Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)

A practical guide for business calculations

Mastering Financial Mathematics in Microsoft © Excel provides a comprehensive set of tools, methods and formulas which apply Excel to solving mathematical problems.

The book:

  • Explains basic calculations for mathematical finance
  • ...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Emerging States and Economies: Their Origins, Drivers, and Challenges Ahead (Emerging-Economy State and International Policy Studies)
Emerging States and Economies: Their Origins, Drivers, and Challenges Ahead (Emerging-Economy State and International Policy Studies)

This open access book asks why and how some of the developing countries have “emerged” under a set of similar global conditions, what led individual countries to choose the particular paths that led to their “emergence,” and what challenges confront them. If we are to...

Antioxidants and the Skin: Second Edition
Antioxidants and the Skin: Second Edition
This highly illustrated book brings together many concepts related to skin care and antioxidant usage in one convenient text. The second edition now contains the latest antioxidants being marketed, and an analysis of risks and benefits associated.

Exposure to solar radiation, other environmental insults, and...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective...

Internationalizing Firms: International Strategy, Trends and Challenges
Internationalizing Firms: International Strategy, Trends and Challenges

This book explores emerging trends in internationalization, analyzing the processes and steps that firms take when entering new markets. This timely contribution highlights the need for a deeper understanding of today’s internationalization process, critiquing existing literature and instead proposing a new paradigm based on a...

South Korea’s 70-Year Endeavor for Foreign Policy, National Defense, and Unification
South Korea’s 70-Year Endeavor for Foreign Policy, National Defense, and Unification
This book brings Korea's finest foreign policy minds together in contemplating the risks and rewards of finally ending the 70 year stalemate between North and South Korea through reunification. While North Korea is in conflict with the United States over denuclearization and regime security, the South Korean government is focusing on...
Venture Work: Employees in Thinly Capitalized Firms
Venture Work: Employees in Thinly Capitalized Firms

This book contributes to the ongoing discussion around so-called precarious or venture work, as the proportion of those employed by start-ups and thinly-capitalized firms continues to grow. Filling a gap in literature, the author explores the relationship between venture co-workers and examines how they cope with economic...

Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy