Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Leading Beyond the Ego
  • Language: en
  • Pages: 366

Leading Beyond the Ego

Building on the concept of Transpersonal Leadership, Leading Beyond the Ego offers a practical approach to becoming an authentic, ethical, caring and more effective leader. Rooted in the experience of senior organisational leaders and mentors, readers embark on a personal journey to innovate and enhance their leadership skills. Reflections are rooted in recent advances in neuroscience and acknowledge the challenges faced by leaders in light of new organisational and commercial structures, in a volatile and uncertain world. The reader is supported to transcend individual ego to develop beyond emotional intelligence to a higher level of consciousness and ethical behaviour; able to build strong...

Linear Integrated Circuits
  • Language: en
  • Pages: 349

Linear Integrated Circuits

  • Type: Book
  • -
  • Published: 1996-12-11
  • -
  • Publisher: Newnes

The linear IC market is large and growing, as is the demand for well trained technicians and engineers who understand how these devices work and how to apply them. Linear Integrated Circuits provides in-depth coverage of the devices and their operation, but not at the expense of practical applications in which linear devices figure prominently. This book is written for a wide readership from FE and first degree students, to hobbyists and professionals. Chapter 1 offers a general introduction that will provide students with the foundations of linear IC technology. From chapter 2 onwards there is thorough coverage of the operational amplifier - perhaps the most common of all linear IC devices....

China's Financial Markets
  • Language: en
  • Pages: 505

China's Financial Markets

  • Type: Book
  • -
  • Published: 2007
  • -
  • Publisher: Elsevier

Publisher description

Game Console Hacking
  • Language: en
  • Pages: 593

Game Console Hacking

  • Type: Book
  • -
  • Published: 2004-11-12
  • -
  • Publisher: Elsevier

The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do. By definition, video console game players like to have fun. Most of them are addicted to the adrenaline rush as...

RFID+ Study Guide and Practice Exams
  • Language: en
  • Pages: 353

RFID+ Study Guide and Practice Exams

  • Type: Book
  • -
  • Published: 2011-04-18
  • -
  • Publisher: Elsevier

Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders). This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight the crucial points, Exam's Eye View emphasizes the important points from the exam's perspective, Key Terms present definitions, Review Questions contain questions modeled after the real exam questions. Answers to these questions are presented with complete explanations in an appendix. Also included is a full practice exam modeled after the real exam. The answers to the exam questions are presented with full explanations. - The only RFID+ study guide that provides 100% coverage of all exam objectives for the CompTIA RFID+ exam - Packed full of special features and material to aid and reinforce learning

Lego Software Power Tools With LDraw MLCad and LPub
  • Language: en
  • Pages: 516

Lego Software Power Tools With LDraw MLCad and LPub

  • Type: Book
  • -
  • Published: 2003-02-08
  • -
  • Publisher: Syngress

Create Virtual 3D LEGO Models Using LEGO Software Power Tools LEGO Master Builders have created a powerful set of tools that are distributed as freeware to the LEGO community to assist LEGO fans in their building adventures. Until now, these tools have been difficult to find, and even more difficult to configure to work with one another. Here, in one book, readers will find steps for installing and using all of the most popular LEGO freeware applications. Also, all of the applications are consolidated into one simple-to-install program that allows readers to be up and running in minutes Ø Wide market appeal. This book will appeal to the huge established consumer base of the LEGO community, ...

Rick Gallahers MPLS Training Guide
  • Language: en
  • Pages: 321

Rick Gallahers MPLS Training Guide

  • Type: Book
  • -
  • Published: 2004-01-06
  • -
  • Publisher: Elsevier

Rick Gallahers MPLS Training Guide introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. It discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, traffic engineering, mpls vpns, mpls vpn deployment models, mpls vpn routing protocol support, multi-protocol bgp, mpls vpn configurations, mpls vpn integration, and mpls vpn management. - Readers will find complete ready-to-use configurations for routers - Shows how to implement MPLS traffic engineering on a core network and optim...

Problem Solving in Patient-Centred and Integrated Cancer Care
  • Language: en
  • Pages: 237

Problem Solving in Patient-Centred and Integrated Cancer Care

Winner of the BMA Oncology Book of the Year Award. The authors provide a compendium of best practice, including 25 case studies to act as models for professionals to make decisions, either for individual patients or as the basis for policy across an organisation, planning area, region or country. This guide is designed as a handbook for practising clinicians and professionals. It is also an excellent training tool, which will help new teams and clinical staff to align thinking, develop procedures, and adopt best practice.

Dictionary of Information Security
  • Language: en
  • Pages: 256

Dictionary of Information Security

  • Type: Book
  • -
  • Published: 2006-08-18
  • -
  • Publisher: Elsevier

The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource.* Your one stop shop coverage of malware, wireless technologies, and phishing *An easy to use tol featuring the ability to cross references makeing navigation easy* Includes special coverage of military and government terms for the latest hot topics

Security Assessment
  • Language: en
  • Pages: 465

Security Assessment

  • Type: Book
  • -
  • Published: 2004-01-21
  • -
  • Publisher: Elsevier

The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines. Security Assessment also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Method...