Home | Amazing | Today | Tags | Publishers | Years | Search 
Voice-of-the-Customer Marketing: A Revolutionary 5-Step Process to Create Customers Who Care, Spend, and Stay
Voice-of-the-Customer Marketing: A Revolutionary 5-Step Process to Create Customers Who Care, Spend, and Stay

Learn how you can use the revolutionary five-step marketing process that helped Microsoft, NBC Universal, and IBM achieve double-digit increases in sales.

"When HP uses the Voice of the Customer methodology, our marketing campaign results improve dramatically: response rates improve 3X to 10x, sales
...

Software Development: Case Studies in Java
Software Development: Case Studies in Java

In order to be able to write good software, students will need to be familiar with a range of techniques; good programming practice, experience of problem solving, familiarity with development methodologies, and knowledge of software processes. This book takes a new approach to the teaching of software development. Using a collection of case...

Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work
Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work

Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work is the first book on the subject for smaller businesses.

Until now, design thinking—a methodology for solving business problems and identifying opportunities—has been the playground for companies with big budgets,
...

MCPD 70-519 Exam Ref: Designing and Developing Web Applications Using Microsoft .NET Framework 4
MCPD 70-519 Exam Ref: Designing and Developing Web Applications Using Microsoft .NET Framework 4

Prepare for MCPD Exam 70-519—and help demonstrate your real-world mastery of web application design and development—with this official Microsoft® Exam Ref. Written for experienced, MCTS-certified professionals ready to advance their status—this guide focuses on the critical-thinking and decision-making acumen...

Action Analysis for Animators
Action Analysis for Animators

Action Analysis is one of the fundamental princples of animation that underpins all types of animation: 2d, 3d, computer animation, stop motion, etc. This is a fundamental skill that all animators need to create polished, believable animation. An example of Action Analysis would be Shrek's swagger in the film, Shrek. The animators clearly...

iOS Programming: The Big Nerd Ranch Guide (5th Edition) (Big Nerd Ranch Guides)
iOS Programming: The Big Nerd Ranch Guide (5th Edition) (Big Nerd Ranch Guides)

iOS Programming: The Big Nerd Ranch Guide leads you through the essential concepts, tools, and techniques for developing iOS applications. After completing this book, you will have the know-how and the confidence you need to tackle iOS projects of your own. Based on Big Nerd Ranch's popular iOS Bootcamp course and its...

The SEO Battlefield: Winning Strategies for Search Marketing Programs
The SEO Battlefield: Winning Strategies for Search Marketing Programs

Welcome to the battlefield. Every day, companies ranging from startups to enterprises fight to achieve high search rankings, knowing that previous success can quickly vanish. With this practical guide, you’ll learn how to put search engine optimization (SEO) methodology into practice, including the research, data analysis, and...

Applied Data Mining: Statistical Methods for Business and Industry (Statistics in Practice)
Applied Data Mining: Statistical Methods for Business and Industry (Statistics in Practice)

Data mining can be defined as the process of selection, exploration and modelling of large databases, in order to discover models and patterns. The increasing availability of data in the current information society has led to the need for valid tools for its modelling and analysis. Data mining and applied statistical methods are the...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Structural Geology Algorithms: Vectors and Tensors
Structural Geology Algorithms: Vectors and Tensors

State-of-the-art analysis of geological structures has become increasingly quantitative but traditionally, graphical methods are used in teaching. This innovative lab book provides a unified methodology for problem-solving in structural geology using linear algebra and computation. Assuming only limited mathematical training, the book begins...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy