|
|
|
|
|
RFID for the Optimization of Business ProcessesProf. Elgar Fleisch, ETH Zürich and University of St. Gallen:
"A comprehensive, clear and practical introduction for RFID designers."
Prof. Rolf Jansen, Faculty of Logistics, Dortmund University:
"The book comprehensively deals with the topic in a solution-oriented way, expertly conveying... | | Business Process Mapping: Improving Customer SatisfactionPraise For Business Process Mapping: Improving Customer Satisfaction, Second Edition
"A must-read for anyone performing business process mapping! This treasure shares step-by-stepapproaches and critical success factors, based on years of practical, customer-focused experience.A real winner!" в... | | Hollywood Speaks Out: Pictures that Dared to Protest Real World Issues
Hollywood Speaks Out explores that rare Hollywood feature that dared to tackle red-hot, social issues whilst American society was gripped by the convulsion and controversy they generated.
-
Explores why Hollywood has always been risk-adverse, and how most feature flms deal with controversial issues long after the...
|
|
|
Misconceptions of Risk
The risk discipline is young and there are a number of ideas, perspectives and conceptions of risk out there. A number of such common conceptions of risk are examined in the book, related to the risk concept, risk assessments, uncertainty analyses, risk perception, the precautionary principle, risk management and decision making under... | | Tietz's Applied Laboratory Medicine
Using a problem-based approach, Tietz's Applied Laboratory Medicine, Second Edition presents interesting cases to illustrate the current use and interpretation of the most commonly available clinical laboratory tests. The cases present detailed descriptions of the symptoms, diagnosis, and treatment of disease. The book... | | Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate... |
|
|
Result Page: 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 |