Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Security (3rd Edition)
Maximum Security (3rd Edition)
Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. In one book, security managers and others interested in computer and network security can learn everything the hackers already know,...
Supply Chain Excellence: A Handbook for Dramatic Improvement Using the SCOR Model
Supply Chain Excellence: A Handbook for Dramatic Improvement Using the SCOR Model

The first resource available presenting the unique SCOR (Supply Chain Operations Reference) model developed by the Supply-Chain Council, Supply Chain Excellence takes you step-by-step through every moment in the supply chain project lifecycle.

Based on the SCOR Project Roadmap, the book shows how a company can achieve core...

Services Blueprint: Roadmap for Execution (Addison-Wesley Information Technology Series)
Services Blueprint: Roadmap for Execution (Addison-Wesley Information Technology Series)
The Need for a Services Blueprint

As business processes increasingly become digitized, the role of management is changing from technology users to the reluctant “architects of services blueprints.” They need answers to strategic questions such as:

  • What kind of...
Professional Azure SQL Database Administration: Equip yourself with the skills you need to manage and maintain your SQL databases on the Microsoft cloud
Professional Azure SQL Database Administration: Equip yourself with the skills you need to manage and maintain your SQL databases on the Microsoft cloud

Discover how you can migrate a traditional on-premise SQL server database to a cloud-based solution with Microsoft Azure. Built with database administrators in mind, this book emulates different scenarios you might come across while working with large, complex SQL database migrations and provides solutions for effectively managing...

Rootkits for Dummies (Computer/Tech)
Rootkits for Dummies (Computer/Tech)
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
Exporting: The Definitive Guide to Selling Abroad Profitably
Exporting: The Definitive Guide to Selling Abroad Profitably

"Delaney's excellent book truly is the definitive guide. It easily and thoroughly explains everything you need to know." Steve Strauss, USA Today

"Exporting: The Definitive Guide to Selling Abroad Profitably is generously sprinkled with Notes and Tips that deliver concise, insightful bursts of...

The Book of Overclocking: Tweak Your PC to Unleash Its Power
The Book of Overclocking: Tweak Your PC to Unleash Its Power

The Book of Overclocking is the definitive guide to the art of running a PC’s processor faster than the manufacturer ever intended. Not only can overclocking help you squeeze another year or two out of older hardware, but maximizing your PC’s performance is also a lot of fun. Whether you’re a veteran overclocker or a...

Salesforce.com Secrets of Success: Best Practices for Growth and Profitability
Salesforce.com Secrets of Success: Best Practices for Growth and Profitability

Drive Better Productivity and Increase Saleswith Salesforce.com–Starting Now

 

Discover Real-World Best PracticesWithout Paying Expensive Consultants

 

iExec Enterprise Essentials Companion Guide
iExec Enterprise Essentials Companion Guide
iExec Enterprise Essentials Companion Guide is the official print companion  to the Cisco® Entrepreneur Institute’s  new iExec Enterprise Essentials curriculum—innovative IT-related business education designed to help you transform organizations through the strategic use of IT and Internet applications. Working...
Never Too Old to Get Rich: The Entrepreneur's Guide to Starting a Business Mid-Life
Never Too Old to Get Rich: The Entrepreneur's Guide to Starting a Business Mid-Life

Start a successful business mid-life

When you think of someone launching a start-up, the image of a twenty-something techie probably springs to mind. However, Gen Xers and Baby Boomers are just as likely to start businesses and reinvent themselves later in life. Never Too Old to Get Rich is an exciting...

Extreme Programming Applied: Playing to Win
Extreme Programming Applied: Playing to Win

Extreme Programming (XP) is a significant departure from traditional software development methods, one that is ushering in a change for both developers and business people. It is an agile methodology, which enables highly productive teams to produce quality software from rapidly changing or unclear requirements. XP is disciplined software...

Manager's Guide to Compliance
Manager's Guide to Compliance
"Wide perspectives and best practices combined deliver a punch that will knock your 'SOX' off! The author has blended together a critical mix necessary for effectively handling the requirements of SOX."
—Rob Nance, Publisher, AccountingWEB, Inc.

"Robust compliance and corporate governance is an absolute necessity...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy