Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

Mutual Fund Industry Handbook : A Comprehensive Guide for Investment Professionals
Mutual Fund Industry Handbook : A Comprehensive Guide for Investment Professionals

A behind-the-scenes look at the mutual fund industry

With more than 8,000 funds, more than $8 trillion in assets, and more than 87 million individual investors at the end of 2004, mutual funds—professionally managed pooled investment vehicles that give people the opportunity to participate in the securities market without...

Investing in Shares For Dummies
Investing in Shares For Dummies
Houses, gold, tulips . . . our idea of what constitutes a good ‘investment’ has changed dramatically over time but one precious, valuable idea still holds true: that shares over the long term have been a great investment and have without doubt made their intrepid ‘holders’ returns of between 5 and 7 per...
Assembly Language Programming: ARM Cortex-M3
Assembly Language Programming: ARM Cortex-M3

ARM designs the cores of microcontrollers which equip most "embedded systems" based on 32-bit processors. Cortex M3 is one of these designs, recently developed by ARM with microcontroller applications in mind. To conceive a particularly optimized piece of software (as is often the case in the world of embedded systems) it...

The Small-Cap Investor: Secrets to Winning Big with Small-Cap Stocks
The Small-Cap Investor: Secrets to Winning Big with Small-Cap Stocks

Praise for The Small-Cap Investor

"The great rewards of investing in the best small-cap companies are matched only by the risks of investing in the worst. Ian Wyatt is one of the few who not only shows you how to find the hidden gems, but also how to avoid the flea-ridden dogs. His new book is a must-read for all...

Rehumanize Your Business: How Personal Videos Accelerate Sales and Improve Customer Experience
Rehumanize Your Business: How Personal Videos Accelerate Sales and Improve Customer Experience

Accelerate sales and improve customer experience

Every day, most working professionals entrust their most important messages to a form of communication that doesn't build trust, provide differentiation, or communicate clearly enough. It's easy to point to the sheer volume of emails, text messages,...

The Agile Architecture Revolution: How Cloud Computing, REST-Based SOA, and Mobile Computing Are Changing Enterprise IT
The Agile Architecture Revolution: How Cloud Computing, REST-Based SOA, and Mobile Computing Are Changing Enterprise IT

A sneak peek at up-and-coming trends in IT, a multidimensional vision for achieving business agility through agile architectures

The Agile Architecture Revolution places IT trends into the context of Enterprise Architecture, reinventing Enterprise Architecture to support continuous business transformation. It focuses...

The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise
The DevOps Adoption Playbook: A Guide to Adopting DevOps in a Multi-Speed IT Enterprise

Achieve streamlined, rapid production with enterprise-level DevOps

Awarded DevOps 2017 Book of the Year, The DevOps Adoption Playbook provides practical, actionable, real-world guidance on implementing DevOps at enterprise scale. Author Sanjeev Sharma heads the DevOps practice for IBM; in this book, he provides unique...

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks
Today's aggressively competitive networking market requires offering the maximum range of services using prevailing assets, not building bigger, more complicated networks, but smarter, more scalable infrastructures. It isn't an easy thing to do.

The challenge is to develop an existing network so as to maximise its...

Financial Statement Analysis: A Practitioner's Guide
Financial Statement Analysis: A Practitioner's Guide

An updated guide to the essential discipline of financial statement analysis In Financial Statement Analysis, Fourth Edition, leading investment authority Martin Fridson returns with Fernando Alvarez to provide the analytical framework you need to scrutinize financial statements, whether you're evaluating a company's stock price or...

Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing
Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing

A thorough guide to the classical and contemporary mathematical methods of modern signal and image processing

Discrete Fourier Analysis and Wavelets presents a thorough introduction to the mathematical foundations of signal and image processing. Key concepts and applications are addressed in a thought-provoking...

Result Page: 325 324 323 322 321 320 319 318 317 316 315 314 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy