|
|
|
|
|
How to Make it Big in the Seminar Business
How to Make It Big in the Seminar Business is considered must have reading among consultants, speakers, and seminar leaders. Fully updated and revised, this new edition is packed with insider tips on determining fees, marketing, scheduling, presentation technologies, and much more. It features new chapters on using the Web and other... | | How to Cheat at Securing LinuxLinux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased... | | Software by Numbers: Low-Risk, High-Return DevelopmentUltimately, software development is about creating value-yet, all too often, applications fail to deliver the business value customers need. This book will help you change that, by linking software development directly to value creation. You'll learn how to identify which features add value and which don't-and refocus on... |
|
|
Cardiovascular Prevention and Rehabilitation
Over the past decades the medical care of the patient with cardiovascular disease (CVD)
has shown an impressive development, with marked positive consequences for mortality,
morbidity, and the quality of life of coronary patients. This improvement has
profoundly changed the arena in which cardiac rehabilitation (CR) has been acting... | | Statistical Analysis with Excel For Dummies (Computer/Tech)
Take the mystery out of statistical terms and put Excel to work!
If you need to create and interpret statistics in business or classroom settings, this easy-to-use guide is just what you need. It shows you how to use Excel's powerful tools for statistical analysis, even if you've never taken a course in statistics.... | | Personal Firewalls for Administrators and Remote UsersPersonal firewalls explained—for remote corporate and home users.
In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these... |
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |