Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Turn eBay Data into Dollars
Turn eBay Data into Dollars
You already have the answer to boosting your eBay sales and profits...

You just have to know where to look. Turn eBay Data into Dollars shows you how to use the powerful tools available on eBay to sell smarter and make more money on every sale. Learn to mine sales data from tools such as Andale Research Tools, Terapeak, and...

Public Speaking and Presentations Demystified
Public Speaking and Presentations Demystified

Take the mystery out of effective, fear-free public speaking

This latest book in the Demystified series takes the confusion out of preparing for and delivering speeches and presentations. Public Speaking and Presentations Demystified walks you step-by-step through the fundamentals of the subject and provides you...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

A First Systems Book: Technology and Management (Second Edition)
A First Systems Book: Technology and Management (Second Edition)

To tackle the complex problems of life today, we need to coordinate a wide range of expertise. Systems concepts and methods offer the means of integrating the contributions of specialists, including managers, scientists and engineers. The book introduces simple yet sound concepts and a language understandable to all concerned. Its methods of...

The Truth About Being a Leader
The Truth About Being a Leader

Praise for The Truth About Being a Leader

“If you ever met Dr. Otazo, you certainly would read her new Truth book. She is as she writes—engaging, pithy, memorable. Take ‘Truth 33: Questions Unite; Answers Divide.’ Now ain’t that the truth....

Beginning Windows 8 Data Development: Using C# and JavaScript (Expert's Voice in Windows)
Beginning Windows 8 Data Development: Using C# and JavaScript (Expert's Voice in Windows)

This book introduces novice developers to a range of data access strategies for storing and retreiving data both locally and remotely. It provides you with a range of fully working data access solutions and the insight you need to know when, and how, to apply each of the techniques to best advantage.

Focussing specifically on how...

Management Consulting In Practice: Award-Winning International Case Studies
Management Consulting In Practice: Award-Winning International Case Studies

This important new book explores the relationship between top management consultant teams and their clients. Through a series of case studies, from both the private and public sectors, it presents best practice in consulting at the sharp end of contemporary management across all disciplines including change management, business strategy,...

Essentials of Child Psychopathology (Essentials of Behavioral Science Series)
Essentials of Child Psychopathology (Essentials of Behavioral Science Series)
The only concise, comprehensive overview of child psychopathology covering theory, assessment, and treatment as well as issues and trends

Essentials of Child Psychopathology provides students and professionals with a comprehensive overview of critical conceptual issues in child and adolescent psychopathology. The text covers the major theories,...

Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)

The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....

Web Design All-in-One For Dummies
Web Design All-in-One For Dummies

All you need to know on web design in a thorough new edition

If you want just one complete reference on web design, this book is it. The newest edition of this essential guide features 650+ pages on the latest tools and new web design standards, such as HTML5, CSS 3, and other core technologies and page-building strategies....

unlimited object storage image
Result Page: 147 146 145 144 143 142 141 140 139 138 137 136 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy