Home | Amazing | Today | Tags | Publishers | Years | Search 
Dear Mr. Buffett: What An Investor Learns 1,269 Miles From Wall Street
Dear Mr. Buffett: What An Investor Learns 1,269 Miles From Wall Street

Janet Tavakoli takes you into the world of Warren Buffett by way of the recent mortgage meltdown. In correspondence and discussion with him over 2 years, they both saw the writing on the wall, made clear by the implosion of Bear Stearns. Tavakoli, in clear and engaging prose, explains how the credit mess happened beginning with the mortgage...

Realm of Racket: Learn to Program, One Game at a Time!
Realm of Racket: Learn to Program, One Game at a Time!

Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language.

In Realm of...

Multi-Objective Swarm Intelligent Systems: Theory & Experiences (Studies in Computational Intelligence)
Multi-Objective Swarm Intelligent Systems: Theory & Experiences (Studies in Computational Intelligence)
Recently, a new class of heuristic techniques, the swarm intelligence has emerged. In this context, more recently, biologists and computer scientists in the field of “artificial life” have been turning to insects for ideas that can be used for heuristics. Many aspects of the collective activities of social insects,...
Mathematical Tools in Signal Processing with C++ and Java Simulations
Mathematical Tools in Signal Processing with C++ and Java Simulations

In recent decades, the study of signal processing has become increasingly complex, with new techniques and applications constantly being developed for the processing, transformation, and interpretation of signals. This book provides a comprehensive introduction to the traditional and modern methods used in signal processing. It is designed to...

A First Systems Book: Technology and Management (Second Edition)
A First Systems Book: Technology and Management (Second Edition)

To tackle the complex problems of life today, we need to coordinate a wide range of expertise. Systems concepts and methods offer the means of integrating the contributions of specialists, including managers, scientists and engineers. The book introduces simple yet sound concepts and a language understandable to all concerned. Its methods of...

The Correctness-by-Construction Approach to Programming
The Correctness-by-Construction Approach to Programming

The focus of this book is on bridging the gap between two extreme methods for developing software. On the one hand, there are texts and approaches that are so formal that they scare off all but the most dedicated theoretical computer scientists. On the other, there are some who believe that any measure of formality is a waste of time,...

Beginning iOS 6 Development: Exploring the iOS SDK
Beginning iOS 6 Development: Exploring the iOS SDK

The team that brought you the bestselling Beginning iPhone Development is back again for Beginning iOS 6 Development, bringing this definitive guide up-to-date with Apple's latest and greatest iOS 6 SDK, as well as with the latest version of Xcode. 

There's coverage of brand
...

Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
The Power of Business Process Improvement: 10 Simple Steps to Increase Effectiveness, Efficiency, and Adaptability
The Power of Business Process Improvement: 10 Simple Steps to Increase Effectiveness, Efficiency, and Adaptability

Every business process in every organization can be made better, more efficient, more flexible and more adaptable to changing needs. Business process improvement (BPI) can drive substantial bottom-line increases, ultimately accelerating the revenue cycle. "The Power of Business-Process Improvement" proves that even sweeping BPI...

Mac OS X and iOS Internals: To the Apple's Core (Wrox Programmer to Programmer)
Mac OS X and iOS Internals: To the Apple's Core (Wrox Programmer to Programmer)
EVEN MORE THAN TEN YEARS AFTER ITS INCEPTION, there is a dearth of books discussing the architecture of OS X, and virtually none about iOS. While there is plentiful documentation on Objective-C, the frameworks, and Cocoa APIs of OS X, it often stops short of the system-call level and implementation specifi cs. There is some...
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Result Page: 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy