|
|
|
|
Network Warrior
The examples used in this book are taken from my own experiences, as well as from
the experiences of those with or for whom I have had the pleasure of working. Of course,
for obvious legal and honorable reasons, the exact details and any information that
might reveal the identities of the other parties involved have been changed. ... | | Switch: How to Change Things When Change Is Hard
Why is it so hard to make lasting changes in our companies, in our communities, and in our own lives?
The primary obstacle is a conflict that’s built into our brains, say Chip and Dan Heath, authors of the critically acclaimed bestseller Made to Stick. Psychologists have discovered that our minds are ruled... | | Cloud and Virtual Data Storage Networking
Since I wrote The Green and Virtual Data Center (CRC Press, 2009), I have had the
opportunity to meet and speak with thousands of information technology (IT) professionals
around the world, both in person and virtually via different venues. Even as
that last book was being printed, the ideas to be found in this new book were coming... |
|
The Practice of Macro Social Work
Intended for those who want to make a difference in today's modern society, this comprehensive book explores the theory and methods in nine arenas of macro social work at the community, organizational, societal, and global levels of practice. THE PRACTICE OF MACRO SOCIAL WORK, Fourth Edition, challenges readers to use their concern,... | | Working with Coders: A Guide to Software Development for the Perplexed Non-Techie
Get introduced to the fascinating world inhabited by the professional software developer. Aimed at a non-technical audience, this book aims to de-obfuscate the jargon, explain the various activities that coders undertake, and analyze the specific pressures, priorities, and preoccupations that developers are prone to. In each case it offers... | | |
|
|
The Tao of Network Security Monitoring : Beyond Intrusion DetectionEvery network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?
... | | Quick Course in Microsoft Office Xp: Fast-Track Training Books for Busy PeopleThis guide provides clear, concise instruction and hands-on practice so you get the most out of Office XP. Learn the basics of Outlook, Access, Word, Excel, and PowerPoint, Publisher, FrontPage, Project, and Visio, then gain proficiency.
Quick Course in Microsoft Office XP provides clear, concise instruction and hands-on practice... | | Information Systems: Achieving Success by Avoiding FailureDespite people’s best efforts information systems are particularly prone to failure. Some systems never materialize, others appear late and/or over budget and those that are implemented often fail to deliver the promised levels of performance. The consequences of these failures affect people throughout the organization concerned and beyond,... |
|
|
Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 |