Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investing Strategies for the High Net-Worth Investor: Maximize Returns on Taxable Portfolios
Investing Strategies for the High Net-Worth Investor: Maximize Returns on Taxable Portfolios

A proven model for achieving high returns on taxable investments

Investing Strategies for the High Net-Worth Investor showcases an investing approach that helps readers understand the unique challenges and opportunities that wealthy families face when building a diversified portfolio for multiple generations. Renowned...

Optimization and Security Challenges in Smart Power Grids (Energy Systems)
Optimization and Security Challenges in Smart Power Grids (Energy Systems)

This book provides an overview of state-of-the-art research on “Systems and Optimization Aspects of Smart Grid Challenges.” The authors have compiled and integrated different aspects of applied systems optimization research to smart grids, and also describe some of its critical challenges and requirements.

The promise...

Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide
PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide

The ultimate study package for the new PMI-ACP exam

The PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide is an all-in-one package for comprehensive exam preparation. This up-to-date guide is fully aligned with the latest version of the exam, featuring coverage of 100 percent of the...

A+ Fast Pass
A+ Fast Pass

From the author of Sybex’s best-selling A+ Study Guide comes the streamlined tool you need to bone up on critical A+ information: A+ Fast Pass.

Coverage includes:

  • Installing, configuring, and upgrading hardware
  • Diagnosing and troubleshooting hardware problems
  • ...
Information Technology: Selected Tutorials (IFIP International Federation for Information Processing)
Information Technology: Selected Tutorials (IFIP International Federation for Information Processing)
This book contains a selection of tutorials on hot topics in information
technology, which were presented at the IFIP 18th World Computer
Congress. WCC2004 took place at the Centre de Congrès Pierre Baudis, in
Toulouse, France, from 22 to 27 August 2004.

The 11 chapters included in the book were chosen from
...
Java Deployment with JNLP and WebStart
Java Deployment with JNLP and WebStart

Java Deployment takes a very practical approach to the topic of deploying Java applications. First, the book presents the major deployment concerns a Java developer faces and addresses the most common deployment scenarios. Next, the book addresses deployment issues the developer faces while coding a project. Finally, the book presents...

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Advances in Information Security)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Advances in Information Security)
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions....
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
From the reviews:

"...a useful reference for all biometric security professionals and researchers. The four coauthors have a distinguished combination of academic and professional experience....Overall, readers will be pleased with the style and substance of this book." -Computing Reviews

"This is a comprehensive reviews...

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
The Edge of Infinity: Supermassive Black Holes in the Universe
The Edge of Infinity: Supermassive Black Holes in the Universe

This timely book is suitable for the general reader wishing to find answers to some of the intriguing questions now being asked about black holes. Although once recognized as the most destructive force in nature, following a cascade of astonishing discoveries, the opinion of supermassive black holes has undergone a dramatic shift. Astronomers...

Wireless Networking Complete (Morgan Kaufmann Series in Networking)
Wireless Networking Complete (Morgan Kaufmann Series in Networking)

Given the explosion of new wireless communications techniques and the host of wireless network technologies and applications currently available or on the drawing board, it is safe to say that we are in the midst of a wireless networking revolution. Industry adoption of next-generation specifications will provide a substantial boost to the...

unlimited object storage image
Result Page: 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy