Home | Amazing | Today | Tags | Publishers | Years | Search 
The Strategy Gap: Leveraging Technology to Execute Winning Strategies
The Strategy Gap: Leveraging Technology to Execute Winning Strategies

Praise for The Strategy Gap

"With a better handle on the financial pulse of the business, enterprises will be better able to meet the Street’s expectations of financial transparency and corporate accountability. The writers do a masterful job of getting readers to this point of awareness, and further display their insight...

Credit Portfolio Management
Credit Portfolio Management
Market realities have forced many financial institutions (and will force many others in the future) to change the way they manage their portfolios of credit assets. Evidence of this change can be seen in the rapid growth of secondary loan trading, credit derivatives, and loan securitizations. Less obvious–but far more important–is the...
Handbook of Data Visualization (Springer Handbooks of Computational Statistics)
Handbook of Data Visualization (Springer Handbooks of Computational Statistics)
Visualizing the data is an essential part of any data analysis. Modern computing developments have led to big improvements in graphic capabilities and there are many new possibilities for data displays. This new volume in the series Springer Handbooks of Computational Statistics gives an overview of modern data visualization methods, both in theory...
Maple and Mathematica: A Problem Solving Approach for Mathematics
Maple and Mathematica: A Problem Solving Approach for Mathematics
This book compares the two computer algebra programs, Maple and Mathematica used by students, mathematicians, scientists, and engineers.

Structured by presenting both systems in parallel, Mathematicas users can learn Maple quickly by finding the Maple equivalent to Mathematica functions, and vice versa.

This student reference handbook...

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Deploying Voice over Wireless LANs (Networking Technology)
Deploying Voice over Wireless LANs (Networking Technology)

The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions

 

Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly...

Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

The IBM Totalstorage Solutions Handbook (IBM Redbooks)
The IBM Totalstorage Solutions Handbook (IBM Redbooks)

This IBM Redbook provides overviews and pointers for information on the most current IBM TotalStorage products, showing how IBM is uniquely positioned to help you build up an on-demand business, considering its depth and breadth of storage IT experience and strong lineup of products, solutions, and services.

This Redbook is divided into...

Create Your Own Hedge Fund: Increase Profits and Reduce Risks with ETFs and Options (Wiley Trading)
Create Your Own Hedge Fund: Increase Profits and Reduce Risks with ETFs and Options (Wiley Trading)

"Options writing made simple for the layman."
—James Altucher, author of Trade Like a Hedge Fund

"One of the clearest explanations of how to use options as they were originally intended: as a component of an overall strategy in conjunction with other positions."
—Robert V. Green,
...

New Windows Interface (Microsoft Corporation)
New Windows Interface (Microsoft Corporation)

Here's the key to developing applications for Microsoft Windows.

THE WINDOWS INTERFACE GUIDELINES FOR SOFTWARE DESIGN is an essential handbook for all programmers and designers working with the latest release of Windows, regardless of experience level or development tools used. This book covers the basic principles of...

DB2(R) Universal Database V8 Handbook for Windows, UNIX, and Linux
DB2(R) Universal Database V8 Handbook for Windows, UNIX, and Linux
IBM DB2 Universal Database V8 offers breakthrough availability, manageability, performance, and scalability. Now, straight from IBM, there's a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows.

This definitive reference covers every aspect of deploying and managing DB2 Universal...

Digital Government: Principles and Best Practices
Digital Government: Principles and Best Practices

E-government has emerged not merely as a specialization in public administration but as a transformative force affecting all leaves and functions in government. Digital Government: Principles and Best Practices, written by a collection of practitioners and researchers, provides an overview of the management challenges and issues...

Result Page: 130 129 128 127 126 125 124 123 122 121 120 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy