Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Warrior
Security Warrior

This book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will...

Special Edition Using Microsoft Office 2003, Student-Teacher Edition
Special Edition Using Microsoft Office 2003, Student-Teacher Edition

Microsoft Office Software has been around, in one version or another, for more than a decade. Wethat is, Woody and Edhave been writing about Office since the very beginning. In books, on the Web, and in magazine articles and e-mail newsletters, we've guided lost souls through the Office labyrinth, held Microsoft's feet to the...

Managers Not MBAs: A Hard Look at the Soft Practice of Managing and Management Development
Managers Not MBAs: A Hard Look at the Soft Practice of Managing and Management Development
In his new book, Henry Mintzberg offers a sweeping critique of how managers are educated and how management, as a result, is practiced, and makes thoughtful-and controversial-recommendations for reforming both. Management, Mintzberg writes, is a practice that blends a great deal of craft (experience) with a certain amount of art (insight) and some...
Best Practices in Leadership Development and Organization Change
Best Practices in Leadership Development and Organization Change
The purpose of this best practices handbook is to provide you with all of the
most current and necessary elements and practical “how-to” advice on how
to implement a best practice change or leadership development initiative
within your organization. The handbook was created to provide you a current
twenty-first
...
Sams Teach Yourself OpenOffice.org All In One
Sams Teach Yourself OpenOffice.org All In One
An alternative for Microsoft Office and StarOffice users has arrived in the form of OpenOffice.org. If you are part of the growing number of people who are making the switch from Microsoft Office or StarOffice to the free OpenOffice.org 1.1 suite, Sams Teach Yourself OpenOffice.org All In One is a must-have tool....
Homicide in the Biblical World
Homicide in the Biblical World
Homicide in the Biblical World analyses the treatment of homicide in the Hebrew Bible and demonstrates that it is directly linked to the unique social structure and religion of ancient Israel. Close parallels between biblical law and ancient Near Eastern law are evident in the laws of the ox that gored and the pregnant woman who is assaulted, but,...
Hacking Knoppix (ExtremeTech)
Hacking Knoppix (ExtremeTech)
Knoppix is so cool. It's easy to use, ultra-portable, and doesn't care what platform you're using. It camps on your system without canceling out your regular installation or messing with your files. And it's really fun to play with. Here are all kinds of ways to customize Knoppix for your particular needs, plus the scoop on various Knoppix distros....
Mastering Microsoft Exchange Server 2003
Mastering Microsoft Exchange Server 2003
All the Documentation You Need for Successfully Deploying Exchange Server 2003

Author Barry Gerber shares his extensive real-world experience in...

TiVo Hacks
TiVo Hacks

Forget all you think you know about watching television. Throw out the concepts of channels and lineups. VCR+ codes, your daily paper's TV listings, even the ubiquitous TV Guide need not apply. Primetime is a ghost of television's past.

Secede from the tyranny of the TV grid. Gone are the...

Design Representation
Design Representation
There can be no design activity without representation. Ideas must be represented if
they are to be shared with others, even shared with oneself! Different representational
modes and strategies afford distinctive opportunities for reading or for transforming
design ideas. We believe Design Thinking Research must address these and...
Practical VoIP Security
Practical VoIP Security
The business of securing our private data is becoming more important and more relevant
each day.The benefits of electronic communication come with proportionate
risks. Critical business systems can be and are compromised regularly, and are used
for illegal purposes.There are many instances of this: Seisint (Lexis-Nexis research),...
Essentials of Research Design and Methodology (Essentials of Behavioral  Science)
Essentials of Research Design and Methodology (Essentials of Behavioral Science)
Master the essential skills for designing and conducting a successful research project

Essentials of Research Design and Methodology contains practical information on how to design and conduct scientific research in the behavioral and social sciences. This accessible guide covers basic to advanced concepts in a clear, concrete, and readable...

Result Page: 325 324 323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy