Showing 121 - 140 results of 1,730 for search '((((torn OR (tsun OR tsui)) OR tor) OR (yours OR your)) OR urn)', query time: 0.16s Refine Results
  1. 121

    BLUE OCEAN SHIFT : BEYOND COMPETING - PROVEN STEPS TO INSPIRE CONFIDENCE AND SEIZE NEW GROWTH / by Kim, W. Chan, author 318022, Mauborgne, Renée, author 387551, Hachette Books Group (Online service) 647103

    Published 2017
    “…Drawing on more than a decade of new work, Kim and Mauborgne show you how to move beyond competing, inspire your people's confidence, and seize new growth, guiding you step-by-step through how to take your organization from a red ocean crowded with competition to a blue ocean of uncontested market space. …”
    Get full text
    software, multimedia
  2. 122
  3. 123

    Matlab® for Engineers / by Moore, Holly, author 389527, Pearson Education Limited (Online service) 647098

    Published 2022
    “…Updated screenshots, new data, new problems and discussions offer a current view of the coding language and platform you'll use in your classes and career.…”
    Get full text
    software, multimedia
  4. 124

    Machine Learning For Dummies / by Mueller, John Paul, author 321669, Massaron, Luca, author 617095, John Wiley & Sons (Online service) 647106

    Published 2021
    “…Your comprehensive entry-level guide to machine learning. …”
    Get full text
    software, multimedia
  5. 125

    Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program / by Brown, Jason, author 656359, Packt Publishing (Online service) 656336

    Published 2023
    “…Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get started as a cybersecurity executive and design an infallible security program Perform assessments and build a strong risk management framework Promote the importance of security within the organization through awareness and training sessions Book Description Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. …”
    Get full text
    Get full text
    software, multimedia
  6. 126
  7. 127

    Marketing Research / by Burns, Alvin C., author 181733, Veeck, Ann, author 656181, Pearson Education Limited (Online service) 647098

    Published 2019
    “…Additionally, an updated and integrated case study throughout the text helps you relate the material to the real world and your future career.…”
    Get full text
    software, multimedia
  8. 128

    Value Proposition Design : How to create products and services customers want. Get started with.../ by Osterwalder, Alexander, author 558806, Pigneur, Yves, author 558807, Bernarda, Greg, author 654750, Smith, Alan, author 284627, Papadakos, Trish., designer 558851

    Published 2014
    “…Practical exercises, illustrations and tools help you immediately improve your product, service, or new business idea. In addition the book gives you exclusive access to an online companion on Strategyzer.com…”
    text
  9. 129

    POWER TO CHOOSE / by Sargent, Haydn, author 656354

    Published 1991
    “…He provides you with the keys for developing positive attitudes and taking control of your own life. Step by step you'll learn how to set goals and achieve what you want in your life. …”
    text
  10. 130

    Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity / by Pillay, Rishalin, author 656363, Abutheraa, Mohammed, author 656364, Packt Publishing (Online service) 656336

    Published 2023
    “…Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks. …”
    Get full text
    Get full text
    software, multimedia
  11. 131

    Transductive ordinal regression by Seah, Chun-Wei, Tsang, Ivor Wai-Hung, Ong, Yew Soon

    Published 2013
    “…The core elements of the proposed TOR include an objective function that caters to several commonly used loss functions casted in transductive settings, for general ordinal regression. …”
    Get full text
    Get full text
    Journal Article
  12. 132

    Drawing : Landscapes with William F. Powell: Learn to draw outdoor scenes step by step (How to Draw & Paint) / by Powell, William F., author 655944, Walter Foster (Online service) 655979

    Published 2020
    “…Then, with a little practice, you will be able to apply your newfound skills and draw your own beautiful landscape masterpieces! …”
    Get full text
    software, multimedia
  13. 133

    LATEX MADE SIMPLE / by Yusof Yaacob, author 190182

    Published 2018
    “…Then after you have decided the publisher that you want to send your publication, you can copy your document into publisher's LATEX template. …”
    text
  14. 134

    Build a Large Language Model (From Scratch) / by Raschka, Sebastian, author 656094

    Published [202
    “…Without relying on any existing LLM libraries, you'll code a base model, evolve it into a text classifier, and ultimately create a chatbot that can follow your conversational instructions. And you'll really understand it because you built it yourself!…”
    Get full text
    Get full text
    software, multimedia
  15. 135

    Learning Continuous Integration with Jenkins : An end-to-end guide to creating operational, secure, resilient, and cost-effective CI/CD processes / by Pathania, Nikhil, author 656264

    Published 2024
    “…If you're already using Jenkins for CI, this book will assist you in elevating your projects to CD. …”
    Get full text
    Get full text
    software, multimedia
  16. 136

    React Application Architecture for Production : Learn Best Practices and Expert Tips to Deliver Enterprise-Ready React Web Apps / by Alickovic, Alan, author 656263

    Published 2023
    “…The book will also share best practices for testing, securing, and packaging your app in a structured way before finally deploying your app with scalability in mind. …”
    Get full text
    Get full text
    software, multimedia
  17. 137

    Indo-Afghan strategic treaty : implications for Pakistan by Bibhu Prasad Routray

    Published 2012
    “…The Indo-Afghanistan Strategic Partnership Agreement signed on 4 October, unveils the congruence of US, Afghan and Indian end goals in the war torn country. It also has implications for Pakistani-Afghan relations.…”
    Get full text
    Get full text
    Commentary
  18. 138

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
    Get full text
    Get full text
    software, multimedia
  19. 139

    THE SECRETS OF PROFESSIONAL SALES CLOSING / by Seymour, Ian, author 655075

    Published 2006
    “…The Secrets Of Professional Sales Closing will increase your sales figures. It will enrich your life in every way. …”
    text
  20. 140

    Multi-Cloud Strategy for Cloud Architects : Learn how to adopt and manage public clouds by leveraging BaseOps, FinOps, and DevSecOps / by Mulder, Jeroen, author 656258

    Published 2023
    “…Are you ready to unlock the full potential of your enterprise with the transformative power of multi-cloud adoption? …”
    Get full text
    Get full text
    software, multimedia