Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Working With You is Killing Me: Freeing Yourself from Emotional Traps at Work

Buy

This authoritative manual provides valuable insights for turning conflicts inthe workplace into productive working relationships.

(HTML tags aren't allowed.)

Think Smarter: Critical Thinking to Improve Problem-Solving and Decision-Making Skills
Think Smarter: Critical Thinking to Improve Problem-Solving and Decision-Making Skills

Learn Critical Thinking techniques for better decisions, problem solving, and innovation

Think Smarter: Critical Thinking to Improve Problem-Solving and Decision-Making Skills is the comprehensive guide to training your brain to do more for you. Written by a critical thinking trainer and coach, the book presents a...
IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Web Development with Go: Building Scalable Web Apps and RESTful Services
Web Development with Go: Building Scalable Web Apps and RESTful Services

Take a deep dive into web development using the Go programming language to build web apps and RESTful services to create reliable and efficient software. Web Development with Go provides Go language fundamentals and then moves on to advanced web development concepts and successful deployment of Go web apps to the cloud. 

...


Relational Database Programming: A Set-Oriented Approach
Relational Database Programming: A Set-Oriented Approach
I want to share some thoughts from my experiences doing project-based work as an IT contractor. Working as an IT contractor means taking on a mix of short- and long-term projects. In a short-term project, you need to work on a specific task with a team of developers, you need to solve a problem quickly, and then you are done with the...
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

©2017 LearnIT (support@pdfchm.net) - Privacy Policy