Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)

A practical guide for business calculations

Mastering Financial Mathematics in Microsoft © Excel provides a comprehensive set of tools, methods and formulas which apply Excel to solving mathematical problems.

The book:

  • Explains basic calculations for mathematical finance
  • ...
Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

The Big Book of Dashboards: Visualizing Your Data Using Real-World Business Scenarios
The Big Book of Dashboards: Visualizing Your Data Using Real-World Business Scenarios

The definitive reference book with real-world solutions you won't find anywhere else

The Big Book of Dashboards presents a comprehensive reference for those tasked with building or overseeing the development of business dashboards.

Comprising dozens of examples that address different industries...

The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

Open Source Software: Implementation and Management
Open Source Software: Implementation and Management
Open source software is now under serious consideration in many organizations.
The success of several open source products, particularly Apache and
Linux, in the enterprise has come surprisingly quickly, given that they were
not commercially available ten years ago. It is important for managers
responsible for adopting
...
Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

High-Assurance Design : Architecting Secure and Reliable Enterprise Applications
High-Assurance Design : Architecting Secure and Reliable Enterprise Applications

How to Design for Software Reliability, Security, and Maintainability

Many enterprises unfortunately depend on software that is insecure, unreliable, and fragile. They compensate by investing heavily in workarounds and maintenance, and by employing hordes of...

How I Made My First Million: 26 Self-Made Millionaires Reveal the Secrets to Their Success
How I Made My First Million: 26 Self-Made Millionaires Reveal the Secrets to Their Success
A collection of inspirational stories of ordinary people who took a great idea and turned it into a hugely successful business. Learn how the founders of enormously profitable enterprises—like Just Cuts, Aussie Home Loans, ModelCo, Elite Introductions, Fat Prophets, EcoStore, and fastflowers.com—took a great idea and turned it into a...
Risk, Complexity and ICT
Risk, Complexity and ICT
This book explores the challenges regarding risks and risk management related to the growing complexity of ICT solutions.

The main argument of the book is that the complexity of ICT solutions has continued to grow throughout the history of ICT, and that it has now reached a level that goes beyond our current understanding of
...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Result Page: 45 44 43 42 41 40 39 38 37 36 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy