Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Financial Engineering Principles : A Unified Theory for Financial Product Analysis and Valuation
Financial Engineering Principles : A Unified Theory for Financial Product Analysis and Valuation
"Quite simply, he’s done it again. Building upon his previous writings from the fixed income markets, Beaumont has successfully applied his practical hands-on style to bring us a fresh cross-market perspective of bonds, equities, and currencies. Financial Engineering Principles now occupies that portion of my bookshelf reserved for texts...
Decomposition Techniques in Mathematical Programming: Engineering and Science Applications
Decomposition Techniques in Mathematical Programming: Engineering and Science Applications
This textbook for students and practitioners presents a practical approach to decomposition techniques in optimization. It provides an appropriate blend of theoretical background and practical applications in engineering and science, which makes the book interesting for practitioners, as well as engineering, operations research and applied...
Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

HTML5 and JavaScript Projects: Build on your Basic Knowledge of HTML5 and JavaScript to Create Substantial HTML5 Applications
HTML5 and JavaScript Projects: Build on your Basic Knowledge of HTML5 and JavaScript to Create Substantial HTML5 Applications
Build on your basic knowledge of HTML5 and JavaScript to create substantial HTML5 applications. Through the many interesting projects you can create in this book, you'll develop HTML5 skills for future projects, and extend the core skills you may have learned with its companion book, The Essential Guide to HTML5.

...

The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)

Based on the author’s introductory course at the University of Oregon, Explorations in Computing: An Introduction to Computer Science focuses on the fundamental idea of computation and offers insight into how computation is used to solve a variety of interesting and important real-world problems. Taking an...

Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python

Develop real-world applications powered by the latest advances in intelligent systems

Key Features

  • Gain real-world contextualization using deep learning problems concerning research and application
  • Get to know the best practices to improve and optimize your machine...
Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
Pesticides: A Toxic Time Bomb in Our Midst
Pesticides: A Toxic Time Bomb in Our Midst
The writing of this book came about through a serendipitous circumstance. I wrote a book dealing with child labor in the United States, published three years earlier, containing a chapter that included a description of the hazards migrant farmworkers and their children face, not the least of which was exposure to pesticides. While mentioning the...
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Play Redux: The Form of Computer Games (Digital Culture Books)
Play Redux: The Form of Computer Games (Digital Culture Books)
A new look at digital gaming and the aesthetics of play
 
Play is a very interesting thing. Somewhat strangely, though, play is not studied as often as are the consequences of play.
 
The reason for this becomes clear when we try to study play: it is a...
Basic Geotechnical Earthquake Engineering
Basic Geotechnical Earthquake Engineering

This title features subject matter that is organised logically to make it easy and interesting for the students. Emphasis has been given on the basics of geotechnical earthquake engineering. Home work problems have been given at the end of each chapter to test the understanding of concepts given in the chapter. At the end of appropriate...

Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy