Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Praise for STRUCTURED FINANCE MODELING with Object-Oriented VBA

"This book is an excellent and interesting integration of financial engineering, structured finance, and structured programming, and the book accomplishes this with easy-to-follow examples, using the most commonly available tools, MS VBA and spreadsheets. The author is clearly...

How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Pro Ubuntu Server Administration
Pro Ubuntu Server Administration
Pro Ubuntu Server Administration teaches you advanced Ubuntu system building. After reading this book, you will be able to manage anything from simple file servers to multiple virtual servers to high–availability clusters. This is the capstone volume of the Apress Ubuntu trilogy that includes Beginning Ubuntu Linux, Third...
Microsoft SQL Server 2008 Reporting Services Unleashed
Microsoft SQL Server 2008 Reporting Services Unleashed

The authoritative, example-rich guide to Microsoft’s powerful reporting platform

With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Samsung Galaxy Tabs For Dummies
Samsung Galaxy Tabs For Dummies

A colorful, entertaining, and informative guide to the Samsung Galaxy family of tablets

Samsung's bestselling Galaxy Tabs may come in multiple sizes, but they all share the wildly popular Android operating system and are packed with tons of top-notch tablet features. This full-color book shows you how...

Java Performance: The Definitive Guide
Java Performance: The Definitive Guide

Coding and testing are often considered separate areas of expertise. In this comprehensive guide, author and Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the JVM, as well as the tunings likely to help its performance.

You’ll...

Fedora Linux
Fedora Linux

"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros." -- Behdad Esfahbod, Fedora developer

This book will get you up to speed quickly on Fedora...

SQL Server 2005 Reporting Essentials
SQL Server 2005 Reporting Essentials

SQL Server 2005 Reporting Services lets you create, manage, and deliver a variety of report types that contain data from relational and multidimensional data sources as well as any data source that has a .NET Framework managed data provider, an OLE DB data provider, or an ODBC provider.

You can create...

Knowledge Discovery in Bioinformatics: Techniques, Methods, and Applications (Wiley Series in Bioinformatics)
Knowledge Discovery in Bioinformatics: Techniques, Methods, and Applications (Wiley Series in Bioinformatics)
Wiley Series on Bioinformatics: Computational Techniques and Engineering

Discover how data mining is fueling new discoveries in bioinformatics

As the field of bioinformatics continues to flourish, producing enormous amounts of new data, the need for sophisticated methods of data mining to better manage and extract meaning from...

Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Building on the success of its storefront and fulfillment services, Amazon now allows businesses to "rent" computing power, data storage and bandwidth on its vast network platform. This book demonstrates how developers working with small- to mid-sized companies can take advantage of Amazon Web Services (AWS) such as the Simple Storage...
Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

unlimited object storage image
Result Page: 258 257 256 255 254 253 252 251 250 249 248 247 246 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy