Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 359

For growth opportunities, look beyond the borders. According to the U.S. Department of Commerce, more than $1.6 trillion in goods are exported annually to dozens of countries, while nearly $2.4 trillion are imported. That's big business for anyone who can navigate the complicated rules and mitigate the risks surrounding international trade. Filled with step-by-step instructions, cost-effective strategies, and ready-to-use forms, this third edition of... more...

Virtual Reality 101: Everything you need to know (plus a little more)We are gradually getting to a point in technological advancement where the “crazy” and ‘Wow! That’s so cool!” things we read about in sci-fi novels and see in our movies may no longer be “someday” fiction, but may quickly become everyday interactions in our lives. The line between today’s fantasy and tomorrows reality is a constantly moving one. The growth of our... more...

This book brings order to the chaotic and rapidly evolving world of influencer marketing by providing readers with much needed context, frameworks, and best practices. Written for busy marketing professionals working in both domestic and international markets, it addresses these topics in a highly actionable and engaging manner. Digital Influence covers everything from how to identify the right influencers and determine “level of... more...

From Wall Street to Main Street, John Brooks, longtime contributor to the New Yorker, brings to life in vivid fashion twelve classic and timeless tales of corporate and financial life in America What do the $350 million Ford Motor Company disaster known as the Edsel, the fast and incredible rise of Xerox, and the unbelievable scandals at GE and Texas Gulf Sulphur have in common? Each is an example of how an iconic company was... more...

Since the trial of O.J. Simpson, the "profession" of private investigation has risen to a new level of respect among both the legal community and the public at large because the success of O.J.'s " Dream Team" was largely a result of the brilliant work done by defense investigators. Private investigators are often called upon to provide information for cases that are not criminal or when regular law enforcement cannot fit a more in-depth investigation... more...


This book breaks new ground by presenting a detailed description and history of one of the most famous companies of the early fourteenth century. This analysis of the Peruzzi Company produces a radical reassessment of what made the Florentine super-companies so exceptional: commodity trading, especially in grain, which required heavy capital, sophisticated organization, and an international network. But the book also exposes the limitations of their... more...

As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure security success. CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives presents tools that... more...

Successful business communication is more than simply speaking your client’s language. At the heart of all effective communication lies a fundamental understanding of human behavior. The natural result of globalization is a level of behaviors that we all share and expect. However, underneath this level are many other influencing factors. We tend to view the situation around us according to our own expectations which are often shaped by our cultural... more...

The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be effective, it must be done quickly and efficiently. Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can... more...

Blinded by emotional rhetoric, political posturing, and genuine fear, previous efforts to defend our way of life against aggressors intent on inflicting personal and economic destruction have proven, in hindsight, to be misguided, panicked, and reactionary. Evaluation and assessment to date is largely focused on reviewing government documents, doing little to alleviate the distorted perspectives from which we vainly attempt to invoke workable policy.... more...