Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
The expansion of our reliance on software in many aspects of modern society has coincided with a number of incidents in aeronautics, astronautics, transportation, medical devices, energy generation, banking and finance. Failures caused by software have introduced more than just inconvenience, but significant property damage,...
The Executive MBA for Engineers and Scientists
The Executive MBA for Engineers and Scientists

All too often, a simple lack of understanding of fundamental business concepts is enough to prevent capable scientists and engineers from receiving otherwise deserved promotions. These days, technical merit and hard work alone no longer guarantee upward mobility. For scientists and engineers with aspirations of moving up the corporate ladder...

Risk Management and Value Creation in Financial Institutions
Risk Management and Value Creation in Financial Institutions
From an empirical as well as a personal point of view, risk management in the financial industry has been one of the most exciting and most researched areas over the last decade. Depositors and regulators claim that risk management is necessary, and many banks argue that superior risk management can create (shareholder) value. However, from a...
Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets?
Lecturing Birds on Flying: Can Mathematical Theories Destroy the Financial Markets?
Praise for Lecturing Birds On Flying

"Finally, a book taking a critical look at quantitative finance models, illuminating both their flawed fantasy assumptions as well as the uncritical use of such models on Wall Street, in many cases, leading to billion dollar losses. Pablo Triana knows both the financial...

State of the World 2009: Into a Warming World (State of the World)
State of the World 2009: Into a Warming World (State of the World)

A comprehensive guide to global warming and the steps we must take to combat it.

The evidence continues to mount: melting ice caps, rising temperatures, increasingly frequent natural disasters. As the devastating effects of global warming come into sharper focus, societies must work to both mitigate greenhouse gas...

Introduction to Probability and Stochastic Processes with Applications
Introduction to Probability and Stochastic Processes with Applications

An easily accessible, real-world approach to probability and stochastic processes

Introduction to Probability and Stochastic Processes with Applications presents a clear, easy-to-understand treatment of probability and stochastic processes, providing readers with a solid foundation they can build upon throughout their...

Liability-Driven Investment: From Analogue to Digital, Pensions to Robo-Advice (Wiley Finance)
Liability-Driven Investment: From Analogue to Digital, Pensions to Robo-Advice (Wiley Finance)

Understand the investment template that dominates the pension industry

Liability-Driven Investment is the practitioner’s guide to this increasingly popular investment template. Already the dominant framework for pension schemes in Europe and the UK, the LDI market is expected to grow significantly...

How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Advertising For Dummies (Business & Personal Finance)
Advertising For Dummies (Business & Personal Finance)
Advertising, despite whatever impressions you have or information you’ve heard, isn’t complicated — or rather, it’s only as complicated as you want it to be. Sure, a lot is involved with advertising. Print, broadcast, outdoor, direct mail, collateral materials, Internet — each media has its own positives and negatives,...
For Crying Out Loud: From Open Outcry to the Electronic Screen
For Crying Out Loud: From Open Outcry to the Electronic Screen

In Praise of For Crying Out Loud

"Endowed with strong parents and a bit of luck, Leo Melamed has made a remarkable escape from Nazi occupied Poland to building one of the pinnacles of global finance. Over four decades and more, he was the leading force in bringing his beloved 'Merc' from obscure trading pits for butter...

Microsoft Dynamics NAV 2009 Programming Cookbook
Microsoft Dynamics NAV 2009 Programming Cookbook

Microsoft Dynamics NAV 2009 is a business management solution that helps simplify and streamline highly specialized business processes such as finance, manufacturing, customer relationship management, supply chains, analytics, and electronic commerce for small and medium-sized enterprises. ERP systems like NAV thus become the center of a...

unlimited object storage image
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy