Home | Amazing | Today | Tags | Publishers | Years | Search 
How To Talk So People Listen: The Real Key to Job Success
How To Talk So People Listen: The Real Key to Job Success

Whether making a presentation or dealing one on one, interacting at a meeting or just answering questions, do others listen when you talk? This book explains how to communicate successfully so people listen, understand, and are persuaded. It is a comprehensive guide to every aspect of communicating in the workplace and...

What Every BODY is Saying: An Ex-FBI Agent's Guide to Speed-Reading People
What Every BODY is Saying: An Ex-FBI Agent's Guide to Speed-Reading People

Read this book and send your nonverbal intelligence soaring. Joe Navarro, a former FBI counterintelligence officer and a recognized expert on nonverbal behavior, explains how to "speed-read" people: decode sentiments and behaviors, avoid hidden pitfalls, and look for deceptive behaviors. You'll also learn how your body language...

City of Dust: Illness, Arrogance, and 9/11
City of Dust: Illness, Arrogance, and 9/11

The World Trade Center’s destruction unleashed one of the gravest environmental catastrophes in U.S. history. Now, former NY Times Ground Zero reporter Anthony DePalma presents a full accounting of the disaster that followed 9/11. He separates myths from reality…reveals decisions that destroyed...

Thank God It's Monday!: How to Create a Workplace You and Your Customers Love
Thank God It's Monday!: How to Create a Workplace You and Your Customers Love

Today-s #1 Secret of Profitability and Performance

-Thank God Roxanne is willing to share her special mix of motivation and proven methods to supercharge your workplace. Readers will move from -Thank God It-s Monday- to -I Wish Every Day Could Be Monday.--

Harvey Mackay, author of the New York Times #1...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Up and Running with Joomla, Second Edition
Up and Running with Joomla, Second Edition

Need to launch a feature-rich website quickly where you have one or more people authoring the content? Want to use a powerful, robust, and scalable Content Management System (CMS) you can trust? This Short Cut will get you up and running with Joomla 1.5, a freely available open source CMS. Learn how to install, configure, customize, and...

Encyclopedia of Molecular Mechanisms of Disease
Encyclopedia of Molecular Mechanisms of Disease

This comprehensive encyclopedia supplies the reader with concise information on the molecular pathophysiology of disease. Entries include defined diseases (such as Parkinson's disease) as well as pathophysiological entities (such as tremor). The 1,200 essays are brilliantly structured to allow rapid retrieval of the desired information....

Dictionary of Food Ingredients, Fourth Edition
Dictionary of Food Ingredients, Fourth Edition

A resource covering over 1,000 food ingredients, including natural ingredients, FDA-approved artificial ingredients and additives, and food processing compounds. Groups principal ingredients by function, describing the characteristics of each group. Also includes a list of approved foods of the European union. Previous edition: c1998....

Practical Guide to Ubuntu Linux, A (3rd Edition)
Practical Guide to Ubuntu Linux, A (3rd Edition)

The Most Complete, Easy-to-Follow Guide to Ubuntu Linux

  • The #1 Ubuntu server resource, fully updated for Ubuntu 10.4 (Lucid Lynx)–the Long Term Support (LTS) release many companies will rely on for years!
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Driving Technical Change
Driving Technical Change

Finding cool languages, tools, or development techniques is easy-new ones are popping up every day. Convincing co-workers to adopt them is the hard part. The problem is political, and in political fights, logic doesn't win for logic's sake. Hard evidence of a superior solution is not enough. But that reality can be tough for...

Windows Communication Foundation 3.5 Unleashed (2nd Edition)
Windows Communication Foundation 3.5 Unleashed (2nd Edition)

Windows Communication Foundation (WCF) is Microsoft’s dynamic technology for allowing autonomous software to communicate. Superseding earlier technologies such as COM/DCOM, .NET Remoting, ASP.NET Web Services, and the Web Services Enhancements for .NET, WCF provides a single solution that is designed to always be...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy