Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ahead of Her Time: How a One-Woman Startup Became a Global Publishing Brand (Conscious Leadership i n Practice)
Ahead of Her Time: How a One-Woman Startup Became a Global Publishing Brand (Conscious Leadership i n Practice)
Inspiring memoir by entrepreneur Judy Piatkus, who launched her startup at a time when mothers were not expected to be businesswomen and grew it into a highly successful international brand. The story of a pioneer of female entrepreneurship, values-led management and the rise of personal development publishing.

Judy
...
Risk Management and Capital Adequacy
Risk Management and Capital Adequacy

A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines

For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Trading ETFs: Gaining an Edge with Technical Analysis
Trading ETFs: Gaining an Edge with Technical Analysis

A comprehensive catalog of exchange-traded funds and insights into successful trading techniques

This Second Edition of the bestselling Trading ETFs offers an updated version of the definitive guide to this vital part of the capital markets. It contains numerous new examples of the techniques that author Deron...

Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Advances in Mathematical Modeling for Reliability
Advances in Mathematical Modeling for Reliability
Advances in Mathematical Modeling for Reliability discusses fundamental issues on mathematical modeling in reliability theory and its applications. Beginning with an extensive discussion of graphical modeling and Bayesian networks, the focus shifts towards repairable systems: a discussion about how sensitive availability calculations parameter...
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition
Docker on Windows: From 101 to production with Docker on Windows, 2nd Edition

Learn how to run new and old applications in Docker containers on Windows - modernizing the architecture, improving security and maximizing efficiency.

Key Features

  • Run .NET Framework and .NET Core apps in Docker containers for efficiency, security and portability
  • Design...
The Complete Direct Investing Handbook: A Guide for Family Offices, Qualified Purchasers, and Accredited Investors (Bloomberg Financial)
The Complete Direct Investing Handbook: A Guide for Family Offices, Qualified Purchasers, and Accredited Investors (Bloomberg Financial)

The practical guide to direct investing strategies and best practices

The Complete Direct Investing Handbook provides comprehensive guidelines, principles and practical perspectives on this increasingly attractive private equity investment strategy. Interviews with leading family office investors, qualified private...

unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy