-
Author Tony Crescenzi
What happens now? Economics in an age when fiscal stimulus can’t be funded and no longer works.After Lehman fell, the scope of the financial crisis became so great that only the fiscal and monetary authorities possessed balance sheets large enough to resolve it. But....
Release Date 2010/10 -
The Practitioner's Guide to POLCA
Author Rajan Suri
POLCA (Paired-cell Overlapping Loops of Cards with Authorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures t....
Release Date 2018/04 -
The Road to Recovery: How and Why Economic Policy Must Change
Author Andrew Smithers
Renowned economist Andrew Smithers offers prescriptive advice and economic theory on avoiding the next financial crisisIn The Road to Recovery, Andrew Smithers—one of a handful of respected economists to have accurately predicted the most recent global financial cri....
Release Date 2013/10 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
Theoretical Cybersecurity: Principles and Advanced Concepts
Author Jacob G. Oakley , Michael Butler , Wayne York , Matthew Puckett , J. Louis Sewell
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an....
Release Date 2022/07 -
Author Claudia St. John , SPHR , SHRM-SCP
Human resources and management consultants are frequently asked to help their clients address fundamental breakdowns within their organizations. More often than not, these breakdowns occur between conflicting functional areas, such as sales and customer service, sa....
Release Date 2015/08 -
Author Chris Brogan , Julien Smith
The 10th Anniversary Edition of Trust Agents helps companies get back on track in their efforts to build reputation, attention, and trust In the years since authors Chris Brogan and Julien Smith first released their groundbreaking book Trust Agents, social media....
Release Date 2020/07 -
Trust and Betrayal in the Workplace
Author Michelle L. Reina , Dennis S. Reina
More than ever, there is a need for trust in the workplace. After all, business is conducted via relationships, and trust is the foundation to effective relationships. Yet, trust means different things to different people and this is a big part of the problem. Coll....
Release Date 2006/01 -
Trust Building and Boundary Spanning in Cross-Border Management
Author Michael Zhang
This edited book addresses two critical issues in international management: building trust and managing boundary spanning activities between international business partners. The duel-process of internationalization of multinational corporations (MNCs), through globalisati....
Release Date 2018/03 -
Author Ryan Leirvik
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are availabl....
Release Date 2022/01 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Author David Both
Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
Release Date 2019/12 -
Validating Your Business Continuity Plan: Ensuring your BCP actually works
Author Robert Clark
75% of companies without a business continuity plan fail within three years. Disruptive incidents can affect any organization and occur at any moment. ICT outages, cyber attacks, natural disasters, terrorist attacks, pandemics, supply chain failures and other unex....
Release Date 2015/11 -
Variance-Constrained Multi-Objective Stochastic Control and Filtering
Author Yuming Bo , Zidong Wang , Lifeng Ma
Unifies existing and emerging concepts concerning multi-objective control and stochastic control with engineering-oriented phenomenaEstablishes a unified theoretical framework for control and filtering problems for a class of discrete-time nonlinear stochastic syst....
Release Date 2015/06 -
Author Behrooz Mashadi , David Crolla
The powertrain is at the heart of vehicle design; the engine – whether it is a conventional, hybrid or electric design – provides the motive power, which is then managed and controlled through the transmission and final drive components. The overall powertra....
Release Date 2012/01 -
Version Control with Subversion, 2nd Edition
Author Brian W. Fitzpatrick , Ben Collins-Sussman , C. Michael Pilato
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.5 with a complete introduction and guided tour of its c....
Release Date 2008/09 -
Waging Cyber War: Technical Challenges and Operational Constraints
Author Jacob G. Oakley
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
Release Date 2019/08 -
Who Are the Bad Guys and What Do They Want?
Author Mike Barlow , Gregory Fell
Recent breaches at the Internal Revenue Service are a stark reminder that cyber crime is alive and well. According to Center for Strategic and International Studies, cyber crime and cyber espionage cost the global economy between $375 billion and $575 billion annua....
Release Date 2016/03 -
Windows Forensics and Incident Recovery
Author Harlan Carvey
Praise for Windows Forensics and Incident Recovery"Windows Forensics and Incident Recovery doesn't just discuss forensics, it also includes tools for analysis and shows readers how to use them. I look forward to putting these tools through their paces, and I recomm....
Release Date 2004/07 -
Author Tara Powers
Create a space for a healthy work–life balanceStay connected with Slack, Zoom, and Microsoft TeamsMaintain productivity and stay healthy and saneWorking from home is the new normalWorking from home was already on the rise, but when COVID-19 hijacked our reality, it became....
Release Date 2020/08