Home | Amazing | Today | Tags | Publishers | Years | Search 
How To Talk So People Listen: The Real Key to Job Success
How To Talk So People Listen: The Real Key to Job Success

Whether making a presentation or dealing one on one, interacting at a meeting or just answering questions, do others listen when you talk? This book explains how to communicate successfully so people listen, understand, and are persuaded. It is a comprehensive guide to every aspect of communicating in the workplace and...

Bookkeeping For Dummies
Bookkeeping For Dummies

Accurate and complete bookkeeping is crucial to any business owner, but it’s also important to those who work with the business, such as investors, financial institutions, and employees. People both inside and outside the business all depend on a bookkeeper’s accurate recordings.

Bookkeeping For Dummies provides...

Pro SQL Server 2008 Policy-Based Management
Pro SQL Server 2008 Policy-Based Management

Pro SQL Server 2008 Policy-Based Management is critical for database administrators seeking in-depth knowledge on administering servers using the new policy-based management features introduced in SQL Server 2008. This book will cover everything from a basic introduction to policy-based management to creating your own custom policies...

American Cars 1946-1959: Every Model, Year by Year
American Cars 1946-1959: Every Model, Year by Year

From the resumption of automobile production at the close of World War II through the 1950s, the American auto industry would see the births and deaths of several manufacturers, great technological advances, and an era of dramatic styling as a prospering nation asserted its growing mobility. Cars of this period are among the most iconic...

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Network Experiments Manual for Peterson/Davie Computer Networks 4/e
Network Experiments Manual for Peterson/Davie Computer Networks 4/e

Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is to create an environment where networking professionals and students can visualize how networks work, utilizing a software tool that simulates the...

Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011
Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011

Rapid development of new technologies is leading to ever more versatile, multipurpose mobile devices, including 3G and 4G Internet-enabled cell phones. Wireless networking and wireless Internet access are developing and expanding on a global basis at a rapid rate. Meanwhile, RFID (radio frequency identification) will revolutionize wireless...

Open Government: Collaboration, Transparency, and Participation in Practice
Open Government: Collaboration, Transparency, and Participation in Practice

In a world where web services can make real-time data accessible to anyone, how can the government leverage this openness to improve its operations and increase citizen participation and awareness? Through a collection of essays and case studies, leading visionaries and practitioners both inside and outside of government share their...

Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks
Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

As wired networks are increasingly replaced with 802.11n wireless connections, enterprise users are shifting to centralized, next-generation architectures built around Wireless LAN Controllers (WLC). These networks will increasingly run business-critical voice, data, and video applications that once required wired...

Oracle Business Intelligence: The Condensed Guide to Analysis and Reporting
Oracle Business Intelligence: The Condensed Guide to Analysis and Reporting

This book is a quick guide to getting started with Oracle Business Intelligence SE platform that will answer common business questions and help you make quick business decisions. The examples in this book will help you prepare the database for analysis and create business reports in no time. If you are an business analyst, a report builder, a...

Learning Nagios 3.0
Learning Nagios 3.0

Nagios is a tool for system and network monitoring. It constantly checks other machines and various services on those machines. The main purpose of system monitoring is to detect and report any system not working properly as soon as possible--so that you are aware of problems before a user runs into them. It is a modular and flexible solution...

The Business Analyst's Guide to Oracle Hyperion Interactive Reporting 11
The Business Analyst's Guide to Oracle Hyperion Interactive Reporting 11

The Oracle Hyperion Interactive reporting product is a highly customizable and powerful business intelligence software product. The software is one of the many products in the Oracle Business Intelligence software suite, an industry-leading business intelligence solution. The product provides users with advanced business intelligence...

Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy