Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Book Yourself Solid Illustrated: The Fastest, Easiest, and Most Reliable System for Getting More Clients Than You Can Handle Even if You Hate Marketing and Selling
Book Yourself Solid Illustrated: The Fastest, Easiest, and Most Reliable System for Getting More Clients Than You Can Handle Even if You Hate Marketing and Selling

A visual way to easily access the strategies and tactics in Book Yourself Solid

Learning new concepts is easier when you can see the solution. Book Yourself Solid Illustrated, a remarkable, one-of-a-kind work of art, transforms the Book Yourself Solid system into a more compelling and...

Hands-On Reactive Programming with Python: Event-driven development unraveled with RxPY
Hands-On Reactive Programming with Python: Event-driven development unraveled with RxPY

A comprehensive guide to help you understand the principles of Reactive and asynchronous programming and its benefits

Key Features

  • Explore the advantages of Reactive programming
  • Use concurrency and parallelism in RxPY to build powerful reactive applications
  • ...
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Economics / Investments & Securities

Praise for Reverse Engineering Deals on Wall Street with Microsoft Excel

"Allman has written an excellent sequel to his first book Modeling Structured Finance Cash Flows with Microsoft Excel, providing a simple guide on how to deconstruct cash flows through modeling and understanding...

Unix Unleashed (4th Edition)
Unix Unleashed (4th Edition)
Using Solaris 8 and Linux 7.1 as their reference flavors, Robin Anderson and Andy Johnston (as well as a slew of contributors) show how to be a system administrator--and get all sorts of other work done--in the fourth edition of Unix Unleashed. Significantly different from its predecessors, this book stays generally clear of very basic...
Testing and Tuning Market Trading Systems: Algorithms in C++
Testing and Tuning Market Trading Systems: Algorithms in C++

Build, test, and tune financial, insurance or other market trading systems using C++ algorithms and statistics. You’ve had an idea and have done some preliminary experiments, and it looks promising. Where do you go from here?  Well, this book discusses and dissects this case study approach.  

...

Expert One-on-One Oracle
Expert One-on-One Oracle
Tom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via...
Serosal Membranes (Pleura, Pericardium, Peritoneum): Normal Structure, Development and Experimental Pathology (Advances in Anatomy, Embryology and Cell Biology)
Serosal Membranes (Pleura, Pericardium, Peritoneum): Normal Structure, Development and Experimental Pathology (Advances in Anatomy, Embryology and Cell Biology)

in the human visceral pleura is the sole reliable criterion for the statement that it belongs to the ‘thick type’, while all observed animals have a ‘thin’ type VP. The mesothelium and underlying structures of the SM represent a highly permeable bidirectional membrane with signi?cant differences in the organ and region...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
Observing the User Experience: A Practitioner's Guide to User Research
Observing the User Experience: A Practitioner's Guide to User Research

The gap between who designers and developers imagine their users are, and who those users really are can be the biggest problem with product development. Observing the User Experience will help you bridge that gap to understand what your users want and need from your product, and whether they'll be able to use what you've created.

...
Frommer's China (Frommer's Complete Guides)
Frommer's China (Frommer's Complete Guides)

Frommer's China guides you to the highlights of this vast and varied land, and includes our authors' insider advice on the best experiences, from hiking through some of the most spectacular scenery on the planet to visiting traditional imperial sights.

  • Our expert authors, longtime residents in and...
Result Page: 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy