Home | Amazing | Today | Tags | Publishers | Years | Search 
Outsmarting Social Media: Profiting in the Age of Friendship Marketing
Outsmarting Social Media: Profiting in the Age of Friendship Marketing

The war is on. The titanic battle between Google and Facebook has begun—and you can use it to earn more profits! In this book, Evan Bailyn reveals how to attract friendship-based recommendations that will motivate customers more than any ad or algorithm. Bailyn explains how today’s...

The McKinsey Engagement: A Powerful Toolkit For More Efficient and Effective Team Problem Solving
The McKinsey Engagement: A Powerful Toolkit For More Efficient and Effective Team Problem Solving

The third volume in the internationally bestselling McKinsey Trilogy, The McKinsey Engagement is an action guide to realizing the consistently high level of business solutions achieved by the experts at the world’s most respected consulting firms.

Former consultant Dr. Paul Friga distills the guiding principles first...

Never Threaten to Eat Your Co-Workers: Best of Blogs
Never Threaten to Eat Your Co-Workers: Best of Blogs

Do you occasionally wonder,

  • What kind of person works at a porn video store?
  • Do public defenders believe in their clients?
  • What does a reporter feel when he visits war-torn Iraq?
  • What happens after a child star falls into obscurity?

Thanks to Web logs, or...

One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work
One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work

Turn your one simple idea into millions―without lifting a finger!

“Ever heard of Teddy Ruxpin or Lazer Tag? Both have Stephen Key’s mark on them. He is the Yoda or ‘renting’ ideas for serious passive income. From how-to to war stories, this is a great book.”
―Tim Ferriss, author
...

High Performance Python: Practical Performant Programming for Humans
High Performance Python: Practical Performant Programming for Humans

Your Python code may run correctly, but you need it to run faster. By exploring the fundamental theory behind design choices, this practical guide helps you gain a deeper understanding of Python’s implementation. You’ll learn how to locate performance bottlenecks and significantly speed up your code in high-data-volume...

The Technical and Social History of Software Engineering
The Technical and Social History of Software Engineering

“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, its long and fascinating history....

Any Way You Slice It: The Past, Present, and Future of Rationing
Any Way You Slice It: The Past, Present, and Future of Rationing
Rationing: it’s a word—and idea—that people often loathe and fear. Health care expert Henry Aaron has compared mentioning the possibility of rationing to “shouting an obscenity in church.” Yet societies in fact ration food, water, medical care, and fuel all the time, with those who can pay the most getting the most. As...
Mobilizing Money: How the World's Richest Nations Financed Industrial Growth (Japan-US Center UFJ Bank Monographs on International Financial Markets)
Mobilizing Money: How the World's Richest Nations Financed Industrial Growth (Japan-US Center UFJ Bank Monographs on International Financial Markets)

This book examines the origins of modern corporate finance systems during the rapid industrialization period leading up to World War I. The study leads to three sets of conclusions. First, modern financial systems are rooted in the past, are idiosyncratic to specific countries, and are highly path-dependent. Therefore, to understand current...

Routledge Handbook of Surveillance Studies (Routledge International Handbooks)
Routledge Handbook of Surveillance Studies (Routledge International Handbooks)

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the...

Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and...

Computer Science: A Very Short Introduction (Very Short Introductions)
Computer Science: A Very Short Introduction (Very Short Introductions)

Over the past sixty years, the spectacular growth of the technologies associated with the computer is visible for all to see and experience. Yet, the science underpinning this technology is less visible and little understood outside the professional computer science community. As a scientific discipline, computer science stands alongside the...

Encyclopedia of the Scientific Revolution: From Copernicus to Newton (Garland Reference Library of the Humanities, Vol. 1800)
Encyclopedia of the Scientific Revolution: From Copernicus to Newton (Garland Reference Library of the Humanities, Vol. 1800)
When Garland Publishing invited me several years ago to edit an encyclopedia of the Scientific Revolution, I welcomed the opportunity. Here was a means of providing a wider audience with the fruits of the most recent scholarly research on a fascinating complex of events that helped shape the modern world. The study of the origins of modern science...
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy