Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Refactoring to Patterns (The Addison-Wesley Signature Series)
Refactoring to Patterns (The Addison-Wesley Signature Series)

In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua...

Bion in New York and Sao Paulo: And Three Tavistock Seminars
Bion in New York and Sao Paulo: And Three Tavistock Seminars

These two talks given in 1977 and 1978 in New York and Sao Paulo respectively are an edited version of discussions and spontaneous contributions made by Bion, in the main without notes. This is a new 2019 edition, edited and introduced by Meg Harris Williams.

Wilfred Ruprecht Bion (1897–1979) was born in India in the days...
The Relationship Advantage: Become a Trusted Advisor and Create Clients for Life
The Relationship Advantage: Become a Trusted Advisor and Create Clients for Life

In their new book, The Relationship Advantage: Become a Trusted Advisor and Create Clients for Life, consulting experts Tom Stevenson and Sam Barcus urge executives to concentrate on trust and share their insights into building it, sustaining it, translating it into profitable customer relationships.

...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
IoT, AI, and Blockchain for .NET: Building a Next-Generation Application from the Ground Up
Create applications using Industry 4.0. Discover how artificial intelligence (AI) and machine learning (ML) capabilities can be enhanced using the Internet of things (IoT) and secured using Blockchain, so your latest app can be not just smarter but also more connected and more secure than ever before. This book covers the latest...
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Developing Your Conflict Competence: A Hands-On Guide for Leaders, Managers, Facilitators, and Teams
Developing Your Conflict Competence: A Hands-On Guide for Leaders, Managers, Facilitators, and Teams

A practical resource, this book combines tips, checklists, exercises, and stories to outline concrete processes that improve the way leaders, managers, and anyone within an organization responds to conflict. Beginning with a series of questions and self-diagnostics, the authors show you how to: maintain emotional balance in the face of...

The Handbook of High Performance Virtual Teams: A Toolkit for Collaborating Across Boundaries
The Handbook of High Performance Virtual Teams: A Toolkit for Collaborating Across Boundaries
The Handbook of High-Performance Virtual Teams

The Handbook of High-Performance Virtual Teams is an essential resource for leaders, virtual team members, and work group leaders. The editors provide a proven framework based on five principles for working collaboratively across boundaries of time, space, and culture. Written by experts in the...

Driving Technical Change
Driving Technical Change

Finding cool languages, tools, or development techniques is easy-new ones are popping up every day. Convincing co-workers to adopt them is the hard part. The problem is political, and in political fights, logic doesn't win for logic's sake. Hard evidence of a superior solution is not enough. But that reality can be tough for...

Info We Trust: How to Inspire the World with Data
Info We Trust: How to Inspire the World with Data

How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.

Creating Info We Trust is a craft that puts the world into forms that are strong and true.  It begins with maps,...

The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy