|
|
|
|
|
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)Praise for STRUCTURED FINANCE MODELING with Object-Oriented VBA
"This book is an excellent and interesting integration of financial engineering, structured finance, and structured programming, and the book accomplishes this with easy-to-follow examples, using the most commonly available tools, MS VBA and spreadsheets. The author is clearly... | | Arduino Robotics (Technology in Action)
This book will show you how to use your Arduino to control a variety of different robots, while providing step-by-step instructions on the entire robot building process. You'll learn Arduino basics as well as the characteristics of different types of motors used in robotics. You also discover controller methods and failsafe... | | The Truth About Being a Leader
Praise for The Truth About Being a Leader
“If you ever met Dr. Otazo, you certainly would read her new Truth book. She is as she writes—engaging, pithy, memorable. Take ‘Truth 33: Questions Unite; Answers Divide.’ Now ain’t that the truth.... |
|
3ds Max Modeling: Bots, Mechs, and Droids (Wordware Game and Graphics Library)
3ds Max Modeling: Bots, Mechs, and Droids offers an unparalleled, project-based learning strategy for anyone who is interested in modeling with 3ds Max. From the very first pages, readers will discover how to use the Max toolset to create sophisticated models, including a spider bot, hunter-killer, battle mech, and android. Learn how to use... | | Protecting SQL Server Data
For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.
These... | | |
|
| | Arthur: God and Hero in Avalon
For fifteen centuries, legends of King Arthur have enthralled us. Born in the misty past of a Britain under siege, half-remembered events became shrouded in ancient myth and folklore. The resulting tales were told and retold, until over time Arthur, Camelot, Avalon, the Round Table, the Holy Grail, Excalibur, Lancelot, and ... | | Hacking Exposed Cisco NetworksImplement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 |