Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
Managing Your Personal Finances with Quicken : Visual QuickProject Guide
Managing Your Personal Finances with Quicken : Visual QuickProject Guide

The Visual QuickProject Guide that you hold in your hands offers a unique way to learn about new technologies. Instead of drowning you in theoretical possibilities and lengthy explanations, this Visual QuickProject Guide uses big, color illustrations coupled...

QuickBooks 2010 For Dummies
QuickBooks 2010 For Dummies

The annual update of a perennial bestseller, fully revised for the newest QuickBooks release

QuickBooks is the leading software package for small business accounting, updated each year so it remains cutting-edge. QuickBooks "X" For Dummies provides all the information you need to start using the newest version in your...

Software for Your Head: Core Protocols for Creating and Maintaining Shared Vision
Software for Your Head: Core Protocols for Creating and Maintaining Shared Vision

The first publication of the most significant results of the authors' unprecedented five-year investigation into the dynamics of contemporary teams. Will provide a means for any team to create for itself a compelling state of shared vision. Softcover.

We didn’t create The Core.

Instead, we watched it grow. We...

The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
The hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a...
The Well Timed Strategy: Managing the Business Cycle for Competitive Advantage
The Well Timed Strategy: Managing the Business Cycle for Competitive Advantage

Most companies ignore one of their best opportunities for honing competitive advantage: the opportunity to proactively manage business cycles and macroeconomic turbulence. Despite the profound impact that the business cycle has on the fortunes and fate of so many businesses large and small--and the employees and investors...

Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games concisely draws together and illustrates the overlapping and interacting technical concerns of these sectors. The text explains the principles behind modern multiplayer communication systems and the techniques underlying contemporary networked games. The traffic patterns that modern games impose on networks, and...
eBay Commerce Cookbook: Using eBay APIs: PayPal, Magento and More
eBay Commerce Cookbook: Using eBay APIs: PayPal, Magento and More
The way in which we do commerce across the globe has changed greatly in the last decade, and indeed in just the last couple of years. No longer can commerce be thought of as solely completed in brick-and-mortar storefronts and on PCs, through online commerce sites. We now have commerce anywhere and everywhere, through mobile devices and...
Data Mining and Statistics for Decision Making
Data Mining and Statistics for Decision Making
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of knowledge. Data mining is usually associated with a business or an organization's need to identify...
Aligning Business and IT with Metadata: The Financial Services Way
Aligning Business and IT with Metadata: The Financial Services Way

"An invaluable resource that I recommend to anyone in the financial services industry."
Dirk Riehle, Senior Research Scientist, SAP Labs LLC

"Risk officers, compliance officers, information/IT officers and CFOs coping with financial, risk, regulatory, and data management...

Advances in K-means Clustering: A Data Mining Thinking (Springer Theses: Recognizing Outstanding Ph.D. Research)
Advances in K-means Clustering: A Data Mining Thinking (Springer Theses: Recognizing Outstanding Ph.D. Research)
The series ‘‘Springer Theses’’ brings together a selection of the very best Ph.D. theses from around the world and across the physical sciences. Nominated and endorsed by two recognized specialists, each published volume has been selected for its scientific excellence and the high impact of its contents for...
The Economics of Mobile Telecommunications
The Economics of Mobile Telecommunications
This book distils years of work on the mobile telecommunications industry.
I became interested in this industry for professional reasons during the
mid-1990s, a period when the industry was making the jump from a
premium service industry for mostly professional users to a truly mass
market. In my capacity as an applied
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy