Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Excel PivotTables and Charts
Excel PivotTables and Charts

These are powerful, flexible, and complex tools, and most Excel users never tap their full potential. But you can, with Peter Aitken's step-by-step tutorials, understandable instructions, and detailed explanations. You'll learn to create and use PivotTables and charts from the simplest to the most complex.

This book will help you...

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
Retirementology: Rethinking the American Dream in a New Economy
Retirementology: Rethinking the American Dream in a New Economy

Looking ahead to retirement? Depending on your circumstances and your age, you may no longer have any margin for error. And your emotions and irrational behavior could be perpetuating a dangerous cycle of overspending and rising debt that may shatter whatever vision of retirement you still have. Welcome to the world of...

Modeling Derivatives in C++
Modeling Derivatives in C++

This book is the definitive and most comprehensive guide to modeling derivatives in C++ today. Providing readers with not only the theory and math behind the models, as well as the fundamental concepts of financial engineering, but also actual robust object-oriented C++ code, this is a practical introduction to the most important derivative...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The First Computers--History and Architectures (History of Computing)
The First Computers--History and Architectures (History of Computing)
"A cohesive, well-defined discussion of the architecture of early computers."
Mary Croarken, Business History

"A well-balanced and fascinating perspective on a wide range of early computing devices."
Nathan Ensmenger, IEEE Spectrum
...
How to Raise All the Money You Need for Any Business
How to Raise All the Money You Need for Any Business
In school many of us learned that water is the universal solvent. Yet when we get into the real world of business or income real estate we soon learn that — in most of our lives — money is the universal solvent!

So the biggest challenge you, as a beginning or experienced wealth builder, face is raising the money you need to
...
Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Quicken 2007 On Demand
Quicken 2007 On Demand

Learn how to make the most of the latest version of one of the most popular personal finance software applications available with Quicken 2007 On Demand. This book uses step-by-step, visual instructions to show you how to get up and running quickly using this latest version of Quicken. You...

Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)

This book provides a complete and comprehensive overview of 3G UMTS charging services

Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy