Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Financial Accounting: An Integrated Statements Approach
Financial Accounting: An Integrated Statements Approach

Duchac, Reeve, Warren provides an effective new approach to help accounting majors and business students learn and understand financial accounting. The text introduces an integrated financial statements framework that clearly illustrates the inter-relationships between the cash flow statement, income statement and the balance sheet. This...

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...
Microsoft Encyclopedia of Networking, Second Edition
Microsoft Encyclopedia of Networking, Second Edition
Whether you're a system administrator, MCSA/MCSE certification candidate, or a CIO-here's definitive reference on the latest networking technologies and terminology. The superbly illustrated MICROSOFT ENCYCLOPEDIA OF NETWORKING, Second Edition, features thousands of entries-including many new entries and critical updates and revisions to the...
Java 9 Programming Blueprints
Java 9 Programming Blueprints

Key Features

  • See some of the new features of Java 9 and be introduced to parts of the Java SDK
  • This book provides a set of diverse, interesting projects that range in complexity from fairly simple to advanced and cover HTTP 2.0
  • Take advantage of Java's new modularity features to write...
The 2nd Digital Revolution
The 2nd Digital Revolution
In the 1990s I sat in the office of a CFO of what was then a Fortune 100
company. He was not happy about the annual technology bill. Back then –
and for decades before – technology was tactical. He said something about
technology being his last unmanaged expense. I gave him a list of 10 things
we should do to improve
...
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
The tools and techniques for leveraging PKI technologies to provide secure Internet transactions

Do your customers have the confidence to do business over the Internet? By implementing Public Key Infrastructure (PKI) technologies, you’ll be able to quickly gain their trust through secure transactions. This book provides you with a clear...

Modern Compiler Implementation in Java
Modern Compiler Implementation in Java

This textbook describes all phases of a compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code generation and register...

The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects
The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects

Become a Blockchain developer and design, build, publish, test, maintain and secure scalable decentralized Blockchain projects using Bitcoin, Ethereum, NEO, EOS and Hyperledger.  

This book helps you understand Blockchain beyond development and crypto to better harness its power and capability. You will learn...

International Finance: New Players and Global Markets
International Finance: New Players and Global Markets
International finance is a branch of financial economics that deals with the monetary interactions that occur between two or more countries. International Finance is concerned with topics that include foreign direct investment and currency exchange rates. International finance is different from domestic finance in many aspects...
Wireless and Mobile All-IP Networks
Wireless and Mobile All-IP Networks
Here's your all-IP network handbook for 3G and beyond

Experts forecast a future in which all telephone services will be delivered over the economical, efficient IP network. In this follow-up to Wireless and Mobile Network Architecture, the bestselling guide to wireless network engineering, Yi-Bing Lin and Ai-Chun Pang delve...

Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition
Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition
This book is a comprehensive guide to the usage and syntax of the Business Process Execution Language for Web Services (BPEL4WS). Two major BPEL4WS servers, the Oracle BPEL Process Manager and Microsoft BizTalk Server 2004 are covered in detail, and an overview of other major BPEL4WS servers is provided. The book contains practical examples on...
Sensor Network Operations
Sensor Network Operations

Designing and operating sensor networks, featuring leading researchers and the latest, yet unpublished findings

Sensor Network Operations introduces mission-oriented sensor networks as distributed dynamic systems of interacting sensing devices, which function as a network to execute complex...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy