Narrow your search

Library

UAntwerpen (158)

Vlerick Business School (158)

KU Leuven (108)

UGent (104)

UCLL (101)

Thomas More Mechelen (93)

Odisee (91)

VIVES (86)

Thomas More Kempen (85)

VUB (80)

More...

Resource type

book (145)

periodical (14)

digital (7)


Language

English (124)

Dutch (31)

French (2)

Danish (1)


Year
From To Submit

2023 (4)

2022 (1)

2020 (6)

2019 (3)

2018 (6)

More...
Listing 1 - 10 of 158 << page
of 16
>>
Sort by

Book
Financieel management
Author:
ISBN: 9072456149 Year: 1990 Publisher: Culemborg Phaedon

Loading...
Export citation

Choose an application

Bookmark

Abstract

The struggle for control of global communication : the formative century
Author:
ISBN: 0252027574 0252091523 9780252091520 9780252027574 Year: 2002 Publisher: Urbana : University of Illinois Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Social media for academics : a practical guide
Author:
ISBN: 9781780633190 178063319X 9781843346814 1843346818 Year: 2012 Publisher: Oxford : Chandos Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an overview of social media technologies in the context of practical implementation for academics, guided by applied research findings, current best practices, and the author's successful experiences with using social media in academic settings. It also provides academics with sensible and easy strategies for implementing a wide spectrum of social media and related technologies - such as blogs, wikis, Facebook, and various Google tools for professional, teaching, and research endeavours.No other book exists that assists academics in learning how to use social


Multi
Detecting and combating malicious email
Authors: ---
ISBN: 9780128005460 0128005467 9781322184029 132218402X 9780128001103 0128001100 Year: 2015 Publisher: Waltham, Massachusetts

Loading...
Export citation

Choose an application

Bookmark

Abstract

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The educa


Multi
Advanced antenna systems for 5G network deployments : bridging the gap between theory and practice
Author:
ISBN: 9780128223864 0128223863 9780128223864 9780128200469 0128200464 Year: 2020 Publisher: London, England : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Active radio : Pacifica's brash experiment
Author:
ISBN: 0816631573 0816631565 0816689180 Year: 1999 Publisher: Minneapolis : University of Minnesota Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In April 1949, KPFA in Berkeley, California, went on the air. From the beginning, the station broadcast an utterly new combination of political commentary and cultural discussion, dedicated to creative expression and dissent. In this fascinating account, Jeff Land tells the heroic story of the Pacifica radio network and the practical model it pioneered for liberatory alternatives to commercial mass media.


Book
Negotiation
Authors: ---
ISBN: 9789401402958 9401402957 Year: 2012 Volume: *7 Publisher: Leuven [Woodbridge] LannooCampus [[ACC Distribution [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Negotiating is becoming more and more difficult: negotiations to form a new government, social negotiations, negotiating with your colleagues, teenage kids at home; however not every negotiation needs to transform into a battle of will. How good is your Negotiation Quotient? Have you ever wondered if it is better to withhold as much information as possible or if you should be open when negotiating? Whether you should allow for boundaries to be re-established or whether you should compromise? Written by negotiating and management experts, Negotiations contains four key elements to allow you to transform the process of negotiating, from a stressful power battle to a process of interaction that creates interesting opportunities.

Face-to-face communications for clarity and impact.
Author:
ISBN: 1591393477 Year: 2004 Publisher: Boston (Mass.) Harvard Business School Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
You're not listening : what you're missing and why it matters
Author:
ISBN: 9781787300958 9781787300965 Year: 2020 Publisher: London Harvill Secker

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Start with why : how great leaders inspire everyone to take action
Author:
ISBN: 9781591846444 9781591842804 1591846447 Year: 2007 Publisher: PortfolioTrade

Loading...
Export citation

Choose an application

Bookmark

Abstract

Why are some people and organizations more innovative, more influential, and more profitable than others? Why do some command greater loyalty? In studying the leaders who've had the greatest influence in the world, Simon Sinek discovered that they all think, act, and communicate in the exact same way-and it's the complete opposite of what everyone else does. People like Martin Luther King Jr., Steve Jobs, and the Wright Brothers might have little in common, but they all started with why. Drawing on a wide range of real-life stories, Sinek weaves together a clear vision of what it truly takes to lead and inspire.

Listing 1 - 10 of 158 << page
of 16
>>
Sort by