Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software by Design: Shaping Technology and The Workplace
Software by Design: Shaping Technology and The Workplace
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace. This book provides an informative, cogent examination of how various social factors--such as organizational structure, workplace relations, and market...
Advanced XML Applications from the Experts at The XML Guild
Advanced XML Applications from the Experts at The XML Guild
The foundations of XML are found in two World Wide Web Consortium (W3C) recommendations: Extensible Markup Language and Namespaces in XML. Using just these foundations, it is very simple and straightforward to express a set of information in a labeled hierarchy. The hierarchy has simple parent, child, and sibling relationships,...
Topgrading, 3rd Edition: The Proven Hiring and Promoting Method That Turbocharges Company Performance
Topgrading, 3rd Edition: The Proven Hiring and Promoting Method That Turbocharges Company Performance
“BRAD HELPED US DEVELOP THE TOOLS TO PICK A-PLAYER LEADERS AT GE.” —JACK WELCH


Great companies, large and small, rise or fall because of their talent; the more high performers on your team, the more successful your organization will be. Of course, that’s easier said than done. Research
...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
The Transparency Edge: How Credibility Can Make or Break You in Business
The Transparency Edge: How Credibility Can Make or Break You in Business

In The Transparency Edge, leadership expert Barbara Pagano demonstrates that a clear and open business policy is a powerful management tool. Backed by exclusive research of thousands of executives at Fortune 500 companies, this comprehensive guide to what-you-see-is-what-you-get leadership shows you how to practice a transparent...

Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
Digital Photography: Expert Techniques
Digital Photography: Expert Techniques

Ready to take digital imaging to the professional level? This advanced strategy book offers expert advice to help you become more competent in your work routine, but it is not your ordinary workflow book. Through step-by-step procedures based on hard-nosed experience, professional photographer Ken Milburn covers much more...

Pro Data Backup and Recovery
Pro Data Backup and Recovery

Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...

Computability and Complexity Theory (Texts in Computer Science)
Computability and Complexity Theory (Texts in Computer Science)

This revised and extensively expanded edition of Computability and Complexity Theory comprises essential materials that are core knowledge in the theory of computation. The book is self-contained, with a preliminary chapter describing key mathematical concepts and notations.  Subsequent chapters move from the qualitative aspects of...

Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)
Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)

This volume contains both methodological papers showing new original methods, and papers on applications illustrating how new domain-specific knowledge can be made available from data by clever use of data analysis methods. The volume is subdivided in three parts: Classification and Data Analysis; Data Mining; and Applications. The selection...

International Labour Organization and Global Social Governance
International Labour Organization and Global Social Governance
This open access book explores the role of the ILO (International Labour Organization) in building global social governance from multiple and mutually complementary perspectives. It explores the impact of this UN´s oldest agency, founded in 1919, on the transforming world of work in a global setting, providing insights...
Software Development: Building Reliable Systems
Software Development: Building Reliable Systems

80% of software projects fail -- here’s why the other 20% succeed!

Software Development is the most thorough, realistic guide to "what works" in software development - and how to make it happen in your organization. Leading consultant Marc Hamilton tackles all three key components of...

unlimited object storage image
Result Page: 193 192 191 190 189 188 187 186 185 184 183 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy