Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mining Amazon Web Services: Building Applications with the Amazon API
Mining Amazon Web Services: Building Applications with the Amazon API

Profit with Amazon Web Services—as a Buyer, Seller, or Independent Developer

In a few short years, Amazon has evolved from an online bookstore into a complex marketplace comprised of thousands of vendors, millions of customers, and an ever-widening selection of products.
...

Compendium of the Microbiological Spoilage of Foods and Beverages (Food Microbiology and Food Safety)
Compendium of the Microbiological Spoilage of Foods and Beverages (Food Microbiology and Food Safety)

Though much of our collective knowledge on microbiological spoilage has accrued over the past century and is still valid today, there is no one place to find this information.

Compendium of the Microbiological Spoilage of Foods and Beverages is the first book to collect this important information. This book is edited by William H....

Linking Enterprise Data
Linking Enterprise Data

Enterprise data is growing at a much faster rate than traditional technologies allow. New enterprise architectures combining existing technologies are desperately needed. This book suggests a way forward by applying new techniques of the World Wide Web to enterprise information systems.

Linking Enterprise Data is an edited volume...

Best Laid Plans: The Tyranny of Unintended Consequences and How to Avoid Them
Best Laid Plans: The Tyranny of Unintended Consequences and How to Avoid Them

Historian and author Daniel Boorstin noted, "The unintended consequences of man's enterprises have and will always be more potent, more widespread, and more influential than those he intended." Today, a Google web search for "unintended consequences" summons nearly two million pages citing the unexpected impacts of...

The Tax-Free Exchange Loophole: How Real Estate Investors Can Profit from the 1031 Exchange
The Tax-Free Exchange Loophole: How Real Estate Investors Can Profit from the 1031 Exchange

Discover the Greatest Investment Tool of All Time!

The tax breaks and loopholes built into real estate make it one of the most profitable investments in the world. In fact, the real estate tax exchange loophole--known as the 1031 Exchange--is one of the greatest tax loopholes in existence. This loophole allows a real estate
...

Beginning SQL Server R Services: Analytics for Data Scientists
Beginning SQL Server R Services: Analytics for Data Scientists

Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...

Network+ 2005 Q&A
Network+ 2005 Q&A
"Network+ 2005 Q&A" is a straightforward, cut-and-dry guide to preparing for the Network+ exam. Providing 800 questions and answers for the new Network+ exam, this no-fluff guide is designed to encourage self-study. Test your skills as you work through each question and then check your answers at the end of each chapter. You`ll get...
Enterprise-Wide Change: Superior Results Through Systems Thinking (Jossey-Bass Series)
Enterprise-Wide Change: Superior Results Through Systems Thinking (Jossey-Bass Series)

Leave piecemeal strategic change approaches behind and learn how to plan, facilitate, and integrate your change efforts for lasting success. Enterprise-Wide Change takes you through the "Rollercoaster of Change," showing you how to deal with resistance, regard skeptics as your best friends, and build a buy-in and stay-in strategy among...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

The Power of Real-Time Social Media Marketing: How to Attract and Retain Customers and Grow the Bottom Line in the Globally Connected World
The Power of Real-Time Social Media Marketing: How to Attract and Retain Customers and Grow the Bottom Line in the Globally Connected World

Today's Hottest Trends for On-the-Spot Marketing!

"A must read for media and marketers.”
—Alan Cohen, CEO, OMD USA

"What do fish tacos, data storage, and disaster relief all have in common? Each has harnessed the power of marketing that amplifies via the real-time social web....

IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Corporate Restructuring: From Cause Analysis to Execution
Corporate Restructuring: From Cause Analysis to Execution

Corporate Restructuring is a practical approach to rescuing troubled companies and driving underperforming companies to top performance. It combines proven restructuring strategies with rigorous theoretical analysis. This book explains how to set and achieve asset, staffing, sales and profit goals. Topics include diagnostic tools to identify...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy