Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multivariate Time Series Analysis: With R and Financial Applications
Multivariate Time Series Analysis: With R and Financial Applications

An accessible guide to the multivariate time series tools used in numerous real-world applications

Multivariate Time Series Analysis: With R and Financial Applications is the much anticipated sequel coming from one of the most influential and prominent experts on the topic of time series. Through a...

Introduction to Finite Element Analysis Using MATLAB® and Abaqus
Introduction to Finite Element Analysis Using MATLAB® and Abaqus

There are some books that target the theory of the finite element, while others focus on the programming side of things. Introduction to Finite Element Analysis Using MATLAB® and Abaqus accomplishes both. This book teaches the first principles of the finite element method. It presents the theory of the finite...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Django: Web Development with Python
Django: Web Development with Python

About This Book

  • Explore the best practices to develop applications of a superior quality with Django framework
  • Unravel the common problems of web development in Django
  • This course teaches you major Django functions and will help you improve your skills by developing models, forms, views, and...
Decompiling Java
Decompiling Java
WHEN COREL BOUGHT WordPerfect for almost $200 million from the Novell Corporation in the mid 1990s, nobody would have thought that in a matter of months they would have been giving away the source code free. However, when Corel ported WordPerfect to Java and released it as a beta product, a simple program called Mocha1 could...
Effective Time Management: Using Microsoft Outlook to Organize Your Work and Personal Life (Business Skills)
Effective Time Management: Using Microsoft Outlook to Organize Your Work and Personal Life (Business Skills)

Take charge—and create an effective balance between your work and personal life with the help of Microsoft Outlook. In this practical guide, two experts teach you a proven time-management system, showing you how to set and manage your priorities with custom modifications to Outlook. Sharpen your focus, combat distractions—and...

C++ 2013 for C# Developers
C++ 2013 for C# Developers

C++/CLI was originally envisioned as a high-level assembler for the .NET runtime, much like C is often considered a high-level assembler for native code generation. That original vision even included the ability to directly mix IL with C++ code, mostly eliminating the need for the IL assembler ilasm.

As the design of C++/CLI
...

Connecting the Dots: Aligning Projects with Objectives in Unpredictable Times
Connecting the Dots: Aligning Projects with Objectives in Unpredictable Times

Are you ever going to see the value promised from your company’s project portfolio?

The question is all too familiar. The concern is real and legitimate. Technology and other project initiatives have grown faster than the ability of most companies to manage them—affecting the return on the investment of trillions of dollars...

Canon EOS Rebel T5i/700D Digital Field Guide
Canon EOS Rebel T5i/700D Digital Field Guide

All you need to know to use the latest exciting new dslr camera from Canon

If you want to get great photos from Canon's new Rebel T5i/700D dslr camera, you've come to the right place. This practical book takes you step by step through each button, mode, function, and feature of the hot new Rebel T5i/700D, so...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Business Analysis: Microsoft Excel 2010 (MrExcel Library)
Business Analysis: Microsoft Excel 2010 (MrExcel Library)

USE EXCEL 2010 TO GAIN DEEPER INSIGHTS, MAKE SMARTER DECISIONS, AND EARN MORE PROFITS

 

Using real-world examples, Carlberg helps you put Excel’s features and functions to work and get the power of quantitative analysis behind your management...

Program Management for Improved Business Results
Program Management for Improved Business Results

Superior program management begins with superior information and strategy

Program Management for Improved Business Results, Second Edition is a practical guide to real-world program management, written to align with the rigorous PMI® PgMP® certification standards. The book explains the benchmarks and best...

Result Page: 44 43 42 41 40 39 38 37 36 35 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy