fortified Site from the Early Iron Age Near Nahal 'Iron, Israel (Culture and History of the Ancient Near East)
El-Ahwat, A Fortified Site from the Early Iron Age Near Nahal 'Iron, Israel (Culture and History of the Ancient Near East)

Archaeological report on el-Ahwat, a mysterious but important site in the highlands of ancient Canaan. In previous publications, the author suggested that el-Ahwat may be identified with the biblical site of harosheth hagoiim (Judges 4-5).

I first heard of el-Ahwat in the summer of 1995, when I was invited to see the new site
...
Computer Systems: Theory, Technology and Applications
Computer Systems: Theory, Technology and Applications

An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research.

From operating systems to distributed computing, many of the world's leading researchers provide insight into the latest concepts and theoretical insights--many of which are...

Managing Projects with make (Nutshell Handbooks)
Managing Projects with make (Nutshell Handbooks)

make is one of UNIX's greatest contributions to software development, and this book is the clearest description of make ever written. Even the smallest software project typically involves a number of files that depend upon each other in various ways. If you modify one or more source files, you must relink the...

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide (CCSP Self-Study) (2nd Edition)
CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide (CCSP Self-Study) (2nd Edition)

Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP...

The Seven Strategies of Master Presenters
The Seven Strategies of Master Presenters

Many speakers make presentations that are poorly designed, poorly delivered, and poorly received. There are those few, however, that are so masterful they move an audience to see the world differently and inspire them to achieve more than they ever thought possible.

The Seven Strategies of Master Presenters will help...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy