Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Optimal Portfolio Modeling, CD-ROM includes Models Using Excel and R: Models to Maximize Returns and Control Risk in Excel and R (Wiley Trading)
Optimal Portfolio Modeling, CD-ROM includes Models Using Excel and R: Models to Maximize Returns and Control Risk in Excel and R (Wiley Trading)

it takes more than just precise timing and picking the right stocks to achieve exceptional results in today's markets. In order to capture consistent success, you need to strike the right balance between position sizing and risk management.

Nobody understands this better than author Philip McDonnell, and with Optimal Portfolio Modeling,...

The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often, the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such instances, one...
System Engineering and Automation: An Interactive Educational Approach
System Engineering and Automation: An Interactive Educational Approach

This book provides insight and enhanced appreciation of analysis, modeling and control of dynamic systems. The reader is assumed to be familiar with calculus, physics and some programming skills. It might develop the reader’s ability to interpret physical significance of mathematical results in system analysis. The book also prepares...

Category Theory for Computing Science
Category Theory for Computing Science

This book is a textbook in basic category theory, written specifically to be read by researchers and students in computing science. We expound the constructions we feel are basic to category theory in the context of examples and applications to computing science. Some categorical ideas and constructions are already used heavily in computing...

Fundamentals of ActionScript 3.0: Develop and Design
Fundamentals of ActionScript 3.0: Develop and Design

Welcome to ActionScript. Over the next several chapters, you’ll be introduced to one of the most versatile programming languages to create web applications for the browser, desktop applications, and mobile apps for multiple platforms. For years the Flash Platform has provided people with the most powerful set of...

Discrete Mathematics and its Applications
Discrete Mathematics and its Applications

Discrete Mathematics and its Applications is a focused introduction to the primary themes in a discrete mathematics course, as introduced through extensive applications, expansive discussion, and detailed exercise sets. These themes include mathematical reasoning, combinatorial analysis, discrete structures, algorithmic thinking, and enhanced...

Einstein in Matrix Form: Exact Derivation of the Theory of Special and General Relativity without Tensors
Einstein in Matrix Form: Exact Derivation of the Theory of Special and General Relativity without Tensors

This book is an introduction to the theories of Special and General Relativity. The target audience are physicists, engineers and applied scientists who are looking for an understandable introduction to the topic - without too much new mathematics. The fundamental equations of Einstein's theory of Special and General Relativity are...

Introduction to Computer Security
Introduction to Computer Security

In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security...

Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
Hybrid Intelligent Systems for Pattern Recognition Using Soft Computing: An Evolutionary Approach for Neural Networks and Fuzzy Systems
We describe in this book, new methods for intelligent pattern recognition using soft computing techniques. Soft Computing (SC) consists of several computing paradigms, including fuzzy logic, neural networks, and genetic algorithms, which can be used to produce powerful hybrid intelligent systems for pattern recognition. Hybrid intelligent systems...
Quantum Gravitation: The Feynman Path Integral Approach
Quantum Gravitation: The Feynman Path Integral Approach
The book covers the theory of Quantum Gravitation from the point of view of Feynman path integrals. These provide a manifestly covariant approach in which fundamental quantum aspects of the theory such as radiative corrections and the renormalization group can be systematically and consistently addressed. The path integral method is suitable for...
Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all factors that affect a business, such as customers, competitors, business partners,...

unlimited object storage image
Result Page: 164 163 162 161 160 159 158 157 156 155 154 153 152 151 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy