Home | Amazing | Today | Tags | Publishers | Years | Search 
Electronic and Algorithmic Trading Technology: The Complete Guide
Electronic and Algorithmic Trading Technology: The Complete Guide

Electronic and algorithmic trading has become part of a mainstream response to buy-side traders' need to move large blocks of shares with minimum market impact in today's complex institutional trading environment. This book illustrates an overview of key providers in the marketplace. With electronic trading platforms becoming...

Easy To Understand Guide Hom Com
Easy To Understand Guide Hom Com

TO MANY PEOPLE, the word "computer" is a kind of future shock - an image of huge, intimidating machines banked in specially climate-controlled rooms, deep in corporate America. The people who use them, we think, are an elite group - far from ordinary people, hunched over their glowing video screens like sorcerers bending over a...

The BMW 5 Series and X5: A History of Production Cars and Tuner Specials, 1972-2008
The BMW 5 Series and X5: A History of Production Cars and Tuner Specials, 1972-2008

In the late 1960s racer and businessman Gordon Spice familiarized himself with the Nürburgring using a rented BMW 2002. He went through a couple of sets of tires and three sets of brake pads during the exercise and covered the cost of such consumables by charging folks to ride with him! The rental company was somewhat puzzled by the fact...

Software Engineering Techniques: Design for Quality
Software Engineering Techniques: Design for Quality

The aim of software engineering is to find methods for developing high quahty software products at a reasonable cost. As more and more computers are being used in areas in which a malfunction of the system can be a source of serious losses or disturbances to the functioning of the society, the quality of software becomes more and more...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

Mac Digital Photography
Mac Digital Photography

One day,Erica and her husband took the kids out for ice cream, and she noticed a big advertisement hanging above the counter. It said, “Bring in your digital photographs. We’ll put them on ice cream cakes.” She found the manager and asked what was involved. “It’s simple,” she said. “Just bring...

Tucci and Usmani's The Business of Photography
Tucci and Usmani's The Business of Photography

So you’ve decided to be a photographer. You studied photography in college or went to art school, and you’ve come to the point of deciding that it’s time to hang out your shingle. Or maybe you’re self-taught and everyone loves your work and says, “Hey, you could make...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

Agile Business Rule Development: Process, Architecture, and JRules Examples
Agile Business Rule Development: Process, Architecture, and JRules Examples

According to Wordnet, a rule is “a principle or condition that customarily governs behavior” or “a prescribed guide for conduct or action.” Businesses, and organizations in general, operate under a number of rules: rules about what services to offer and to whom; rules about how much to charge for those services;...

Building Application Servers (SIGS: Advances in Object Technology)
Building Application Servers (SIGS: Advances in Object Technology)
You've read everything you can find about middleware, CORBA, transaction monitors, message brokers, enterprise JavaBeans, and other distributed technologies. Now it's time to put them to work. Time to build your company's first multi-tiered application. But where do you start? How do you structure the programs? How...
Doing Child and Adolescent Psychotherapy: Adapting Psychodynamic Treatment to Contemporary Practice
Doing Child and Adolescent Psychotherapy: Adapting Psychodynamic Treatment to Contemporary Practice
Almost 10 years ago I wrote a guide to child therapy. I worked hard, then, to make the book relevant, timely, and thorough. But a lot has happened over the past decade. The economics of mental health, a euphemism for managed care and insurance companies, have grown from supporters of what we do to dictators of it. Even as we meet...
How to Create and Manage a Hedge Fund: A Professional's Guide
How to Create and Manage a Hedge Fund: A Professional's Guide
This book is intended for anyone interested in creating and managing a hedge fund. Individuals trading on exchange floors, within broker-dealers, on bank currency desks, or in mutual funds, commodity pools, and other hedge funds may have a track record as a basis for a hedge fund start-up. Organizations such as mutual funds,...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy