Home | Amazing | Today | Tags | Publishers | Years | Search 
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World

Traditional learning as we know it has evolved. Gone are the days when students need to travel to a physical location to learn. With the increase of mobile devices and broadband Internet services, learning can take place anywhere at any time. Effective Digital Learning is here to help you make the paradigm shift with...

Agile Workforce Planning: How to Align People with Organizational Strategy for Improved Performance
Agile Workforce Planning: How to Align People with Organizational Strategy for Improved Performance

As business priorities change and focus shifts to address arising issues, HR professionals need to be able to reorganize talent swiftly and plan for future needs to enable the business to succeed. It covers how to forecast organizational demand for people, resources and skills, analyze the gap between supply and demand and most...

Pro Spring MVC with WebFlux: Web Development in Spring Framework 5 and Spring Boot 2
Pro Spring MVC with WebFlux: Web Development in Spring Framework 5 and Spring Boot 2

Explore the designs of the Spring MVC and WebFlux frameworks, and apply similar designs and techniques to your own code. Along with detailed analysis of the code and functionality, this book includes numerous tips and tricks to help you get the most out of Spring MVC, WebFlux, and Java-based web application development in general...

Distributed Services with Go: Your Guide to Reliable, Scalable, and Maintainable Systems
Distributed Services with Go: Your Guide to Reliable, Scalable, and Maintainable Systems

This is the book for Gophers who want to learn how to build distributed systems. You know the basics of Go and are eager to put your knowledge to work. Build distributed services that are highly available, resilient, and scalable. This book is just what you need to apply Go to real-world situations. Level up your...

Blockchain for 5G-Enabled IoT: The new wave for Industrial Automation
Blockchain for 5G-Enabled IoT: The new wave for Industrial Automation
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the...
After Nationalism: Being American in an Age of Division (Radical Conservatisms)
After Nationalism: Being American in an Age of Division (Radical Conservatisms)

Nationalism is on the rise across the Western world, serving as a rallying cry for voters angry at the unacknowledged failures of globalization that has dominated politics and economics since the end of the Cold War. In After Nationalism, Samuel Goldman trains a sympathetic but skeptical eye on the trend, highlighting the deep...

Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity

Are you looking for the right Guide to improve your technical skills in programming and cybersecurity?

Would you like to start your own business or look for a job with better knowledge in computer programming and data protection?

Would you like to be sure to have in your hands a manual...

LGBTI Asylum Seekers and Refugees from a Legal and Political Perspective: Persecution, Asylum and Integration
LGBTI Asylum Seekers and Refugees from a Legal and Political Perspective: Persecution, Asylum and Integration
This book addresses the ‘three moments’ in lesbian, gay, bisexual, transgender and intersex (LGBTI) asylum seekers’ and refugees’ efforts to secure protection: The reasons for their flight, the Refugee Status Determination process, and their integration into the host community once they are recognized refugee...
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies

The concept of Smart Cities is accurately regarded as a potentially transformative power all over the world. Bustling metropolises infused with the right combination of the Internet of Things, artificial intelligence, big data, and blockchain promise to improve both our daily lives and larger structural operations at a city...

They Call Me George: The Untold Story of The Black Train Porters
They Call Me George: The Untold Story of The Black Train Porters

A CBC BOOKS MUST-READ NONFICTION BOOK FOR BLACK HISTORY MONTH

Nominated for the Toronto Book Award

Smartly dressed and smiling, Canada’s black train porters were a familiar sight to the average passenger?yet their minority status...

AWS Certified Solutions Architect Practice Tests: Associate SAA-C01 Exam
AWS Certified Solutions Architect Practice Tests: Associate SAA-C01 Exam

NEW!  We've added two new practice exams to the online test bank to cover concepts in the new certification Exam SAA-C02. To help you prepare for taking the exam, the updated test bank now includes THREE practice exams PLUS all the domain-by-domain questions. Over 1000 questions to test your...

Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy