Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Configuring Financial Accounting in SAP
Configuring Financial Accounting in SAP
What you have in your hands is a unique book. You may have seen several books on SAP Financial Accounting (FI) that are available in the market, but none of them are as comprehensive as this, covering the gamut of Financial Accounting in SAP Financials including—besides the regular topics —FI-CA (Contract Accounts...
Algorithmic Puzzles
Algorithmic Puzzles

While many think of algorithms as specific to computer science, at its core algorithmic thinking is defined by the use of analytical logic to solve problems. This logic extends far beyond the realm of computer science and into the wide and entertaining world of puzzles. In Algorithmic Puzzles, Anany and Maria Levitin use many classic...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset

Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.

As Big Data Made Easy: A Working...

Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Teach Yourself the Basics of Aspen Plus
Teach Yourself the Basics of Aspen Plus

Aspen Plus is on of the most popular process simulation software programs used industrially and academically. Though the software is available at many corporations and universities, there are no textbooks which are dedicated to teaching the step-by-step use of the software. This book is designed to fill that need. The structure of the book is...

The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

Understanding Telephone Electronics, Fourth Edition (Newnes)
Understanding Telephone Electronics, Fourth Edition (Newnes)
Covers conventional telephone fundamentals! Explores how telephone systems operate and how digital electronics replace them. "Introduces state-of-the-art speech circuits, dialing, ringing, and central office electronics. Dissects modems and digital transmission techniques. Studies microcomputers and cellular phones. Helps readers increase...
The Future of the MBA: Designing the Thinker of the Future
The Future of the MBA: Designing the Thinker of the Future

The MBA is probably the hottest ticket among the current university graduate degree offerings--every year, more than 120,000 students enroll in MBA programs in the United States, and the estimates in Europe do not lag far behind. In addition, job prospects have never looked better for business school graduates; corporations are hiring more...

How to Develop and Implement a Security Master Plan
How to Develop and Implement a Security Master Plan
Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs.  It provides a thorough understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy