Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)

A practical guide for business calculations

Mastering Financial Mathematics in Microsoft © Excel provides a comprehensive set of tools, methods and formulas which apply Excel to solving mathematical problems.

The book:

  • Explains basic calculations for mathematical finance
  • ...
Algorithmic Puzzles
Algorithmic Puzzles

While many think of algorithms as specific to computer science, at its core algorithmic thinking is defined by the use of analytical logic to solve problems. This logic extends far beyond the realm of computer science and into the wide and entertaining world of puzzles. In Algorithmic Puzzles, Anany and Maria Levitin use many classic...

Pro RESTful APIs: Design, Build and Integrate with REST, JSON, XML and JAX-RS
Pro RESTful APIs: Design, Build and Integrate with REST, JSON, XML and JAX-RS

Discover the RESTful technologies, including REST, JSON, XML, JAX-RS web services, SOAP and more, for building today's microservices, big data applications, and web service applications.  This book is based on a course the Oracle-based author is teaching for UC Santa Cruz Silicon Valley which covers architecture, design best...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Math Puzzles and Games, Grades 6-8: Over 300 Reproducible Puzzles that Teach Math and Problem Solving
Math Puzzles and Games, Grades 6-8: Over 300 Reproducible Puzzles that Teach Math and Problem Solving
In the 1950s we punished misbehaving students in middle school or junior high school by making them stay after school to do 100 multiplication or long-division math problems. Mathematics was taught in a highly ordered and mechanically repetitive manner with the objective being to master basic arithmetic skills. A decade later New Math emerged as a...
Serverless Single Page Apps: Fast, Scalable, and Available
Serverless Single Page Apps: Fast, Scalable, and Available

Don't waste your time building an application server. See how to build low-cost, low-maintenance, highly available, serverless single page web applications that scale into the millions of users at the click of a button. Quickly build reliable, well-tested single page apps that stay up and running 24/7 using Amazon Web Services. Avoid...

Handbook of Time Series Analysis, Signal Processing, and Dynamics
Handbook of Time Series Analysis, Signal Processing, and Dynamics

It is hoped that this book will serve both as a text in time-series analysis and signal processing and as a reference book for research workers and practitioners. Timeseries analysis and signal processing are two subjects which ought to be treated as one; and they are the concern of a wide range of applied disciplines including statistics,...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Regulation and the Evolution of the Global Telecommunications Industry
Regulation and the Evolution of the Global Telecommunications Industry

After decades of liberalization of the telecommunications industry around the world and technological convergence that allows for increasing competition, sector-specific regulation of telecommunications has been on the decline. As a result, the telecommunications industry stands in the middle of a debate that calls for either a total...

Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Wavelets and Their Applications (Digital Signal and Image Processing series)
Wavelets and Their Applications (Digital Signal and Image Processing series)
Showing how wavelets combine signal in image processing, mathematics, physics, and electrical engineering, this introduction to wavelet technology helps engineers master the basic techniques for using wavelets in such applications as image compression, turbulence, human vision, radar, and earthquake prediction. Among the topics covered are the...
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy