Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)

A practical guide for business calculations

Mastering Financial Mathematics in Microsoft © Excel provides a comprehensive set of tools, methods and formulas which apply Excel to solving mathematical problems.

The book:

  • Explains basic calculations for mathematical finance
  • ...
Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Domain-Specific Modeling: Enabling Full Code Generation
Domain-Specific Modeling: Enabling Full Code Generation
Domain-Specific Modeling (DSM) is the latest approach to software development, promising to greatly increase the speed and ease of software creation. Early adopters of DSM have been enjoying productivity increases of 500–1000% in production for over a decade. This book introduces DSM and offers examples from various fields to illustrate to...
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Developing Microservices with Node.js
Developing Microservices with Node.js

Key Features

  • Real world example explained chapter after chapter with code examples.
  • Useful concepts for other languages like Java or PHP
  • Easy to follow by people with little to none experience in Node.js
  • Node.js Version 0.12.2 and the latest compatible versions of Seneca and...
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko has been writing columns for the computer trade press and championing database programming techniques and ANSI/ISO standards via his newsgroup activity for 20 years.

In this complete revision and expansion of his first SQL Puzzles book, he challenges you with his trickiest puzzlesand then helps solve them with a variety of
...
Practical PowerPivot & DAX Formulas for Excel 2010
Practical PowerPivot & DAX Formulas for Excel 2010

PowerPivot: What a name! Or I should really say what’s in a name? Powerful Pivoting? Pivot-table for power users?

PowerPivot is a lot more than that. When I started the PowerPivot project back in 2007, along with Amir Netz (Microsoft BI Distinguished Engineer), the incubation project was called BI Sandbox. We had been looking...

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New...
Result Page: 136 135 134 133 132 131 130 129 128 127 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy