Home | Amazing | Today | Tags | Publishers | Years | Search 
Business Finance: Theory and Practice
Business Finance: Theory and Practice
This book attempts to deal with financing and investment decision making, with particular focus on the private sector of the UK economy. Its approach is to set out the theories that surround each area of financial decision making and relate these to what appears to happen in practice. Where theory and practice diverge, the book...
The Digital Matte Painting Handbook
The Digital Matte Painting Handbook

From an early age, I wanted to be an artist. I was drawn first to comic books and then to science-fiction literature because of the wondrous images that fed my artistic imagination. When I read Edgar Rice Burroughs, Robert Heinlein, and Isaac Asimov as an adolescent, I would spend as much time studying the covers as I did reading the books,...

Python for Data Analysis
Python for Data Analysis

The scientific Python ecosystem of open source libraries has grown substantially over the last 10 years. By late 2011, I had long felt that the lack of centralized learning resources for data analysis and statistical applications was a stumbling block for new Python programmers engaged in such work. Key projects for data...

Sets, Logic and Maths for Computing (Undergraduate Topics in Computer Science)
Sets, Logic and Maths for Computing (Undergraduate Topics in Computer Science)
The first part of this preface is for the student, the second for the instructor. Some readers may find it helpful to look at both.Whoever you are, welcome!

This easy-to-follow textbook introduces the mathematical language, knowledge and problem-solving skills that undergraduates need to study computing. The language is in part...

California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)
California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)

Between the frequently recounted events of the Gold Rush and the Great Depression stretches a period of California history that is equally crucial but less often acknowledged. In his fresh, synthetic consideration of these in-between years, George L. Henderson points specifically to the take-off of California's rural juggernaut between...

Database Design and Relational Theory: Normal Forms and All That Jazz
Database Design and Relational Theory: Normal Forms and All That Jazz
This book began life as a comparatively short chapter in a book called Database in Depth: Relational Theory for Practitioners (O’Reilly, 2005). That book was superseded by SQL and Relational Theory: How to Write Accurate SQL Code (O’Reilly, 2009), where the design material, since it was somewhat tangential to...
BMC Control-M 7: A Journey from Traditional Batch Scheduling to Workload Automation
BMC Control-M 7: A Journey from Traditional Batch Scheduling to Workload Automation

Master one of the world's most powerful enterprise workload automation tools – BMC Control-M 7 - using this book

  • Implement and utilize a world class enterprise batch scheduling and workload automation tool in the best possible ways with this book and e-book
  • Hands-on implementation and...
Microsoft SQL Server 2012 T-SQL Fundamentals
Microsoft SQL Server 2012 T-SQL Fundamentals
I’m very happy that Itzik has managed to find the time and energy to produce a book about T-SQL fundamentals. For many years, Itzik has been using his great Microsoft SQL Server teaching, mentoring, and consulting experience to write books on advanced programming subjects, leaving a significant gap not only...
Special Edition Using XML Schema
Special Edition Using XML Schema

The Extensible Markup Language is one of the most controversial technologies to come into vogue in recent years. Starting with humble roots with the desire to create a simple subset of SGML, XML burst onto the scene to a fantastic fanfare from developers and hype from the press. As more people have started to adopt XML, more...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Aston University 'Branding' Bundle: Creating Powerful Brands, Fourth Edition
Aston University 'Branding' Bundle: Creating Powerful Brands, Fourth Edition
As we look forward with confidence that this new edition significantly benefits students and managers, we look back to how this book became a well established core text in many business schools internationally and amongst a lot of managers. It seems not that long ago when we embarked on this project, yet as our publisher...
Sales and Distribution in SAP ERP: Practical Guide
Sales and Distribution in SAP ERP: Practical Guide
In today's competitive environment, the ability to handle business processes cost- effectively is critical. Sales and Distribution in SAP ERP (which, in this book, we'll refer to as SD) offers such a set of tools. As one of the most important and most often implemented SAP logistics functionalities, SD makes information...
Result Page: 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy