The Leading eBooks Store Online
3,603,993 members ⚫ 1,165,375 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- MC Press 2011; US$ 49.95
Tackling one of the major challenges with implementing an information-governance program, this book provides insight into the best ways to convince businesses of the value of the practice. Most information-governance programs deal with problems that are common across every enterprise?poor data quality, inconsistency of business terms, fragmented view... more...
Selected papers from the BCS Quality and BCS e-Learning Specialist Groups Annual International INSPIRE Conference, 2011Emerald Group Publishing Limited 2011; US$ 199.00
This e-book presents 6 selected papers from the BCS Quality and BCS e-Learning Specialist Groups Annual International INSPIRE Conference, 2011. more...
- Packt Publishing 2011; US$ 29.99
Use Moodle to manage and organize your administrative duties, monitor attendance records, manage student enrolment, record exam results, and much more more...
- Morgan & Claypool Publishers 2012; US$ 35.00
While classic data management focuses on the data itself, research on Business Processes also considers the context in which this data is generated and manipulated, namely the processes, users, and goals that this data serves. This provides the analysts a better perspective of the organizational needs centered around the data. As such, this research... more...
- Van Haren Publishing 2010; Not Available
IT Outsourcing Part 2: Managing the Sourcing Contract covers all the processes for managing the contract, from the transition phase through to normal operational service and contract termination. Developed for IT practitioners as well as commercial and contract managers, this expert guide provides practical and concise advice on best practices in:... more...
- Van Haren Publishing 2008; Not Available
Foundations of IT Service Management based on ITILŪ V3 Foundations of IT Service Management based on ITIL has become the industry classic guide on the topic of ITIL. Over the years this authoritative guide has earned its place on the bookshelves and in the briefcases of industry experts as they implement best practices within their organizations. This... more...
- Elsevier Science 2012; US$ 59.95
The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam?s Common Body of Knowledge. The ten domains are covered completely and as concisely as... more...
- Business Expert Press 2013; US$ 19.95
Competition is becoming more intense and decision makers are encountering increasing complexity, rapid change, and higher levels of risk. In many situations, the solution is more and better computerized decision support, especially analytics and business intelligence. Today managers need to learn about and understand computerized decision support.... more...
- Packt Publishing 2012; US$ 22.99
"Oracle SOA Suite 11g Developer's Cookbook" is a high level and practical Cookbook, packed with easy to follow, task-based recipes for developers. If you are a SOA developer who wants to extend your repertoire of Oracle SOA Suite techniques for extending applications, then "Oracle SOA Suite 11g Developer's Cookbook" is for... more...
- Elsevier Science 2013; US$ 73.95
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based... more...