Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile Workforce Planning: How to Align People with Organizational Strategy for Improved Performance
Agile Workforce Planning: How to Align People with Organizational Strategy for Improved Performance

As business priorities change and focus shifts to address arising issues, HR professionals need to be able to reorganize talent swiftly and plan for future needs to enable the business to succeed. It covers how to forecast organizational demand for people, resources and skills, analyze the gap between supply and demand and most...

Instant Mock Testing with PowerMock
Instant Mock Testing with PowerMock

Discover unit testing using PowerMock

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Understand how to test unit code using PowerMock, through hands-on-examples
  • Learn how to avoid unwanted behaviour of code using...
An Introduction to Object-Oriented Programming with Visual Basic .NET
An Introduction to Object-Oriented Programming with Visual Basic .NET

As you work your way through An Introduction to Object-Oriented Programming with Visual Basic .NET, you'll learn how to analyze the business requirements of an application, model the objects and relationships involved in the solution design and, finally, implement the solution using Visual Basic .NET. Along the way you'll also...

Making Enterprise Risk Management Pay Off: How Leading Companies Implement Risk Management
Making Enterprise Risk Management Pay Off: How Leading Companies Implement Risk Management

Lessons in risk management from world-class practitioners.

Risk managers can no longer operate in a vacuum: they must understand all the risks that impact today's enterprise, and involve all of the firm's leaders in managing those risks. Enlightened companies are meeting these challenges through enterprise risk management: a set of...

Proceedings of the 4th International Congress of Automotive and Transport Engineering (AMMA 2018) (Proceedings in Automotive Engineering)
Proceedings of the 4th International Congress of Automotive and Transport Engineering (AMMA 2018) (Proceedings in Automotive Engineering)
We now live in the most interesting and by far the most dynamic period ever since the automobile was invented. The industrial revolution, the Internet era, the digital world all collide with the most beloved not living member of our families, the automobile.

We, the automotive engineers, now have
...
Flip the Funnel: How to Use Existing Customers to Gain New Ones
Flip the Funnel: How to Use Existing Customers to Gain New Ones

Why customer retention is the new acquisition

If there's anything the recession of 2009 taught us, it was the importance of investing in our customers, but when was this any different? So says Joseph Jaffe, bestselling author of Life After the 30-Second Spot and Join the Conversation, and a leading expert and...

Deploying Microsoft Forefront Unified Access Gateway 2010
Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

Sustainable Technology Development
Sustainable Technology Development

In the time it takes to read this sentence, about fifteen people will be added to the world's population.  Read the sentence again, and there will be thirty. Tomorrow, each of these people will be demanding greater prosperity. Production and consumption are increasing fast but will have to grow even faster in the future to keep up...

FileNet: A Consultant's Guide to Enterprise Content Management
FileNet: A Consultant's Guide to Enterprise Content Management
"As a Project Manager, I appreciate not only the coverage Groff and Jones have given to each system but also how they have impressed upon the viewer the linkage between systems. This book extends learning opportunities in many ways and from top to bottom it assumes nothing. Each chapter is written to provide a general knowledge and combines...
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
 
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy