Home | Amazing | Today | Tags | Publishers | Years | Search 
Modeling Financial Markets : Using Visual Basic.NET and Databases to Create Pricing, Trading, and Risk Management Models
Modeling Financial Markets : Using Visual Basic.NET and Databases to Create Pricing, Trading, and Risk Management Models
Although this book follows the layout of a programming book, the underlying theme is financial modeling and quantitative trading system development. In a sense, this book really marries four disciplines—computer science, quantitative finance, trading strategy, and quality development—into one, financial engineering....
Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective
Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective
In the knowledge society, the traditional facts of business life are volatile and not given. Every organization is challenged in this context, to enrich its sensors, and its internal processes toward the exploitation of tangible and intangible resources.

During the last few years, an important shift in management
...
The Definitive Guide to NetBeans™ Platform 7
The Definitive Guide to NetBeans™ Platform 7
With this work in your hands, you hold the most current and the most comprehensive guide to the Swing-based rich client platform, NetBeans Platform 7. This theme-rich client platform is highly topical. In addition to the NetBeans Platform, Eclipse RCP is also a principal representative of this category. The development of these two...
Encyclopedia of Parallel Computing
Encyclopedia of Parallel Computing
Parallelism, the capability of a computer to execute operations concurrently, has been a constant throughout the history of computing. It impacts hardware, software, theory, and applications. The fastest machines of the past few decades, the supercomputers, owe their performance advantage to parallelism. Today, physical limitations...
IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
Social Media for Trainers: Techniques for Enhancing and Extending Learning (Essential Tools Resource)
Social Media for Trainers: Techniques for Enhancing and Extending Learning (Essential Tools Resource)

This book is intended primarily for the workplace training practitioner, working partly or entirely in the traditional four - walled classroom. It will also be of use to those working in delivering training online via web conferencing tools, such as WebEx or Elluminate, and those involved in instructional design work for both traditional and...

Open Source GIS: A GRASS GIS Approach
Open Source GIS: A GRASS GIS Approach
Over the past decade, Geographical Information Systems (GIS) have evolved from a highly specialized niche to a technology that affects nearly every aspect of our lives, from finding driving directions to managing natural disasters. While just a few years ago the use of GIS was restricted to a group of researchers, planners and...
Encyclopedia of Parallel Computing (Springer Reference)
Encyclopedia of Parallel Computing (Springer Reference)
Parallelism, the capability of a computer to execute operations concurrently, has been a constant throughout the history of computing. It impacts hardware, software, theory, and applications. The fastest machines of the past few decades, the supercomputers, owe their performance advantage to parallelism. Today, physical limitations...
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)

“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.”

—Vint Cerf, Internet pioneer

 

...
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy