Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using Excel for Business and Financial Modelling: A Practical Guide (Wiley Finance)
Using Excel for Business and Financial Modelling: A Practical Guide (Wiley Finance)

A hands-on guide to using Excel in the business context

First published in 2012, Using Excel for Business and Financial Modelling contains step-by-step instructions of how to solve common business problems using financial models, including downloadable Excel templates, a list of shortcuts and tons of...

Circuit Analysis for Complete Idiots
Circuit Analysis for Complete Idiots
In today’s world, there’s an electronic gadget for everything and inside these gadgets are circuits, little components wired together to perform some meaningful function. Have you wondered how a led display sign works or how a calculator works or toy cars work? How is it possible?? All because of electrical circuits. These tiny...
Learn Java 12 Programming: A step-by-step guide to learning essential concepts in Java SE 10, 11, and 12
Learn Java 12 Programming: A step-by-step guide to learning essential concepts in Java SE 10, 11, and 12

A comprehensive guide to get started with Java and gain insights into major concepts such as object-oriented, functional, and reactive programming

Key Features

  • Strengthen your knowledge of important programming concepts and the latest features in Java
  • Explore core...
Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Computational Complexity: A Conceptual Perspective
Computational Complexity: A Conceptual Perspective
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
The Official (ISC)2 Guide to the CCSP CBK
The Official (ISC)2 Guide to the CCSP CBK

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert...

Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Linux Kernel Development Second Edition
Linux Kernel Development Second Edition

The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel...

OSPF Network Design Solutions
OSPF Network Design Solutions

Network routing protocols have emerged as key enabling technologies in a computing world now dominated by connectivity. From a very high-level perspective, these routing protocols can be split into interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). In general, the routing techniques used by IGPs are based on either...

States, Intergovernmental Relations, and Market Development: Comparing Capitalist Growth in Contemporary China and 19th Century United States (Governing China in the 21st Century)
States, Intergovernmental Relations, and Market Development: Comparing Capitalist Growth in Contemporary China and 19th Century United States (Governing China in the 21st Century)
This book is a theoretical and empirical analysis of institutional foundation of long-term economic growth from the perspective of state-market and central-local relations. The book argues that, in order to safeguard sustainable market development, it is necessary to centralize certain functions of the state to overcome local predatory...
UNIX® Network Programming Volume 1, Third Edition: The Sockets Networking API
UNIX® Network Programming Volume 1, Third Edition: The Sockets Networking API

Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I've already enjoyed and learned from reading this book, and surely you will too."
-Sam Leffler

...
Result Page: 143 142 141 140 139 138 137 136 135 134 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy