Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real Options Analysis Course : Business Cases and Software Applications
Real Options Analysis Course : Business Cases and Software Applications
Praise for Real Options Analysis Course

"Dr. Mun’s latest book is a logical extension of the theory and application presented in Real Options Analysis. More specifically, the Real Options Analysis Course presents numerous real options examples and provides the reader with step-by-step problem-solving techniques. After having read the...

Computer Organization and Design Fundamentals
Computer Organization and Design Fundamentals

Computer Organization and Design Fundamentals takes the reader from the basic design principles of the modern digital computer to a top-level examination of its architecture. This book can serve either as a textbook to an introductory course on computer hardware or as the basic text for the aspiring geek who wants to learn about digital...

Parallel Programming in OpenMP
Parallel Programming in OpenMP
"This book will provide a valuable resource for the OpenMP community."

- Timothy G. Mattson, Intel Corporation

"This book has an important role to play in the HPC community-both for introducing practicing professionals to OpenMP and for educating students and professionals about parallel programming. I'm happy...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

The End of Software: Transforming Your Business for the On Demand Future
The End of Software: Transforming Your Business for the On Demand Future
Twenty-five years ago, the high-tech business was small, computers were largely relegated to accounting, and the money major corporations spent on information technology barely made a dent in their overall budgets. Today that has all changed. High-tech businesses are some of the largest in the world. The Dow Jones Industrial Average includes four...
Open Source for Windows Administrators (Administrator's Advantage Series)
Open Source for Windows Administrators (Administrator's Advantage Series)
The Most Comprehensive Reference on Open Source Apps for Windows Users!

This book introduces Microsoft® Windows® administrators to the world of Open Source applications in order to save time and money. It provides readers with information and techniques for using the appropriate Open Source applications in a variety of situations, such...

IT Innovation for Adaptability and Competitiveness
IT Innovation for Adaptability and Competitiveness

IT Innovation for Adaptability and Competitiveness addresses the topic of IT innovations that can further an organization's ability to adapt and be competitive. Thus we address the problem at an earlier starting point, that is, the emergence of something innovative in an organization, applied to that organization, and its process of being...

Intel Edison Projects: Build exciting IoT projects with Intel Edison
Intel Edison Projects: Build exciting IoT projects with Intel Edison

Build powerful Robots and IoT solutions using Intel Edison

About This Book

  • Learn to build advanced level robots with Intel Edison and Arduino
  • Efficiently build and program home automation and IoT projects with Intel Edison
  • Master the skills of creating...
Java Game Programming for Dummies
Java Game Programming for Dummies
Online game design just got easier with Java Game Programming For Dummies, your all-in-one reference guide to writing cool, cutting-edge Internet games. Java Game Programming For Dummies guides new and veteran game designers alike through the nuts and bolts of creating fun, user-friendly games that can be played...
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy