Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Machine Learning for Algorithmic Trading: Design and implement investment strategies based on smart algorithms that learn from data using Python
Hands-On Machine Learning for Algorithmic Trading: Design and implement investment strategies based on smart algorithms that learn from data using Python

Explore effective trading strategies in real-world markets using NumPy, spaCy, pandas, scikit-learn, and Keras

Key Features

  • Implement machine learning algorithms to build, train, and validate algorithmic models
  • Create your own algorithmic design process to apply...
101 Boardroom Problems and How to Solve Them
101 Boardroom Problems and How to Solve Them
Before becoming a consultant on meetings and effective decision making, I was employed as an engineer. My motto then was: Silence is golden. Keeping quiet in meetings was safe and risk-free, and rarely did anyone solicit my ideas anyway. Had I shared my input, however, it might have improved the quality of my team’s decisions and reduced its...
PMP Certification All-in-One For Dummies
PMP Certification All-in-One For Dummies

This completely updated guide prepares you for taking the PMP certification exam

As the most popular project management certification available, the PMP certification is very difficult to obtain and demands stringent requirements. Thankfully, this All-in-One guide is packed with valuable information that has been completely...

Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

Risk, Complexity and ICT
Risk, Complexity and ICT
This book explores the challenges regarding risks and risk management related to the growing complexity of ICT solutions.

The main argument of the book is that the complexity of ICT solutions has continued to grow throughout the history of ICT, and that it has now reached a level that goes beyond our current understanding of
...
Environmental Pollution and Control, Fourth Edition
Environmental Pollution and Control, Fourth Edition

Complex environmental problems are often reduced to an inappropriate level of simplicity. While this book does not seek to present a comprehensive scientific and technical coverage of all aspects of the subject matter, it makes the issues, ideas, and language of environmental engineering accessible and understandable to the nontechnical...

Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Risk Assessment of Chemicals: An Introduction
Risk Assessment of Chemicals: An Introduction

At last – a second edition of this hugely important text that reflects the progress and experience gained in the last decade and aims at providing background and training material for a new generation of risk assessors. The authors offer an introduction to risk assessment of chemicals as well as basic background information on sources,...

Management of Acute Coronary Syndromes (Contemporary Cardiology)
Management of Acute Coronary Syndromes (Contemporary Cardiology)

In this second edition of his highly acclaimed book, Christopher P. Cannon, MD, and a team of preeminent clinical investigators have thoroughly revised and expanded every chapter to reflect the recent explosion of clinical trials on the management of acute coronary syndromes (ACS). This includes: the newer tests, such as C reactive protein; a...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Praise for STRUCTURED FINANCE MODELING with Object-Oriented VBA

"This book is an excellent and interesting integration of financial engineering, structured finance, and structured programming, and the book accomplishes this with easy-to-follow examples, using the most commonly available tools, MS VBA and spreadsheets. The author is clearly...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy