Home | Amazing | Today | Tags | Publishers | Years | Search 
Pharmaceutical Project Management, Second Edition (Drugs and the Pharmaceutical Sciences)
Pharmaceutical Project Management, Second Edition (Drugs and the Pharmaceutical Sciences)
This second edition of Pharmaceutical Project Management is published one decade after the first edition. What has changed over the past decade in drug development? Actually, a lot. The move to outsourcing has intensified and the successful management of relationships between sponsor and contractor is recognized to be a...
GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Microsoft Windows Networking Essentials
Microsoft Windows Networking Essentials

Computers are very common today, and just about any computer is connected to a network. People with the knowledge and expertise to configure and maintain networks are needed in any organization.

IT administration starts with network administration in most organizations. If the computers can’t communicate on the network,...

Social Media Playbook for Business: Reaching Your Online Community with Twitter, Facebook, LinkedIn, and More
Social Media Playbook for Business: Reaching Your Online Community with Twitter, Facebook, LinkedIn, and More

Social media can be an incredibly powerful marketing tool that brings a company or organization huge rewards. But for beginners in this new world, the potential risks are also high. Consumers are particularly passionate in the online world; the most active social networkers are poised to be your brand's gushing fans—or your most...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

SharePoint 2010 for Project Management
SharePoint 2010 for Project Management
Do you find yourself asking for more time whenever you work on a project? Do you ever get the extra time you asked for? Well, if you’re like me, you rarely get the extra time you need from your customers. This got me thinking about how I can buy more time for my projects. I decided to find out if I could gain more time by reducing...
Software Engineering: Theory and Practice (4th Edition)
Software Engineering: Theory and Practice (4th Edition)
Software engineering has come a long way since 1У6Х. when the term was first used at a NATO conference. And software itself has entered our lives in ways that few had anti cipated, even a decade ago. So a firm grounding in software engineering theory and practice is essential for understanding how to build good software and...
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)

CD FEATURES More Than 200 PRACTICE QUESTIONS

 

CompTIA® Security+ Exam Cram, Third Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for...

The Engaging Leader: Winning with Today's Free Agent Workforce
The Engaging Leader: Winning with Today's Free Agent Workforce
During the summer of 1999, I was reading about the collapse of the Colorado Rockies baseball team under manager Jim Leyland. Leyland came to Colorado as a high-priced savior, but he and the team never meshed. Things got so bad that he announced his resignation before the first season was over. This came as a mystery to the...
Programming Google App Engine
Programming Google App Engine
On the Internet, popularity is swift and fleeting. A mention of your website on a popular blog can bring 300,000 potential customers your way at once, all expecting to find out who you are and what you have to offer. But if you’re a small company just starting out, your hardware and software aren’t...
Result Page: 50 49 48 47 46 45 44 43 42 41 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy