Home | Amazing | Today | Tags | Publishers | Years | Search 
The Golden Rule: Safe Strategies of Sage Investors
The Golden Rule: Safe Strategies of Sage Investors

Everything the independent investor needs to know to effectively invest in gold

With today's increasing economic uncertainties, a strong investment strategy is to put a portion of your net worth in gold. However, given investors' overall lack of knowledge about gold as an investment, as wealth insurance, or as a store of...

Selling Digital Music, Formatting Culture
Selling Digital Music, Formatting Culture
Selling Digital Music, Formatting Culture documents the transition of recorded music on CDs to music as digital files on computers. More than two decades after the first digital music files began circulating in online archives and playing through new software media players, we have yet to fully internalize the cultural and aesthetic...
Culture and Conquest in Mongol Eurasia
Culture and Conquest in Mongol Eurasia
'... will occupy and entertain specialists for some time to come ...' Bulletin of the School of Oriental & African Studies

'Thomas Allsen's book is a very compact and informative account of the cultural changes which took place during the supremacy of the Mongols. Allsen is able to share with the reader his impressive knowledge of
...
Making IT Governance Work in a Sarbanes-Oxley World
Making IT Governance Work in a Sarbanes-Oxley World
It may not be readily apparent, but IT is undergoing what may be its
most significant revolution ever—a revolution driven by rapidly
emerging new business models, the power of the customer, global
operations, and radical new technologies at the edge of the Net. And
this revolution is having as much impact on how technology
...
Time Management for System Administrators
Time Management for System Administrators

Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with requests for quick-fixes that...

Beowulf Cluster Computing with Linux, Second Edition (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux, Second Edition (Scientific and Engineering Computation)
This how-to guide provides step-by-step instructions for building a Beowulf-type computer, including the physical elements that make up a clustered PC, the software required, and insights on how to organize the code to exploit parallelism.

Use of Beowulf clusters (collections of off-the-shelf commodity computers programmed to act in...

Institutionalization of Usability : A Step-by-Step Guide
Institutionalization of Usability : A Step-by-Step Guide

At one time, computer hardware was the key differentiator in information technology—what gave an organization it's competitive edge. Then, as hardware prices fell, software took center stage. Today, software having become a broadly shared commodity, a new differentiator has emerged—usability. Applications, including...

Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software

The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited resources, place them on a normal computer network, and install free software so that the computers act together like one powerful server. This makes it possible to build a very inexpensive and reliable business system for a small business...

Invasion of Privacy!  Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers

Pop-up ads, cookies, spyware, spam, junk mail, telemarketing calls. Rapidly evolving technology has made you a target and your personal information a desirable commodity. Your profile is out there and it’s available not just to the highest bidder, but to every bidder. Technology, advertising, the media, and government have converged to...

The IT Career Builder's Toolkit
The IT Career Builder's Toolkit

Your complete guide to building your information technology career in any economy

The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing...

Introduction to Parallel Computing, Second Edition
Introduction to Parallel Computing, Second Edition

Increasingly, parallel processing is being seen as the only cost-effective method for the fast solution of computationally large and data-intensive problems. The emergence of inexpensive parallel computers such as commodity desktop multiprocessors and clusters of workstations or PCs has made such parallel methods generally...

Recent Econometric Techniques for Macroeconomic and Financial Data (Dynamic Modeling and Econometrics in Economics and Finance, 27)
Recent Econometric Techniques for Macroeconomic and Financial Data (Dynamic Modeling and Econometrics in Economics and Finance, 27)

The book provides a comprehensive overview of the latest econometric methods for studying the dynamics of macroeconomic and financial time series. It examines alternative methodological approaches and concepts, including quantile spectra and co-spectra, and explores topics such as non-linear and non-stationary behavior, stochastic...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy