saison 8, épisode 15 Worth | Daprès une Histoire Vraie | Season 5 Episode 9
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Losing It! Behaviors and Mindsets that Ruin Careers: Lessons on Protecting Yourself from Avoidable Mistakes
Losing It! Behaviors and Mindsets that Ruin Careers: Lessons on Protecting Yourself from Avoidable Mistakes

Why do otherwise brilliant and successful leaders fail – and often do so dramatically? How can you prevent your own career “train wreck” by learning from their experiences? This book distills the core causes of executive failure, demonstrates how to identify them in your own behavior – and helps you to eliminate...

House of Cards and Philosophy: Underwood's Republic (The Blackwell Philosophy and Pop Culture Series)
House of Cards and Philosophy: Underwood's Republic (The Blackwell Philosophy and Pop Culture Series)

Is Democracy overrated?

Does power corrupt? Or do corrupt people seek power?

Do corporate puppet masters pull politicians’ strings?

Why does Frank talk to the camera?

Can politics deliver on the promise of justice?

...
Six Sigma Business Scorecard : Creating a Comprehensive Corporate Performance Measurement System
Six Sigma Business Scorecard : Creating a Comprehensive Corporate Performance Measurement System
Ensuring growth and profitability through performance

 

PLAN * IMPLEMENT * MEASURE * ADJUST * PROFIT

 

"Great book! The readers should keep their highlighters handy for they will find many points that they will want to remember." -- H. James Harrington, Ph.D., Author of Business
...
The First Computers--History and Architectures (History of Computing)
The First Computers--History and Architectures (History of Computing)
"A cohesive, well-defined discussion of the architecture of early computers."
Mary Croarken, Business History

"A well-balanced and fascinating perspective on a wide range of early computing devices."
Nathan Ensmenger, IEEE Spectrum
...
The Myths of Innovation
The Myths of Innovation
How do you know whether a hot technology will succeed or fail? Or where the next big idea will come from? The best answers come not from the popular myths we tell about innovation, but instead from time-tested truths that explain how we've made it this far. This book shows the way.

In The Myths of Innovation, bestselling
...
Real Analysis
Real Analysis

This book is written by award-winning author, Frank Morgan. It offers a simple and sophisticated point of view, reflecting Morgan's insightful teaching, lecturing, and writing style. Intended for undergraduates studying real analysis, this book builds the theory behind calculus directly from the basic concepts of real numbers, limits, and...

Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
The Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the...
HBR's 10 Must Reads 2015: The Definitive Management Ideas of the Year from Harvard Business Review (with bonus McKinsey Award–Winning article "The Focused Leader") (HBR's 10 Must Reads)
HBR's 10 Must Reads 2015: The Definitive Management Ideas of the Year from Harvard Business Review (with bonus McKinsey Award–Winning article "The Focused Leader") (HBR's 10 Must Reads)

A year’s worth of management wisdom, all in one place.

We’ve combed through ideas, insights, and best practices from the past year of Harvard Business Review to help you get up to speed fast on the freshest, most relevant thinking driving business today. With authors from Clayton Christensen to Roger...

SELinux by Example: Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux

SELinux: Bring World-Class Security to Any Linux Environment!

 

SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure...

Riemannian Geometry: A Modern Introduction (Cambridge Studies in Advanced Mathematics)
Riemannian Geometry: A Modern Introduction (Cambridge Studies in Advanced Mathematics)
"Each chapter concludes with an excellent section of notes and advanced exercises with further results, with hints and sketches of solutions at the end of the book...I think that it is the best reference on Riemannian geometry available, especially for someone interested in isoperimetric problems...Chavel is one of about a dozen mathematics...
WiMAX Handbook (McGraw-Hill Communications)
WiMAX Handbook (McGraw-Hill Communications)
Get a thorough introduction to WiMAX--the revolutionary new 802.16 IEEE standard for point-to-point and point-to-multipoint wireless broadband access. Written by networking expert Frank Ohrtman, this detailed guide annotates the 802.16 specification and explains how to design and build a robust, reliable, and secure WiMAX network that takes full...
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy