Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Rails Recipes: Rails 3 Edition
Rails Recipes: Rails 3 Edition
If I were to buy a real recipe book—you know, a book about cooking food—I wouldn’t be looking for a book that tells me how to dice vegetables or how to use a skillet. I can find that kind of information in an overview about cooking.

A recipe book is about how to make food you might
...
Great Big Agile: An OS for Agile Leaders
Great Big Agile: An OS for Agile Leaders
Big Agile leaders need an empirical, "high-trust" model that provides guidance for scaling and sustaining agility and capability throughout a modern technology organization. This book presents the Agile Performance Holarchy (APH)?a "how-ability" model that provides agile leaders and teams with an operating system to...
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.

The IoT
...
User-centered Design of Online Learning Communities
User-centered Design of Online Learning Communities
This collection makes a valuable contribution to the already large literature of online learning communities. The 16 chapters come from diverse international sources, but they are satisfyingly narrow in their focus on user-centered design, analysis, and evaluation.

The opening chapter provides a role model for what follows: good reviews
...
Create Stunning HTML Email That Just Works
Create Stunning HTML Email That Just Works

In the business world, on the other hand, people neither know about nor care about “HTML email”; they just want a nice-looking email newsletter that drives people to open it and read, click, or buy.

This book is for web designers who are looking for a way to design and build effective HTML emails for their clients or...

Mathematical Puzzling
Mathematical Puzzling
Many of those who read this book will be interested in the puzzles and investigations for their own sake. Everyone will, I trust, find some things that are new - perhaps even refreshing, And I hope that those who teach mathematics win find the collection especially useful. The problems will challenge and stimulate able youngsters in a way which...
Making Things Happen: Mastering Project Management (Theory in Practice)
Making Things Happen: Mastering Project Management (Theory in Practice)

In the updated edition of this critically acclaimed and bestselling book, Microsoft project veteran Scott Berkun offers a collection of essays on field-tested philosophies and strategies for defining, leading, and managing projects. Each essay distills complex concepts and challenges into practical nuggets of useful advice, and the new...

Clearly Visual Basic: Programming with Microsoft Visual Basic 2012
Clearly Visual Basic: Programming with Microsoft Visual Basic 2012
Clearly Visual Basic: Programming with Microsoft Visual Basic 2012, Third Edition is designed for a beginning programming course. The book assumes students have no previous programming knowledge or experience. However, students should be familiar with basic Windows skills and file management. The book’s primary focus is on...
Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Unstoppable Teams: The Four Essential Actions of High-Performance Leadership
Unstoppable Teams: The Four Essential Actions of High-Performance Leadership

Three-time Navy SEAL platoon commander and founder of Perfect Fitness reveals how to put together teams that can accomplish any objective—by leveraging an unexpected set of values and priorities.

SEALs and civilians operate in extremely different environments, but what makes both kinds of teams excel comes
...

The Pain Survival Guide: How to Reclaim Your Life (APA Lifetools)
The Pain Survival Guide: How to Reclaim Your Life (APA Lifetools)

If you suffer from chronic pain, this proven 10-step program brings hope and relief, showing you how gradual changes in specific behaviors can lead to great improvements in your ability to cope. Psychologists Turk and Winters' recommendations are based on solid research that shows what works and on their success with thousands of...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy