IT eBooks
Download, Read, Use
Sales Hunting
Sales Hunting

The first year of developing a new sales territory is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing more than "opportunity" management. But jumping straight to opportunity will have new salespeople—or veterans developing new territories—chasing their tails for the first year or two. As Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time Using Trust as Your Weapon details, there is a significant problem you must overcome when opening up new accounts and territories. No matter what you are selling, your prospect already has a trusted relationship with an incumbent vendor and will continue to buy from that vendor even when you have the better solution. ...
The Agile Culture
The Agile Culture

What do you want? Delighted customers. How do you get them? By rapidly delivering innovative, exciting products and services your customers will love to use. How do you do this? By uniting talented people around shared ideas and purpose, trusting them, helping them take ownership, and getting out of their way. It sounds easy—but you know it isn't. To make it happen, you must create an agile culture: one that's open to change and can respond quickly to whatever your customers need and desire. The Agile Culture gives you proven models, pragmatic tools, and handy worksheets for doing just that. Building on their experience helping hundreds of companies, three world-class experts help you align and unleash the talents of everyone in your organization. Step by step, you'll learn how to move toward a culture of trust, in which everyone knows, owns, and improves the results. ...
Windows 10 Anniversary Update Bible
Windows 10 Anniversary Update Bible

Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup and settings to networking and the daily workflow, this book provides expert guidance on all aspects of the OS. Read from beginning to end for a comprehensive tour of all of the nooks and crannies, or dip in as needed to find quick answers to your most pressing issues - formatted as a reference divided into mini-tutorials, this guide delves deep into the Windows 10 Anniversary Update to walk you through every inch of functionality. Personalize your settings, desktop, and security to augment the way you work; configure Windows 10 for enterprise with remote access, groups, and Hyper-V; set up a private network for two or 20 computers, and manage security to keep your content safe - everything you need to know is explained here. This book provides clear, authoritative guidance toward every aspect of the old and new to help you take advanta ...
Computing the Environment
Computing the Environment

Computing the Environment presents practical workflows and guidance for designers to get feedback on their design using digital design tools on environmental performance. Starting with an extensive state-of-the-art survey of what top international offices are currently using in their design projects, this book presents detailed descriptions of the tools, algorithms, and workflows used and discusses the theories that underlie these methods. Project examples from Transsolar Klimaengineering, Buro Happold's SMART Group, Behnish Behnisch Architects, Thomas Herzog, Autodesk Research are contextualized with quotes and references to key thinkers in this field such as Eric Winsberg, Andrew Marsh, Michelle Addington and Ali Malkawi. ...
Learning Malware Analysis
Learning Malware Analysis

Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, ...
Hands-On Cryptography with Python
Hands-On Cryptography with Python

Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. ...
Hands-On Microservices with C#
Hands-On Microservices with C#

C# is a powerful language when it comes to building applications and software architecture using rich libraries and tools such as .NET. This book will harness the strength of C# in developing microservices architectures and applications. This book shows developers how to develop an enterprise-grade, event-driven, asynchronous, message-based microservice framework using C#, .NET, and various open source tools. We will discuss how to send and receive messages, how to design many types of microservice that are truly usable in a corporate environment. We will also dissect each case and explain the code, best practices, pros and cons, and more. Through our journey, we will use many open source tools, and create file monitors, a machine learning microservice, a quantitative financial microservice that can handle bonds and credit default swaps, a deployment microservice to show you how to better manage your deployments, and memory, health status, and other microservices. By the end o ...
Asynchronous Android Programming, 2nd Edition
Asynchronous Android Programming, 2nd Edition

Asynchronous programming has acquired immense importance in Android programming, especially when we want to make use of the number of independent processing units (cores) available on the most recent Android devices. With this guide in your hands you'll be able to bring the power of Asynchronous programming to your own projects, and make your Android apps more powerful than ever before! To start with, we will discuss the details of the Android Process model and the Java Low Level Concurrent Framework, delivered by Android SDK. We will also guide you through the high-level Android-specific constructs available on the SDK: Handler, AsyncTask, and Loader. Next, we will discuss the creation of IntentServices, Bound Services and External Services, which can run in the background even when the user is not interacting with it. You will also discover AlarmManager and JobScheduler APIs, which are used to schedule and defer work without sacrificing the battery life. In a more advanced phase, ...
Apple Motion 5 Cookbook
Apple Motion 5 Cookbook

Let's face it, people like images that move. Whether you see images on a moving billboard, walk into a bank with an LCD screen, watch TV, or surf the Web, motion graphics are everywhere. With an even greater demand to integrate motion graphics in just about every type of video or interactive content there is, this book will help you get there with Motion 5. It's all about creating eye-catching titles, transitions, and effects! Apple Motion 5 Cookbook contains exercises for the beginner and seasoned motion graphics user. You will learn how to navigate Motion's interface and quickly grasp the tools available to you while creating sophisticated and sleek animations in both 2D and 3D environments. ...
Game Analytics
Game Analytics

Developing a successful game in today's market is a challenging endeavor. Thousands of titles are published yearly, all competing for players' time and attention. Game analytics has emerged in the past few years as one of the main resources for ensuring game quality, maximizing success, understanding player behavior and enhancing the quality of the player experience. It has led to a paradigm shift in the development and design strategies of digital games, bringing data-driven intelligence practices into the fray for informing decision making at operational, tactical and strategic levels. Game Analytics - is the first book on the topic of game analytics; the process of discovering and communicating patterns in data towards evaluating and driving action, improving performance and solving problems in game development and game research. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025