Информация об авторе

Mehta N.


Библиография книг автора

Customer Success: How Innovative Companies Are Reducing Churn and Growing Recurring Revenue Mehta N. Steinman D.
Customer Success: How Innovative Companies Are Reducing Churn and Growing Recurring Revenue
Praise for CUSTOMER SUCCESS \\\"Having been at Salesforce to witness the birth of Customer Success, I???m excited to see a book focused on this subject around which I have so much personal passion. One of the foundations of our success at Salesforce was Cus...
Нет в наличии
Heroines In The Select Novels Of Thomas Hardy Mehta N.
Heroines In The Select Novels Of Thomas Hardy
Hardy\"s heroines play a more dominant role in his novels than his heroes. They are the centre or the very pivot of the story. Bathsheba Everdene, Eustacia Vye, Elizabeth-Jane, Tess Durbeyfield, each one of them, is the mainspring of the stories....
Нет в наличии
ADR s of ACE inhibitors Mehta N.
ADR s of ACE inhibitors
An ACE inhibitor (or angiotensin-converting-enzyme inhibitor) is a pharmaceutical drug used primarily for the treatment of hypertension (elevated blood pressure) and congestive heart failure. This group of drugs causes dilation of blood vessels, which results in lower blood pressure....
Нет в наличии
CCIE Routing and Switching Official Exam Certification Guide Geier J. Mehta N. Odom W.
CCIE Routing and Switching Official Exam Certification Guide
Assessment, review, and practice for the CCIE Routing and Switching written exam 350-001 The official study guide helps you master all the topics on the CCIE Routing and Switching written exam, including: Bridging and LAN Switching IP addressing, IP services, and TCP/IP protocol details IP routing Quality of service (QoS) Frame Relay and Point-to-P...
Нет в наличии
The Shellcoder's Handbook : Discovering and Exploiting Security Holes Aitel D. Anley C. Eren S. Hassell R. Koziol J. Litchfield D. Mehta N.
The Shellcoder's Handbook : Discovering and Exploiting Security Holes
Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security hole...
Нет в наличии