Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
The failure to adequately address the victims and the emotional dimensions of corporate problems changes adverse events into crises and catastrophes. This book aims to arm employees and managers with the tools necessary to manage emotional distress.

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line is an...

Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)

My objective in writing this book was to produce a general, comprehensive textbook that treats all the essential core areas of cryptography. Although many books and monographs on cryptography have been written in recent years, the majority of them tend to address specialized areas of cryptography. On the other hand, many of the existing general...

Grammatical Picture Generation: A Tree-Based Approach
Grammatical Picture Generation: A Tree-Based Approach
This book introduces the reader to the notions, the techniques, and the theory of grammatical picture generation, a research field focusing on formal systems that describe sets of pictures by means of syntactic rules. The book presents important types of picture generators, using a tree-based approach to stress their common algorithmic basis, the...
Excel 2007 Workbook For Dummies (Computer/Tech)
Excel 2007 Workbook For Dummies (Computer/Tech)
From formulas to functions to the latest features — practice and plan Excel tasks with ease

Confused by Excel? Want to make the most of its capabilities? No worries — this hands-on workbook gets you up to speed in a step-by-step manner. From navigating the new user interface and creating your first spreadsheet to using formulas,...

Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Giving a sound technical introduction to 3GPP LTE and SAE, this book explains the decisions taken during standardization while also examining the likely competition for LTE such as HSPA+ and WiMAX. As well as looking at next generation network technologies, Beyond 3G - Bringing Networks, Terminals and the Web Together describes the latest...
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Computational Intelligence and Informatics: Principles and Practice (Studies in Computational Intelligence)
Computational Intelligence and Informatics: Principles and Practice (Studies in Computational Intelligence)

This volume contains a careful selection of papers that are based on and are extensions of corresponding lectures presented at the jubilee conference. The main subject area called Computational Intelligence includes diverse topics. Therefore, we offer snapshots rather than a full coverage of a small particular subject to the interested...

Relational Theory for Computer Professionals (Theory in Practice)
Relational Theory for Computer Professionals (Theory in Practice)

All of today’s mainstream database products support the Sql language, and relational theory is what Sql is supposed to be based on. But are those products truly relational? Sadly, the answer is no. This book shows you what a real relational product would be like, and how and why it would be so much better than what’s...

Medicine Across Cultures: History and Practice of Medicine in Non-Western Cultures
Medicine Across Cultures: History and Practice of Medicine in Non-Western Cultures

This work deals with the medical knowledge and beliefs of cultures outside of the United States and Europe. In addition to articles surveying Islamic, Chinese, Native American, Aboriginal Australian, Indian, Egyptian, and Tibetan medicine, the book includes essays on comparing Chinese and western medicine and religion and medicine. Each essay...

Textbook of Healthcare Ethics
Textbook of Healthcare Ethics

1 Historical Introduction INTRODUCTION This chapter is mainly about the history of medicine and its ethics. As usually c- ceived, history is retrograde: It is what happened yesterday, and, much as we may try, it is what happened yesterday seen with a set of today’s eyes. Trying to understand yesterday’s culture may help us put on...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
unlimited object storage image
Result Page: 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy