Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Trust, Institutions and Managing Entrepreneurial Relationships in Africa: An SME Perspective (Palgrave Studies of Entrepreneurship in Africa)
Trust, Institutions and Managing Entrepreneurial Relationships in Africa: An SME Perspective (Palgrave Studies of Entrepreneurship in Africa)

This book highlights the importance of understanding how trust and indigenous African cultural institutions enhance the development of entrepreneurial networks and relationships in Africa. Drawing on institutional theories, the author re-examines the way that entrepreneurial behaviour can be shaped, with a focus on trust, networks...

Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
Broadband Strategies Handbook (World Bank Publications)
Broadband Strategies Handbook (World Bank Publications)

The world is shifting from narrowband to broadband. Services that were only available in the form of static, text-based websites a decade ago are now offered in full-motion, high-definition video. A whole new generation of Internet entrepreneurs is ready to take their ideas to the stock market.

Nevertheless, a gap remains between...

When the Market Moves, Will You Be Ready?
When the Market Moves, Will You Be Ready?

The First Hands-On Guidebook for Macrowave Investing--Today's Most Potent, Strategically Advanced Event-Trading Technique

"Macro" events play a large part in determining movement in markets, sectors, and individual stocks. Often these events are preceded by signals that a price-impacting event is about to...

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
Data Protection in a Profiled World
Data Protection in a Profiled World

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data...

Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016
Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016

Equip yourself with the most complete and comprehensive preparation experience for Identity with Windows Server 2016: Microsoft 70-742 exam.

Key Features

  • Helps you demonstrate real-world mastery of Windows Server 2016 identity features and functionality and prepare for 70-742
  • ...
The Psychology of Entertainment Media: Blurring the Lines Between Entertainment and Persuasion
The Psychology of Entertainment Media: Blurring the Lines Between Entertainment and Persuasion
The Psychology of Entertainment Media provides a cutting-edge look at how entertainment media affects its viewers, both in intended and unintended ways, and the psychological processes that underlie these effects. The collection represents an international, multidisciplinary investigation of an age-old process--persuasion--in a relatively...
Privacy Protection for E-Services
Privacy Protection for E-Services
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material,...
Sarbanes-Oxley and Nonprofit Management: Skills, Techniques, and Methods
Sarbanes-Oxley and Nonprofit Management: Skills, Techniques, and Methods
Is your nonprofit organization ready for increased scrutiny, reporting requirements, regulations, and increased expectations from donors? This combination reference/workbook prepares you and shows you how Sarbanes-Oxley best practices can benefit your organization. It includes:
  • A structured description of Sarbanes-Oxley and its...
Clear Blogging: How People Blogging Are Changing the World and How You Can Join Them
Clear Blogging: How People Blogging Are Changing the World and How You Can Join Them
Almost overnight, blogging has become a social, political, and business force to be reckoned with. Your fellow students, workers, and competitors are joining the blogosphere--and making money, influencing elections, getting hired, growing market share, and having fun--to the tune of 8,000 new bloggers a day.

Clear Blogging sets out to...

unlimited object storage image
Result Page: 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy