Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Invest Like a Guru: How to Generate Higher Returns At Reduced Risk With Value Investing
Invest Like a Guru: How to Generate Higher Returns At Reduced Risk With Value Investing

Adopt the investment strategy that built Warren Buffett's fortune

Invest Like a Guru provides an invaluable resource for high-quality-focused value investing, with expert insight and practical tools for implementation. Written by the man behind GuruFocus.com, this book expands on the site's value...

Alkane Functionalization
Alkane Functionalization

Presents state-of-the-art information concerning the syntheses of valuable functionalized organic compounds from alkanes, with a focus on simple, mild, and green catalytic processes

Alkane Functionalization offers a comprehensive review of the state-of-the-art of catalytic functionalization of...

Quantum Strangeness: Wrestling with Bell's Theorem and the Ultimate Nature of Reality (The MIT Press)
Quantum Strangeness: Wrestling with Bell's Theorem and the Ultimate Nature of Reality (The MIT Press)
A physicist's efforts to understand the enigma that is quantum mechanics.

Quantum mechanics is one of the glories of our age. The theory lies at the heart of modern society. Quantum mechanics is one of our most valuable forecasters—a “great predictor.” It has immeasurably altered our conception of the...

Mobile Telecommunications Protocols for Data Networks
Mobile Telecommunications Protocols for Data Networks
Technology has changed our lives and the way we see the world. The growing use of mobile technologies in phones, computers and everyday applications has fuelled the demand for efficient connectivity, irrespective of the location of the device. This connectivity has to be provided by various different networks and protocols that guarantee the smooth...
History of Wireless
History of Wireless
Important new insights into how various components and systems evolved

Premised on the idea that one cannot know a science without knowing its history, History of Wireless offers a lively new treatment that introduces previously unacknowledged pioneers and developments, setting a new standard for understanding the evolution of this important...

Introduction to Physical Polymer Science
Introduction to Physical Polymer Science
An Updated Edition of the Classic Text

Polymers constitute the basis for the plastics, rubber, adhesives, fiber, and coating industries. The Fourth Edition of Introduction to Physical Polymer Science acknowledges the industrial success of polymers and the advancements made in the field while continuing to deliver the...

Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Conceptual Modelling in Information Systems Engineering
Conceptual Modelling in Information Systems Engineering
Conceptual modeling has always been one of the cornerstones for information systems engineering as it describes the general knowledge of the system in the so-called conceptual schema.

Krogstie, Opdahl and Brinkkemper compiled 20 contributions from renowned researchers covering all aspects of conceptual modeling on the occasion of Arne...

Operating Systems Concepts with Java
Operating Systems Concepts with Java
An operating system is a program that acts as an intermediary between the user of a computer and the computer hardware. The purpose of an operating system is to provide an environment in which a user can execute programs in a convenient and efficient manner.

Understanding the evolution of operating systems gives us an appreciation for
...
Rape Investigation Handbook
Rape Investigation Handbook
"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com

An unprecedented collaborative work -- the first
...
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

unlimited object storage image
Result Page: 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy