Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Liabilities, Liquidity, and Cash Management: Balancing Financial Risks
Liabilities, Liquidity, and Cash Management: Balancing Financial Risks
"This book provides a very helpful and informative insight into an aspect of finance that has become quite intricate and complex but is nevertheless very fascinating."--Dr. Henry Kaufman, President, Henry Kaufman & Company, Inc.

Strategies and advice on balancing financial risk for leveraged companies

In...

Handbook of Exchange Rates (Wiley Handbooks in Financial Engineering and Econometrics)
Handbook of Exchange Rates (Wiley Handbooks in Financial Engineering and Econometrics)

Praise for Handbook of Exchange Rates

“This book is remarkable. I expect it to become the anchor reference for people working in the foreign exchange field.”

—Richard K. Lyons, Dean and Professor of Finance, Haas School of Business, University of California...

Foundations of Corneal Disease: Past, Present and Future
Foundations of Corneal Disease: Past, Present and Future

The field of cornea has seen tremendous advances over the last 40 years?this uniquely comprehensive book will discuss the history of these advances, current best practices in important diseases of the cornea and ocular surface, and examine future directions in diagnosis and management. Written by leading experts, many of whom trained...

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the...

Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

Practical Business Analytics Using SAS: A Hands-on Guide
Practical Business Analytics Using SAS: A Hands-on Guide

Practical Business Analytics Using SAS: A Hands-on Guide shows SAS users and businesspeople how to analyze data effectively in real-life business scenarios.

The book begins with an introduction to analytics, analytical tools, and SAS programming. The authors—both SAS, statistics, analytics, and big data...

Drools JBoss Rules 5.0 Developer's Guide
Drools JBoss Rules 5.0 Developer's Guide
Business rules can help your business by providing a level of agility and flexibility. As a developer, you will be largely responsible for implementing these business rules effectively, but implementing them systematically can often be difficult due to their complexity. Drools, or JBoss Rules, makes the process of implementing these rules quicker...
International Project Management
International Project Management
International Project Management provides specific guidelines for achieving greater project success. It is the result of 15 years of work on international projects by the authors across various project areas and industries. The authors address a need for modern techniques in project management geared and suited to international...
Practical TCP/IP and Ethernet Networking for Industry (Practical Professional Books)
Practical TCP/IP and Ethernet Networking for Industry (Practical Professional Books)
One of the great protocols that has been inherited from the Internet is TCP/IP and this is being used as the open standard today for all network and communications systems. The reasons for this popularity are not hard to find. TCP/IP and Ethernet are truly open standards available to competing manufacturers and providing the user with a common...
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects who know enterprise development but are new to enterprise service buses (ESBs) and service–oriented architecture (SOA) development. This is the first book to cover a practical approach to SOA using the BEA...
Handbook on Information Technology in Finance (International Handbooks on Information Systems)
Handbook on Information Technology in Finance (International Handbooks on Information Systems)
This Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary research in the intersection between IT and finance. Included are recent trends and challenges, IT systems and architectures in finance, essential developments and case studies on management information systems, service...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy