Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Azure and ASP.NET MVC Migration
Windows Azure and ASP.NET MVC Migration
Deciding to take the leap from one technology to another is a difficult one. You face the risk of improper implementation of the technology, which can cause performance issues. You also face possible impact to business logic, which can produce disruption to your customers and partners. Many core business processes were written many years ago and...
Rethinking Enterprise Storage: A Hybrid Cloud Model
Rethinking Enterprise Storage: A Hybrid Cloud Model
Just as the Internet has fundamentally changed many industries, cloud computing is fundamentally changing the information technology industry, including infrastructures such as enterprise data storage. This book is about one of the new infrastructure game changers—a storage architecture called hybrid cloud storage that was...
50 Math and Science Games for Leadership
50 Math and Science Games for Leadership

Did you like Math or Science in school? Have you played games that stimulated your thought processes for Math and Science? Trying to be creative in your Math, Science or leadership class? Can leadership be taught? Is leadership an Art or a Science or Math? Seeking to impact your training program with creative games? A primer for leadership...

Managing Risk and Information Security: Protect to Enable
Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on is often beyond what they have been prepared for. The nature of securing an enterprise is daunting and overwhelming. There are no simple checklists or roadmaps for success. Many of the technical security skills a CISO has acquired during the early...
Business Organizations and Collaborative Web: Practices, Strategies and Patterns (Premier Reference Source)
Business Organizations and Collaborative Web: Practices, Strategies and Patterns (Premier Reference Source)

With the globalization of economies and growth of information and communication technologies (ICT), collaboration has become the key to survival. Just like individuals and mankind, business organizations also depend on collaboration for survival and growth.  The concept of departments, committees, teams, etc., which are so fundamental to...

Never Apply for a Job Again!: Break the Rules, Cut the Line, Beat the Rest
Never Apply for a Job Again!: Break the Rules, Cut the Line, Beat the Rest

"Never Apply For a Job Again! is what everyone needs to understand how the hidden job market works. Get it and use it before the secrets get out on WikiLeaks."
--Penelope Trunk, the original Brazen Careerist, author, blogger, entrepreneur

"This book is an essential read for insightful, witty, and
...

Patterns, Programming and Everything
Patterns, Programming and Everything

With 11 invited submissions from leading researchers and teams of researchers sharing one common characteristic ? all have worked with Dr. Judith Bishop during her long and continuing career as a leader in computer science education and research ? this book reflects on Dr Bishop?s outstanding contribution to computer science....

The Belbin Guide to Succeeding at Work
The Belbin Guide to Succeeding at Work

Have you ever been overtaken at work by someone with fewer qualifications? Have you ever wondered how some people move effortlessly up the career ladder, while others stall at each rung?

Drawing on 27 years' experience since the publication of Meredith Belbin's bestselling book, Management Teams - Why They...

Numerical Analysis in Electromagnetics: The TLM Method (ISTE)
Numerical Analysis in Electromagnetics: The TLM Method (ISTE)

The aim of this book is to give a broad overview of the TLM (Transmission Line Matrix) method, which is one of the “time-domain numerical methods”. These methods are reputed for their significant reliance on computer resources. However, they have the advantage of being highly general.

The TLM method has acquired a...

Getting Started with Oracle SOA B2B Integration: A Hands-On Tutorial
Getting Started with Oracle SOA B2B Integration: A Hands-On Tutorial

Enterprises engaging in B2B communications with their trading partners are facing increased pressure to increase automation and reduce costs. Increased compliance requirements and globalization of economies is fueling B2B adoption in every industry. Gateway solutions in Oracle SOA B2B enable these enterprises to connect easily with external...

Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work
Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work

Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work is the first book on the subject for smaller businesses.

Until now, design thinking—a methodology for solving business problems and identifying opportunities—has been the playground for companies with big budgets,
...

Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy