Home | Amazing | Today | Tags | Publishers | Years | Search 
The Definitive Guide to HR Communication: Engaging Employees in Benefits, Pay, and Performance
The Definitive Guide to HR Communication: Engaging Employees in Benefits, Pay, and Performance

Two experienced HR communications consultants show how to dramatically improve the effectiveness of every HR message. HR professionals know their programs are pivotal to organizational success, but they also know how difficult it is to communicate those programs effectively. Hampered by legal restrictions, highly complex...

Service-Oriented Architecture (SOA): A Planning and Implementation Guide for Business and Technology
Service-Oriented Architecture (SOA): A Planning and Implementation Guide for Business and Technology

In 2002, Web services were a hot topic and the concept of serviceoriented architecture (SOA), while not a new idea, was beginning to pick up steam. It did not take long for organizations to realize that Web services mandated the concept and organizational model of SOA to guide their selection, design, implementation, and management....

APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)
APM Best Practices: Realizing Application Performance Management (Books for Professionals by Professionals)

The objective of APM Best Practices: Realizing Application Performance Management is to establish reliable application performance management (APM) practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. It's important to balance long-term goals with short-term deliverables, but...

Enterprise Service Computing: From Concept to Deployment
Enterprise Service Computing: From Concept to Deployment

The developed economy is shifting from being manufacturing based to services based. Different from the traditional manufacturing business, the services business is more complicated and dynamic, and end-user driven rather than product driven. To stay competitive, an enterprise thus has to rethink its business strategies and revamp its...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

E-Business Innovation and Process Management (Advances in E-Business Research)
E-Business Innovation and Process Management (Advances in E-Business Research)

With the advent of e-business, organizations have been fundamentally changing the way they do their business. From business operation to managerial control to corporate strategy, e-business has become an integral part in organizations. As e-business evolution continues with emerging technologies and business models, a solid understanding of...

Alfresco 3 Business Solutions
Alfresco 3 Business Solutions

Alfresco is a renowned and multiple award-winning open source Enterprise Content Management System that allows you to build, design, and implement your very own ECM solutions. It offers much more advanced and cutting-edge features than its commercial counterparts with its modularity and scalability. If you are looking for quick and effective...

Smart Sensing and Context: 5th European Conference, EuroSSC 2010, Passau
Smart Sensing and Context: 5th European Conference, EuroSSC 2010, Passau

Welcome to the 5th European Conference on Smart Sensing and Context. EuroSSC 2010 is a venue for high-quality papers that describe both original and unpublished research advancing the state of the art in smart surroundings, context-awareness and networked embedded sensor and actuator systems. The conference brings researchers of a variety of...

Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

This Festschrift is dedicated to Mr. Sorin A. Huss by his friends and his Ph.D. students to honor him duly on the occasion of his 60th birthday.

Mr. Sorin A. Huss was born in Bukarest, Romania on May 21, 1950. He attended a secondary school with emphasis on mathematic and scientific topics in Dachau near Munich and after his Abitur...

Technological Turf Wars: A Case Study of the Antivirus Industry
Technological Turf Wars: A Case Study of the Antivirus Industry

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that...

Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery
Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery

Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out response and recovery efforts following Hurricane Katrina. To assist government planning in this...

Agile Hiring
Agile Hiring

This book is an indispensable resource for everyone involved in the hiring process. That includes managers, human resources (HR) personnel, and most of all, the front line hiring folks. If you review résumés, conduct phone or on-site interviews, or if you are responsible for making offers to candidates, this book is...

Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy