Home | Amazing | Today | Tags | Publishers | Years | Search 
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Sketching User Experiences:  Getting the Design Right and the Right Design (Interactive Technologies)
Sketching User Experiences: Getting the Design Right and the Right Design (Interactive Technologies)
There is almost a fervor in the way that new products, with their rich and dynamic interfaces, are being released to the public-typically promising to make lives easier, solve the most difficult of problems, and maybe even make the world a better place. The reality is that few survive, much less deliver on their promise. The folly? An absence of...
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
Deciding how to invest homeland security resources wisely in the United States can often appear to be an intractable problem because the large, open American society seems to be so vulnerable to so many threats in every corner of the country. This monograph is intended to help bound the problem in order to aid policy and resource decisions about...
Microsoft Office Excel 2007 Formulas & Functions For Dummies (Computer/Tech)
Microsoft Office Excel 2007 Formulas & Functions For Dummies (Computer/Tech)
Make Excel do the math and make sense of your data

Use the Insert Function dialog box, array formulas and functions, and more

Excel 2007 has more than 500 built-in functions. This book looks at the top 150, so you can find out which ones will make your life easier. Want to...

Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Inside Lightroom 2: The serious photographer's guide to Lightroom efficiency
Inside Lightroom 2: The serious photographer's guide to Lightroom efficiency
No-nonsense guide that takes you to the next level of Adobe Photoshop Lightroom

If you're comfortable using the basic features of Lightroom, but really want to push the envelope with this powerful software, 'Inside Lightroom' by acclaimed photographer and Lightroom Beta-tester Richard Earney is a must-have.
...
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Economics / Investments & Securities

Praise for Reverse Engineering Deals on Wall Street with Microsoft Excel

"Allman has written an excellent sequel to his first book Modeling Structured Finance Cash Flows with Microsoft Excel, providing a simple guide on how to deconstruct cash flows through modeling and understanding...

Houches Lectures: 1972, Black Holes (Les Houches Lectures : 1972 Lectures)
Houches Lectures: 1972, Black Holes (Les Houches Lectures : 1972 Lectures)
The story of the phenomenal transformation of general relativity within little more than a decade, from a quiet backwater of research, harboring a handful of theorists, to a booming outpost attracting increasing numbers of highly talented young people as well as heavy investment in experiments, is by now familiar. The amazing thing about this...
Silicon Photonics: An Introduction
Silicon Photonics: An Introduction
The observation by Gordon Moore in 1965 (now universally referred to as Moore’s law) that the number of transistors on an integrated circuit would double every couple of years has become a beacon that continues to drive the electronics industry. Integrated circuits have grown exponentially from the 30-transistor devices of 1965 to...
49 explosive games for the ZX-81 (A Reward book)
49 explosive games for the ZX-81 (A Reward book)
Books as solid as this one don't just spring out of the Spectrum without a serious investment of time and e ffort.

And there has been plenty of both time and effort spent making sure this collection of games for your Spectrum is as good as we could make it. Drawing on the work of some of the UK's best young computer programmers, I've
...
365 Steps to Self-confidence: A Complete Programme for Personal Transformation - in Just a Few Minutes a Day
365 Steps to Self-confidence: A Complete Programme for Personal Transformation - in Just a Few Minutes a Day
"'I've spent hundreds of pounds on books over the last few years, but yours is worth a dozen of my collection.' Personal Development Trainer, Ireland 'Follow the 52 themed chapters including exercises, insights and practical hints on how to overcome your lack of self-esteem and begin to live life to the full NOW, not tomorrow!' GOOD...
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy