eBooks-it.org Logo
eBooks-IT.org Inner Image

Wiley eBooks Page 86

Download free Wiley eBooks Page 86

Optimizing and Assessing Information Technology

Improving Business Project Execution
Optimizing and Assessing Information Technology Image
A valuable guide to making better IT decisions within businessOptimizing and Assessing Information Technology is designed to be both easy-to-use and immediately useful. Engaging and accessible, this book has been created to help you focus on improving business project execution through effective IT optimization and assessment. While it skillfully outlines a framework for optimizing and assessing IT, it does not get into specific technologies per se, given the rapid and increasing pace of technical change across the world today. Optimizing and Assessing Information Technology involves a step-by-step process whereby various aspects of IT are evaluated. In addition to the book itself, a companion website offers templates, checklists, and related materia...

Marketing Analytics

Data-Driven Techniques with Microsoft Excel
Marketing Analytics Image
Helping tech-savvy marketers and data analysts solve real-world business problems with ExcelUsing data-driven business analytics to understand customers and improve results is a great idea in theory, but in today's busy offices, marketers and analysts need simple, low-cost ways to process and make the most of all that data. This expert book offers the perfect solution. Written by data analysis expert Wayne L. Winston, this practical resource shows you how to tap a simple and cost-effective tool, Microsoft Excel, to solve specific business problems using powerful analytic techniques-and achieve optimum results.Practical exercises in each chapter help you apply and reinforce techniques as you learn.Shows you how to perform sophisticated business analys...

WordPress

All-in-One For Dummies
WordPress Image
A convenient how-to guide for maximizing your WordPress experienceWordPress is a state-of-the-art blog publishing platform with nearly ten million active installations. Eight minibooks provide you with expanded coverage of the most important topics to the WordPress community, such as WordPress basics, theme designs, plug-in development, social media integration, SEO, customization, and running multiple sites. Veteran author Lisa Sabin-Wilson leads an authoritative team of authors who offer their unique knowledge and skillset while sharing invaluable advice for maximizing your site's potential and visitor experience.Presents straightforward and easy-to-understand coverage of the basics of WordPress, the most popular blog software in use todayDelves in...

WordPress

For Dummies
WordPress Image
5th Edition
The popular guide to WordPress, fully updated to help you get bloggingJoin the millions of bloggers who rely on WordPress, the popular and free blogging platform. This guide covers all the features and improvements in the most up-to-date version of WordPress. Whether you are switching to WordPress from another blogging platform or just starting your first blog, you'll find lots of advice in this friendly guide. With this easy-to-follow book, you?ll be able to take full advantage of the flexibility and usability of WordPress.WordPress is a state-of-the-art blog platform that emphasizes aesthetics, web standards, and usability Shows what it takes to set ...

Practical Reverse Engineering

X86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering Image
Analyzing how hacks are done, so as to stop them in the futureReverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much...



2007 - 2017 © eBooks-IT.org