You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book is a complete sales and negotiating guide for mainland China and includes practical and measurable techniques that have been tested and proven to work with Fortune 500 companies operating in the 'Middle Kingdom'. It is divided into four main areas: The Knowledge The Sales Call The Negotiation The Maintenance The book is the result of my 8 years of training in sales and negotiation skills across mainland China, as well as running a multi-city, multicultural company in the 'World's Most Stressful Country' (according to Newsweek). The book includes a collection of anecdotes from this experience, as well as case studies developed by working closely with leading companies in China. Some of these companies include Rockwell Automation, Microsoft, Thomson, SAP, and NBC. Sales and negotiating is not easy, particularly when done in a country with completely new values and rules of engagement. The purpose of this book is to lay the rules out clearly, and provide the reader with an easy to understand strategy to doing business in mainland China.
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures.
This two-volume set (CCIS 955 and CCIS 956) constitutes the refereed proceedings of the Second International Conference on Advanced Informatics for Computing Research, ICAICR 2018, held in Shimla, India, in July 2018. The 122 revised full papers presented were carefully reviewed and selected from 427 submissions. The papers are organized in topical sections on computing methodologies; hardware; information systems; networks; security and privacy; computing methodologies.
This two-volume set (CCIS 1075 and CCIS 1076) constitutes the refereed proceedings of the Third International Conference on Advanced Informatics for Computing Research, ICAICR 2019, held in Shimla, India, in June 2019. The 78 revised full papers presented were carefully reviewed and selected from 382 submissions. The papers are organized in topical sections on computing methodologies; hardware; information systems; networks; software and its engineering.
Research Methods in Human-Computer Interaction is a comprehensive guide to performing research and is essential reading for both quantitative and qualitative methods. Since the first edition was published in 2009, the book has been adopted for use at leading universities around the world, including Harvard University, Carnegie-Mellon University, the University of Washington, the University of Toronto, HiOA (Norway), KTH (Sweden), Tel Aviv University (Israel), and many others. Chapters cover a broad range of topics relevant to the collection and analysis of HCI data, going beyond experimental design and surveys, to cover ethnography, diaries, physiological measurements, case studies, crowdsou...
The phrase "in-the-wild" is becoming popular again in the field of human-computer interaction (HCI), describing approaches to HCI research and accounts of user experience phenomena that differ from those derived from other lab-based methods. The phrase first came to the forefront 20-25 years ago when anthropologists Jean Lave (1988), Lucy Suchman (1987), and Ed Hutchins (1995) began writing about cognition being in-the-wild. Today, it is used more broadly to refer to research that seeks to understand new technology interventions in everyday living. A reason for its resurgence in contemporary HCI is an acknowledgment that so much technology is now embedded and used in our everyday lives. Rese...
More than 50 examples of the world's best contemporary commercial interior design.
"In just the past five years, deep learning has taken the world by surprise, driving rapid progress in fields as diverse as computer vision, natural language processing, automatic speech recognition, etc. This book presents an introduction to deep learning and various applications of deep learning such as recommendation systems, text recognition, diabetic retinopathy prediction of breast cancer, prediction of epilepsy, sentiment, fake news detection, software defect prediction and protein function prediction"--