Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Systems Reengineering and Integration
Information Systems Reengineering and Integration
The strategic importance of information systems is now widely accepted, and over the last three decades these systems have received considerable investment. Systems have evolved from file systems, through database systems, to the emergence of Management Information Systems (MIS) and more recently Executive Information Systems (EIS). With the...
Modelling, Pricing, and Hedging Counterparty Credit Exposure: A Technical Guide (Springer Finance)
Modelling, Pricing, and Hedging Counterparty Credit Exposure: A Technical Guide (Springer Finance)

The credit crisis that started in 2007, with the collapse of well-established financial institutions and the bankruptcy of many public corporations, has clearly shown the importance for any company entering the derivative business of modelling, pricing, and hedging its counterparty credit exposure.

Building an accurate...

CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Time Series Analysis and Its Applications: With R Examples (Springer Texts in Statistics)
Time Series Analysis and Its Applications: With R Examples (Springer Texts in Statistics)

Time Series Analysis and Its Applications presents a balanced and comprehensive treatment of both time and frequency domain methods with accompanying theory. Numerous examples using nontrivial data illustrate solutions to problems such as discovering natural and anthropogenic climate change, evaluating pain perception...

Handbook of Computer Vision Algorithms in Image Algebra
Handbook of Computer Vision Algorithms in Image Algebra

The Second Edition of the best-selling Handbook of Computer Vision Algorithms in Image Algebra, continues to provide an outstanding introduction to Image Algebra. It describes more than 80 fundamental computer vision techniques and introduces the portable iac++ library, which supports image algebra programming in the C++ language. Revisions to...

Distributed Programming Paradigms with Cryptography Applications
Distributed Programming Paradigms with Cryptography Applications
This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application programs can be developed by simple substitution of data structures and sequential procedures. The author introduces generic programs for two paradigms and shows how to derive new distributed programs...
The System Designer's Guide to VHDL-AMS (Systems on Silicon)
The System Designer's Guide to VHDL-AMS (Systems on Silicon)
The demand is exploding for complete, integrated systems that sense, process, manipulate, and control complex entities such as sound, images, text, motion, and environmental conditions. These systems, from hand-held devices to automotive sub-systems to aerospace vehicles, employ electronics to manage and adapt to a world that is, predominantly,...
Principles of Functional Verification
Principles of Functional Verification
A step-by-step guide to electronic design verification

As design complexity in chips and devices continues to rise, so, too, does the demand for functional verification. Principles of Functional Verification is a hands-on, practical text that will help train professionals in the field of engineering on the methodology and
...
Routing Congestion in VLSI Circuits: Estimation and Optimization (Integrated Circuits and Systems)
Routing Congestion in VLSI Circuits: Estimation and Optimization (Integrated Circuits and Systems)
With the dramatic increases in on-chip packing densities, routing congestion has become a major problem in chip design. The problem is especially acute as interconnects are also the performance bottleneck in integrated circuits. The solution lies in judicious resource management. This involves intelligent allocation of the available interconnect...
Performance Testing Microsoft .NET Web Applications
Performance Testing Microsoft .NET Web Applications

This book was written by members of the Microsoft Application Consulting and Engineering (ACE) Team, which provides performance analysis services for some of the most heavily utilized Web applications and sites at Microsoft. Our responsibilities include, but are not limited to, providing throughput or response time numbers,...

How to Cheat at Managing Windows Server Update Services
How to Cheat at Managing Windows Server Update Services
Automate Patch Management Across Your Network If you manage a Microsoft Windows network, you probably find yourself overwhelmed at times by the sheer volume of updates and patches released by Microsoft for its products. You know these updates are critical to keep your network running efficiently and securely, but staying current...
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...

unlimited object storage image
Result Page: 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy