Home | Amazing | Today | Tags | Publishers | Years | Search 
Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and Beyond
Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and Beyond

Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuble case studies to illustrate how to combine Six Sigma’s rigorous quality principles with Lean methods for uncovering and eliminating waste in your IT processes. Using these methods, the text explains how to take an...

A Tale of Two Systems: Lean and Agile Software Development for Business Leaders
A Tale of Two Systems: Lean and Agile Software Development for Business Leaders

This business parable reviews two different systems development projects. One project was an abject, expensive failure, while the other succeeded in creating a major new revenue stream, bringing in new customers. By reviewing the tales of these two systems, readers will develop a better understanding of what works and what doesn't when it comes...

Corporate Sigma: Optimizing the Health of Your Company with Systems Thinking
Corporate Sigma: Optimizing the Health of Your Company with Systems Thinking

One study after the next shows that most employees are unhappy with their jobs and that less than a third actively engage with their work. That means that two out of every three are merely putting in their time, rather than maximizing productivity and attaining satisfaction. One could argue that such a malaise is the symptom of an unhealthy...

Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)
Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)

The goal of this book is to provide an overview of the current state of knowledge of educational data mining (EDM). The primary goal of EDM is to use large-scale educational data sets to better understand learning and to provide information about the learning process. Although researchers have been studying human learning for over a...

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
Biopharmaceuticals in Plants: Toward the Next Century of Medicine
Biopharmaceuticals in Plants: Toward the Next Century of Medicine

Transgenic plants present enormous potential to become one of the most cost-effective and safe systems for large-scale production of proteins for industrial, pharmaceutical, veterinary, and agricultural uses. Over the past decade, much progress has been made with respect to the development of vaccines, antibodies, and other therapeutic...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Transformer Design Principles: With Applications to Core-Form Power Transformers, Second Edition
Transformer Design Principles: With Applications to Core-Form Power Transformers, Second Edition

Updating and reorganizing the valuable information in the first edition to enhance logical development, Transformer Design Principles: With Applications to Core-Form Power Transformers, Second Edition remains focused on the basic physical concepts behind transformer design and operation. Starting with first principles, this book develops the...

Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud...

Electrochemistry of Porous Materials
Electrochemistry of Porous Materials

Porous materials continue to attract considerable attention because of their wide variety of scientific and technological applications, such as catalysis, shape- and size-selective absorption and adsorption, gas storage, and electrode materials. Both research and applications of porous materials—via electroanalysis, electrosynthesis,...

Evolved Cellular Network Planning and Optimization for UMTS and LTE
Evolved Cellular Network Planning and Optimization for UMTS and LTE

Most books on network planning and optimization provide limited coverage of either GSM or WCDMA techniques. Few scrape the surface of HSPA, and even fewer deal with TD-SCDMA. Filling this void, Evolved Cellular Network Planning and Optimization for UMTS and LTE presents an accessible introduction to all stages of planning and...

Proton Exchange Membrane Fuel Cells: Materials Properties and Performance (Green Chemistry and Chemical Engineering)
Proton Exchange Membrane Fuel Cells: Materials Properties and Performance (Green Chemistry and Chemical Engineering)

A Detailed, Up-to-Date Treatment of Key Developments in PEMFC Materials
The potential to revolutionize the way we power our world

Because of its lower temperature and special polymer electrolyte membrane, the proton exchange membrane fuel cell (PEMFC) is well-suited for transportation, portable, and micro...

Result Page: Previous 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy