Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real Influence: Persuade Without Pushing and Gain Without Giving In
Real Influence: Persuade Without Pushing and Gain Without Giving In

The authors argue against the aggressive selling of ideas and instead emphasize listening, genuine engagement and commitment to a lasting business relationship in order to get someone to come around to one's way of thinking.

...
DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The papers in this book present, for the first time, the world of warfare, both defensive and offensive, from the Classical periods to end of the Middle Ages in one collection. These scholarships have attracted ancient writers and generals and nowadays historians, archaeologists and researchers poliorcetics. Military historiography and...
Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

PC Magazine Windows XP Security Solutions
PC Magazine Windows XP Security Solutions
Think you're safe?

Guess what?

Studies have estimated that up to 90 percent of computers are infected by some security threat or another. There's a good chance yours is among them, but any computer can be easily secured to a high level-if you know what you're doing.

They're out there. Trust PC Magazine to...

Sarbanes-Oxley Guide for Finance and Information Technology Professionals
Sarbanes-Oxley Guide for Finance and Information Technology Professionals

Sarbanes-Oxley and its international variants are here to stay.

Are you prepared for this new business reality?

Changing the landscape of corporate governance, financial disclosure, and the practice of public accounting, the Sarbanes-Oxley Act (SOX) can be confusing and complex for professionals and executives who must take...

Phase Behavior of Polymer Blends (Advances in Polymer Science)
Phase Behavior of Polymer Blends (Advances in Polymer Science)
The observation that blending existing polymers can produce new and improved materials with the beneficial features of each component has focused attention on understanding the phase behavior of polymer blends because the resulting composites may form homogeneous phases or may be phase separated with a particular desirable morphology. While...
Discovering Real Business Requirements for Software Project Success (Computing Library)
Discovering Real Business Requirements for Software Project Success (Computing Library)
Text offers a methodology for discovering and testing the real business requirements that software products must meet in order to provide value. Presents more than 21 ways to test business requirements and evaluate substance and content. DLC: Computer software--Development.

While a
...
iPhone JavaScript Cookbook
iPhone JavaScript Cookbook

Written in a cookbook style, this book offers solutions using a recipe-based approach. Each recipe contains step-by-step instructions followed by an analysis of what was done in each task and other useful information. The cookbook approach means you can dive into whatever recipes you want in no particular order. This book is for web...

Business Process Management Workshops: BPM 2010 International Workshops and Education Track
Business Process Management Workshops: BPM 2010 International Workshops and Education Track

Business process management (BPM) is an established research domain for computer science, information systems, and management scholars. The record number and wide scope of submissions to the eighth installation of the International Conference on Business Process Management was an indication of the vibrancy of the area and the varied...

Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Mkt Ldr Elem TRB NE TM CD Rom Pk
Mkt Ldr Elem TRB NE TM CD Rom Pk
Market Leader is an extensive new Business English course designed to bring the real world of international business into the language teaching classroom. It has been developed in association with the Financial Times, one of the world's leading sources of professional information, to ensure the maximum range and...
unlimited object storage image
Result Page: 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy