Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unstoppable Teams: The Four Essential Actions of High-Performance Leadership
Unstoppable Teams: The Four Essential Actions of High-Performance Leadership

Three-time Navy SEAL platoon commander and founder of Perfect Fitness reveals how to put together teams that can accomplish any objective—by leveraging an unexpected set of values and priorities.

SEALs and civilians operate in extremely different environments, but what makes both kinds of teams excel comes
...

Military Identity and the Transition into Civilian Life: “Lifers
Military Identity and the Transition into Civilian Life: “Lifers

This book outlines the relationship between social identity theory and military to civilian transition, examining the mass movement of soldiers back into the civilian occupational world by considering literature specifically on role exit and in relation to the process of full-time military exit. The authors document a range of...

The Role of the Scroll: An Illustrated Introduction to Scrolls in the Middle Ages
The Role of the Scroll: An Illustrated Introduction to Scrolls in the Middle Ages

A beautifully illustrated, full-color guide to scrolls and their uses in medieval life.

Scrolls have always been shrouded by a kind of aura, a quality of somehow standing outside of time. They hold our attention with their age, beauty, and perplexing format. Beginning in the fourth century, the codex?or...

Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)
Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)

This book presents a rich compilation of real-world cases on digitalization, the goal being to share first-hand insights from respected organizations and to make digitalization more tangible. As virtually every economic and societal sector is now being challenged by emerging technologies, the digital economy is a highly...

Information Technology for Management: Emerging Research and Applications: 15th Conference, AITM 2018, and 13th Conference, ISM 2018, Held as Part of ... Notes in Business Information Processing)
Information Technology for Management: Emerging Research and Applications: 15th Conference, AITM 2018, and 13th Conference, ISM 2018, Held as Part of ... Notes in Business Information Processing)

This book constitutes extended selected papers from the 16th Conference on Advanced Information Technologies for Management, AITM 2018, and the 13th Conference on Information Systems Management, ISM 2018, held as part of the Federated Conference on Computer Science and Information Systems, FedCSIS, which took place in Poznan, Poland,...

Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Arguing with Zombies: Economics, Politics, and the Fight for a Better Future
Arguing with Zombies: Economics, Politics, and the Fight for a Better Future

An accessible, compelling introduction to today’s major policy issues from the New York Times columnist, best-selling author, and Nobel prize–winning economist Paul Krugman.

There is no better guide than Paul Krugman to basic economics, the ideas that animate much of our public...

Getting Started with Python: Understand key data structures and use Python in object-oriented programming
Getting Started with Python: Understand key data structures and use Python in object-oriented programming

Harness the power of Python objects and data structures to implement algorithms for analyzing your data and efficiently extracting information

Key Features

  • Turn your designs into working software by learning the Python syntax
  • Write robust code with a solid understanding of...
A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
This book is a third-party evaluation of H1N1 prevention and control effects in China. Based on the characteristic of H1N1 pandemic around the world and current public health management system in China, this book evaluates the comprehensive effects by considering the countermeasures, joint prevent and control mechanism operated by central and...
Cato the Younger: Life and Death at the End of the Roman Republic
Cato the Younger: Life and Death at the End of the Roman Republic
Marcus Porcius Cato ("the Younger") is most famous for being Julius Caesar's nemesis. His sustained antagonism was in large part responsible for pushing the Romans towards civil war. Yet Cato never wanted war even though he used the threat of violence against Caesar. This strategic gamble misfired as Caesar, instead of...
Children in Street Situations: A Concept in Search of an Object (Children’s Well-Being: Indicators and Research)
Children in Street Situations: A Concept in Search of an Object (Children’s Well-Being: Indicators and Research)
This book provides new insights on the lives of children in street situations by providing analyses from a qualitative perspective on the sociology of childhood. It proposes some insightful perspectives on the current discussion about the rights of children in street situations. It includes a unique selection of texts, which were...
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Result Page: 141 140 139 138 137 136 135 134 133 132 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy