Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Electronic and Algorithmic Trading Technology: The Complete Guide
Electronic and Algorithmic Trading Technology: The Complete Guide

Electronic and algorithmic trading has become part of a mainstream response to buy-side traders' need to move large blocks of shares with minimum market impact in today's complex institutional trading environment. This book illustrates an overview of key providers in the marketplace. With electronic trading platforms becoming...

Internet Babylon: Secrets, Scandals, and Shocks on the Information Superhighway
Internet Babylon: Secrets, Scandals, and Shocks on the Information Superhighway

* Looks at the Internet from a morbid, sordid, entertaining perspective rather than a technical how-to perspective

* Makes the Internet fun, fascinating, and non-intimidating for casual users.

* Focuses on well-known actors, politicians, performing artists, and other public figures and how they have been treated...

RF Mems & Their Applications
RF Mems & Their Applications
The growing requirement for wireless devices with increased functionality and reduced power consumption is driving the development of new RF micro-electro-mechanical systems (RF MEMS).

RF MEMS and their Applications sets out to address an increasing need for information by providing a vital overview of this emerging field.

...
The Compromise of Liberal Environmentalism
The Compromise of Liberal Environmentalism
Mark W. Zacher, University of British Columbia
Clearly one of the best studies on international environmental politics.

"Bernstein convincingly and usefully rejects the role of epistemic communities as a driving force behind the norm change he identifies... Compelling... His attention to the role of ideas...

Starship Therapise: Using Therapeutic Fanfiction to Rewrite Your Life
Starship Therapise: Using Therapeutic Fanfiction to Rewrite Your Life
I write this foreword during a pandemic of epic proportion, one not only wrought by nature but also helped along by those entrusted with her care. It may very well be that we are actualizing the Terminator’s prophecy when he matter-of-factly proclaimed, as if simply reading from the pages of history, that “it is in...
Ethical Naturalism: Current Debates
Ethical Naturalism: Current Debates

Ethical naturalism is narrowly construed as the doctrine that there are moral properties and facts, at least some of which are natural properties and facts. Perhaps owing to its having faced, early on, intuitively forceful objections by eliminativists and non-naturalists, ethical naturalism has only recently become a central player in the...

Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
The Making of a Neuromorphic Visual System
The Making of a Neuromorphic Visual System
This book presents an approach to the construction of a visual system, which is behaviorally, computationally and neurally motivated. The goal is to characterize the process of visual categorization and to find a suitable representation format that can successfully deal with the structural variability existent within visual categories. The book...
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...
Trends in Optical Non-Destructive Testing and Inspection
Trends in Optical Non-Destructive Testing and Inspection
This book covers a wide range of measurement techniques broadly referred to as Optical Metrology, with emphasis on their applications to nondestructive testing. If we look separately at each of the two terms making the generic name Optical Metrology, we find a link to two of the most distinctive aspects of humans: a particularly well developed...
New Marketing
New Marketing
The New Marketing presents a comprehensively revised blueprint for the marketing process developed by Malcolm McDonald and Hugh Wilson to address second-generation changes brought about by technological development and the associated 'information revolution'. Built around the leading concept of a value exchange with customers, it provides essential...
Managing Service Level Quality: Across Wireless and Fixed Networks
Managing Service Level Quality: Across Wireless and Fixed Networks
UMTS as a technology allows for exciting new applications of some of the best ideas of services in the fixed telecoms, cellular/mobile telecoms, and internet environments, with many revolutionary new possibilities which simply do not exist in the current media and communications vehicles.The current worldwide interest in UMTS/3G is driven partly by...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy