Home | Amazing | Today | Tags | Publishers | Years | Search 
The Coaching Secret: How to be an exceptional coach
The Coaching Secret: How to be an exceptional coach

Coaching as a field has mushroomed in recent years. Thousands of new coaches enter the field after only completing short and superficial training programmes. The problem with this is that coaching is not i) something you can simply learn in a short programme ii) a superficial practice.

The books available on coaching tend to just...

Y-Size Your Business: How Gen Y Employees Can Save You Money and Grow Your Business
Y-Size Your Business: How Gen Y Employees Can Save You Money and Grow Your Business

In today's economy, maximizing the performance of every employee is critical to business survival and growth. Gen Y—sometimes called Millennials—provides an enticing opportunity for employers to increase their short-term profitability and create a long-term competitive advantage. Almost 80 million strong, Gen Y is the fastest...

A Course in Probability and Statistics
A Course in Probability and Statistics

This author's modern approach is intended primarily for honors undergraduates or undergraduates with a good math background taking a mathematical statistics or statistical inference course. The author takes a finite-dimensional functional modeling viewpoint (in contrast to the conventional parametric approach) to strengthen the connection...

Expert Trading Systems: Modeling Financial Markets with Kernel Regression
Expert Trading Systems: Modeling Financial Markets with Kernel Regression

With the proliferation of computer programs to predict market direction, professional traders and sophisticated individual investors have increasingly turned to mathematical modeling to develop predictive systems. Kernel regression is a popular data modeling technique that can yield useful results fast.

Provides data modeling
...

Strategy: An Introduction to Game Theory (Third Edition)
Strategy: An Introduction to Game Theory (Third Edition)

Game theory has become an enormously important field of study. It is now a vital methodology for researchers and teachers in many disciplines, including economics, political science, biology, and law. This book provides a thorough introduction to the subject and its applications, at the intermediate level of instruction. It is designed for...

Service Level Management Best Practice Handbook: Building, Running and Managing Effective Service Level Management SLAs - Ready to Use Supporting Documents Bringing ITIL Theory into Practice
Service Level Management Best Practice Handbook: Building, Running and Managing Effective Service Level Management SLAs - Ready to Use Supporting Documents Bringing ITIL Theory into Practice
Many organizations are looking to implement Service Level Management as a way to improve the structure and quality of the business.

This document describes the contents of the Service Level Management Guide. The information found within the book is based on the ITIL Version 2 framework, specifically the Service
...
Salesforce Handbook
Salesforce Handbook

This book is not intended to be a deep-dive on security, programming, reporting, configuration, etc. but more of a high-level overview on salesforce.com, Force.com development, tools, methodology and other resources. We will not cover all aspects of salesforce.com. We wrote this book to (hopefully) become an invaluable resource for anyone new...

Methods of IT Project Management
Methods of IT Project Management

Methods of IT Project Management, which focuses specifically on IT project management, is built around the Project Management Body of Knowledge (PMBOK).

Introduction To Project Management; A Systems View and Systems Methodology; The Project Management Framework; Project Initiation; Project Scope and Human Resource Planning;...

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is...

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Quality of Life and Human Difference: Genetic Testing, Health Care, and Disability
Quality of Life and Human Difference: Genetic Testing, Health Care, and Disability
Genetic technology has enabled us to test fetuses for an increasing number of diseases and impairments. On the basis of this genetic information, prospective parents can predict – and prevent – the birth of children likely to have those conditions. In developed countries, prenatal genetic testing has now become a...
Improving Research through User Engagement (Improving Learning)
Improving Research through User Engagement (Improving Learning)

There are increasing calls for social science researchers to work more closely with research users. References to engaging users in and with research are now common in research funding requirements, national research strategies and large-scale research programmes. User engagement has therefore become part of the rhetoric of educational and...

Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy