Search alternatives:
torn » turn (Expand Search), born (Expand Search), town (Expand Search)
tsun » tsung (Expand Search), sun (Expand Search), tun (Expand Search)
yours » hours (Expand Search), ours (Expand Search), tours (Expand Search), fours (Expand Search), yous (Expand Search)
your » our (Expand Search), four (Expand Search), you (Expand Search)
torn » turn (Expand Search), born (Expand Search), town (Expand Search)
tsun » tsung (Expand Search), sun (Expand Search), tun (Expand Search)
yours » hours (Expand Search), ours (Expand Search), tours (Expand Search), fours (Expand Search), yous (Expand Search)
your » our (Expand Search), four (Expand Search), you (Expand Search)
-
121
BLUE OCEAN SHIFT : BEYOND COMPETING - PROVEN STEPS TO INSPIRE CONFIDENCE AND SEIZE NEW GROWTH /
Published 2017“…Drawing on more than a decade of new work, Kim and Mauborgne show you how to move beyond competing, inspire your people's confidence, and seize new growth, guiding you step-by-step through how to take your organization from a red ocean crowded with competition to a blue ocean of uncontested market space. …”
Get full text
software, multimedia -
122
-
123
Matlab® for Engineers /
Published 2022“…Updated screenshots, new data, new problems and discussions offer a current view of the coding language and platform you'll use in your classes and career.…”
Get full text
software, multimedia -
124
Machine Learning For Dummies /
Published 2021“…Your comprehensive entry-level guide to machine learning. …”
Get full text
software, multimedia -
125
Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program /
Published 2023“…Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get started as a cybersecurity executive and design an infallible security program Perform assessments and build a strong risk management framework Promote the importance of security within the organization through awareness and training sessions Book Description Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. …”
Get full text
Get full text
software, multimedia -
126
SQL Query Design Patterns and Best Practices : A practical guide to writing readable and maintainable SQL queries using its design patterns /
Published 2023“…You'll learn how to format your results to make them easier to consume at their destination. …”
Get full text
Get full text
software, multimedia -
127
Marketing Research /
Published 2019“…Additionally, an updated and integrated case study throughout the text helps you relate the material to the real world and your future career.…”
Get full text
software, multimedia -
128
Value Proposition Design : How to create products and services customers want. Get started with.../
Published 2014“…Practical exercises, illustrations and tools help you immediately improve your product, service, or new business idea. In addition the book gives you exclusive access to an online companion on Strategyzer.com…”
text -
129
POWER TO CHOOSE /
Published 1991“…He provides you with the keys for developing positive attitudes and taking control of your own life. Step by step you'll learn how to set goals and achieve what you want in your life. …”
text -
130
Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity /
Published 2023“…Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks. …”
Get full text
Get full text
software, multimedia -
131
Transductive ordinal regression
Published 2013“…The core elements of the proposed TOR include an objective function that caters to several commonly used loss functions casted in transductive settings, for general ordinal regression. …”
Get full text
Get full text
Journal Article -
132
Drawing : Landscapes with William F. Powell: Learn to draw outdoor scenes step by step (How to Draw & Paint) /
Published 2020“…Then, with a little practice, you will be able to apply your newfound skills and draw your own beautiful landscape masterpieces! …”
Get full text
software, multimedia -
133
LATEX MADE SIMPLE /
Published 2018“…Then after you have decided the publisher that you want to send your publication, you can copy your document into publisher's LATEX template. …”
text -
134
Build a Large Language Model (From Scratch) /
Published [202“…Without relying on any existing LLM libraries, you'll code a base model, evolve it into a text classifier, and ultimately create a chatbot that can follow your conversational instructions. And you'll really understand it because you built it yourself!…”
Get full text
Get full text
software, multimedia -
135
Learning Continuous Integration with Jenkins : An end-to-end guide to creating operational, secure, resilient, and cost-effective CI/CD processes /
Published 2024“…If you're already using Jenkins for CI, this book will assist you in elevating your projects to CD. …”
Get full text
Get full text
software, multimedia -
136
React Application Architecture for Production : Learn Best Practices and Expert Tips to Deliver Enterprise-Ready React Web Apps /
Published 2023“…The book will also share best practices for testing, securing, and packaging your app in a structured way before finally deploying your app with scalability in mind. …”
Get full text
Get full text
software, multimedia -
137
Indo-Afghan strategic treaty : implications for Pakistan
Published 2012“…The Indo-Afghanistan Strategic Partnership Agreement signed on 4 October, unveils the congruence of US, Afghan and Indian end goals in the war torn country. It also has implications for Pakistani-Afghan relations.…”
Get full text
Get full text
Commentary -
138
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
Get full text
Get full text
software, multimedia -
139
THE SECRETS OF PROFESSIONAL SALES CLOSING /
Published 2006“…The Secrets Of Professional Sales Closing will increase your sales figures. It will enrich your life in every way. …”
text -
140
Multi-Cloud Strategy for Cloud Architects : Learn how to adopt and manage public clouds by leveraging BaseOps, FinOps, and DevSecOps /
Published 2023“…Are you ready to unlock the full potential of your enterprise with the transformative power of multi-cloud adoption? …”
Get full text
Get full text
software, multimedia