Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
Switch: How to Change Things When Change Is Hard
Switch: How to Change Things When Change Is Hard

Why is it so hard to make lasting changes in our companies, in our communities, and in our own lives?

The primary obstacle is a conflict that’s built into our brains, say Chip and Dan Heath, authors of the critically acclaimed bestseller Made to Stick. Psychologists have discovered that our minds are ruled
...

Cloud and Virtual Data Storage Networking
Cloud and Virtual Data Storage Networking
Since I wrote The Green and Virtual Data Center (CRC Press, 2009), I have had the opportunity to meet and speak with thousands of information technology (IT) professionals around the world, both in person and virtually via different venues. Even as that last book was being printed, the ideas to be found in this new book were coming...
The Practice of Macro Social Work
The Practice of Macro Social Work

Intended for those who want to make a difference in today's modern society, this comprehensive book explores the theory and methods in nine arenas of macro social work at the community, organizational, societal, and global levels of practice. THE PRACTICE OF MACRO SOCIAL WORK, Fourth Edition, challenges readers to use their concern,...

Working with Coders: A Guide to Software Development for the Perplexed Non-Techie
Working with Coders: A Guide to Software Development for the Perplexed Non-Techie

Get introduced to the fascinating world inhabited by the professional software developer. Aimed at a non-technical audience, this book aims to de-obfuscate the jargon, explain the various activities that coders undertake, and analyze the specific pressures, priorities, and preoccupations that developers are prone to. In each case it offers...

In the Godfather Garden: The Long Life and Times of Richie "the Boot" Boiardo (Rivergate Regionals Collection)
In the Godfather Garden: The Long Life and Times of Richie "the Boot" Boiardo (Rivergate Regionals Collection)
In the Godfather Garden is the true story of the life of Richie “the Boot” Boiardo, one of the most powerful and feared men in the New Jersey underworld. The Boot cut his teeth battling the Jewish gang lord Abner Longy Zwillman on the streets of Newark during Prohibition and endured to become one of the East Coast’s...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Bayesian Statistics the Fun Way: Understanding Statistics and Probability with Star Wars, LEGO, and Rubber Ducks
Bayesian Statistics the Fun Way: Understanding Statistics and Probability with Star Wars, LEGO, and Rubber Ducks
Fun guide to learning Bayesian statistics and probability through unusual and illustrative examples.

Probability and statistics are increasingly important in a huge range of professions. But many people use data in ways they don't even understand, meaning they aren't getting the most from it. Bayesian
...
Reality Check: How Immersive Technologies Can Transform Your Business
Reality Check: How Immersive Technologies Can Transform Your Business

Discover THE next big competitive advantage in business: learn how augmented and virtual reality can put your business ahead.

Augmented reality (AR) and virtual reality (VR) are part of a new wave of immersive technologies that offer huge opportunities for businesses, across industries and regardless of
...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Quick Course in Microsoft Office Xp: Fast-Track Training Books for Busy People
Quick Course in Microsoft Office Xp: Fast-Track Training Books for Busy People
This guide provides clear, concise instruction and hands-on practice so you get the most out of Office XP. Learn the basics of Outlook, Access, Word, Excel, and PowerPoint, Publisher, FrontPage, Project, and Visio, then gain proficiency.

Quick Course in Microsoft Office XP provides clear, concise instruction and hands-on practice...

Information Systems: Achieving Success by Avoiding Failure
Information Systems: Achieving Success by Avoiding Failure
Despite people’s best efforts information systems are particularly prone to failure. Some systems never materialize, others appear late and/or over budget and those that are implemented often fail to deliver the promised levels of performance. The consequences of these failures affect people throughout the organization concerned and beyond,...
unlimited object storage image
Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy