|
|
|
|
Excel Advanced Report DevelopmentIf you're a SQL programmer or an experienced Excel user, here at last is the ultimate resource on developing reporting solutions with Excel. Focused on report development using OLTP databases, this book is packed with comprehensive information on both technical and strategic aspects. You'll thoroughly examine the main features of Excel's reporting... | | Configuring IPv6 for Cisco IOSConfiguring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting... | | Project Management DemystifiedLearn Project Management on time and under budget! "Project Management Demystified" is valuable for both the novice project manager and the experienced. For the novice, it is a great way to understand PM basics in an easy-to-understand and practical way. Personalized stories demonstrate both what to do and what not to do. Experienced... |
|
| | Biz-War and the Out-of-Power Elite: The Progressive-Left Attack on the CorporationIt is the argument of this book that the contemporary Progressive movement in the United States, designed to replace the Liberalism whose demise was the object and accomplishment of the Reagan Revolution, is the product of a series of strategic experiments and decisions by activists in organized labor, in the environmental and human rights... | | Data Warehousing OLAP and Data Mining
This book is intended for Information Technology (IT) professionals who have been
hearing about or have been tasked to evaluate, learn or implement data warehousing
technologies. This book also aims at providing fundamental techniques of KDD and Data
Mining as well as issues in practical use of Mining tools.
Far... |
|
| | Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book... | | Information Technology Outsourcing Transactions: Process, Strategies, and ContractsAn organized, methodical, real-world approach to the complex process of information technology outsourcing.
McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have... |
|
|
|
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |