Managing Projects Large and Small: The Fundamental Skills for Delivering on Budget and on Time


Richard A. Luecke - 2004
    This book walks managers through every step of project oversight from start to finish. Thanks to the book's comprehensive information on everything from planning and budgeting to team building and after-project reviews, managers will master the discipline and skills they need to achieve stellar results without wasting time and money.

Engineering Software as a Service: An Agile Approach Using Cloud Computing + $10 AWS Credit


Armando Fox - 2013
    This book is neither a step-by-step tutorial nor a reference book. Instead, our goal is to bring a diverse set of software engineering topics together into a single narrative, help readers understand the most important ideas through concrete examples and a learn-by-doing approach, and teach readers enough about each topic to get them started in the field. Courseware for doing the work in the book is available as a virtual machine image that can be downloaded or deployed in the cloud. A free MOOC (massively open online course) at saas-class.org follows the book's content and adds programming assignments and quizzes. See http://saasbook.info for details.

Full Circle: A memoir of leaning in too far and the journey back


Erin Callan Montella - 2016
    Erin recounts her path of achievement starting as a promising young student and athlete and, ultimately, how she allowed her career and its demands to become the center of her life. She sacrificed all other priorities and relationships along the way, throwing work-life balance to the wind. The story reveals the subtleties of the everyday decisions that led collectively to a work-centric existence over a twenty-year career. Set against the backdrop of the dramatic circumstances at Lehman Brothers in 2008, Erin discloses her own struggle as events spiraled out of control. Ultimately, her resignation from her executive role prior to the Lehman bankruptcy resulted in a devastating personal crisis as her career crumbled revealing no foundation beneath it. We learn of the journey back to change her life with a semblance of present day peace and happiness. Full Circle provides a unique inside and emotional perspective of the sacrifices Erin made to achieve extreme career success and the self-awareness required to return to being the fundamentally grounded person she was as a child.

GRE: What You Need to Know


Kaplan Test Prep - 2012
    

Napoleon Hill: The Road to Riches


Napoleon Hill - 2016
    It is a message that continues to resonate, but few have ever had the opportunity to hear the “success” lecture by the man himself. At the University of Virginia archives, Don M. Green, CEO of the Napoleon Hill Foundation was doing a routine inventory check when he discovered a box of unedited and undeveloped 16 millimeter film canisters circa 1960. After working carefully to restore and digitize the filmed content what was discovered was "pure gold"—Napoleon Hill and his longtime partner W. Clement Stone sharing their inspirational insights on the 13 keys to success. The 13 principles that when applied can truly separate you from the 95% who only dream of success, and let you join the top 5% who actually achieve it! The Napoleon Hill Foundation sent a copy of the archive film to a who’s who list of today’s top motivational speakers and achievers whose feedback was unanimous in its praise. Not only is the information practical, useful, and enduring, it is exactly what society needs to hear right now as we struggle through challenges never before seen in our lifetime. Agreeing to participate in an innovative structure, each current thought leader went into the studio to share provocative insights on these revisited gems, creating a masterful collaboration unlike anything else in the marketplace. In this ebook text transcription of this collaboration, you will not only read W. Clement Stone and Napoleon Hill share their time tested insights, but you will also read additional commentary by today’s inspirational leaders as they expand on these time-tested and classic principles of success. Join us as we countdown the 13 Keys to Success. Hosted by Greg S. Reid with additional commentary by Don M. Green, Bob Proctor, Sharon Lechter, Mark Victor Hansen, Loral Langemeier, Les Brown, David M. Corbin, Margie Aliprandi, Nik Halik, LuAn Mitchell, Ruben Gonzalez, Dr. J.B. Hill, John St. Augustine, Kevin Harrington, Jim Stovall, Marcia Wieder, John Assaraf, and Brian Tracy. This is a new release of a previously published edition.

Power Pivot and Power BI: The Excel User's Guide to DAX, Power Query, Power BI & Power Pivot in Excel 2010-2016


Rob Collie - 2016
    Written by the world’s foremost PowerPivot blogger and practitioner, the book’s concepts and approach are introduced in a simple, step-by-step manner tailored to the learning style of Excel users everywhere. The techniques presented allow users to produce, in hours or even minutes, results that formerly would have taken entire teams weeks or months to produce. It includes lessons on the difference between calculated columns and measures; how formulas can be reused across reports of completely different shapes; how to merge disjointed sets of data into unified reports; how to make certain columns in a pivot behave as if the pivot were filtered while other columns do not; and how to create time-intelligent calculations in pivot tables such as “Year over Year” and “Moving Averages” whether they use a standard, fiscal, or a complete custom calendar. The “pattern-like” techniques and best practices contained in this book have been developed and refined over two years of onsite training with Excel users around the world, and the key lessons from those seminars costing thousands of dollars per day are now available to within the pages of this easy-to-follow guide. This updated second edition covers new features introduced with Office 2015.

Advanced Concepts in Operating Systems


Mukesh Singhal - 1994
    Numerous examples are provided to reinforce the concepts and relevant case studies illustrate the concepts and mechanisms described.

Electric Machinery Fundamentals


Stephen J. Chapman - 1991
    MATLAB has been incorporated throughtout, both in examples and problems.

301 Smart Answers to Tough Interview Questions


Vicky Oliver - 2005
    If you want to stand a head above the rest of the pack, 301 Smart Answers to Tough Interview Questions is the definitive guide you need to the real, and sometimes quirky, questions employers are using to weed out candidates.Do you know the best answers to:--It looks like you were fired twice. How did that make you feel?--Do you know who painted this work of art? --What is the best-managed company in America?--If you could be any product in the world, what would you choose?--How many cigars are smoked in a year?--Are you a better visionary or implementer? Why?Leaning on her own years of experience and the experiences of more than 5,000 recent candidates, Vicky Oliver shows you how to finesse your way onto a company's payroll."Everything I always wanted to know about job interviews but was afraid to be asked."-Claude Chene, Senior Vice President, Head of Business Development, U.K. and Europe, Sanford Bernstein & Co.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Arduino Projects Book


Scott Fitzgerald - 2012
    Whether you're a rocket scientist or a poet, whether you're ten years old or ninety, we want to make it possible for you to build great projects using computers and electronics.The parts in this kit and the projects explained here form the skeleton of your projects. Arduino can make your projects responsive. It's up to you to make them beautiful.

Unauthorised Access: Physical Penetration Testing for IT Security Teams


Wil Allsopp - 2009
    IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.

What Is Six Sigma?


Peter S. Pande - 2001
    Written by bestselling author Peter Pande, What Is Six Sigma? is a concise summary of the core themes and processes of Six Sigma. Unlike almost all other books on Six Sigma, it is written for the employees of organizations rolling out Six Sigma--not just managers. This helpful overview describes what Six Sigma is, why companies are implementing it, and how employees can make it a success in their own organizations.Based on the bestselling The Six Sigma Way, this accessable introduction to Six Sigma answers typical employee questions, concerns, and even skepticism about this revolutionary program. Includes:The six themes of Six SigmaA five-step roadmap to Six Sigma implementationThe 10 basic tools of Six Sigma, with an entire page devoted to each

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


Gordon Fyodor Lyon - 2009
    From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.

An Introduction to APIs


Brian Cooksey - 2016
    We start off easy, defining some of the tech lingo you may have heard before, but didn’t fully understand. From there, each lesson introduces something new, slowly building up to the point where you are confident about what an API is and, for the brave, could actually take a stab at using one.