Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Models of Financial Derivatives, with CD-ROM: Object Oriented Applications with VBA
Implementing Models of Financial Derivatives, with CD-ROM: Object Oriented Applications with VBA

Implementing Models of Financial Derivatives is a comprehensivetreatment of advanced implementation techniques in VBA for modelsof financial derivatives. Aimed at readers who are already familiarwith the basics of VBA it emphasizes a fully object orientedapproach to valuation applications, chiefly in the context of MonteCarlo simulation but...

Modern Control Design With MATLAB and SIMULINK
Modern Control Design With MATLAB and SIMULINK
In this book, Tewari emphasizes the physical principles and engineering applications of modern control system design. Instead of detailing the mathematical theory, MATLAB examples are used throughout....
Exam 70-443 and 70-450 Microsoft SQL Server Database Design and Optimization
Exam 70-443 and 70-450 Microsoft SQL Server Database Design and Optimization
Welcome to the Microsoft Official Academic Course (MOAC) program for Microsoft SQL Server Database Design and Optimization. MOAC represents the collaboration between Microsoft Learning and John Wiley & Sons, Inc. publishing company. Microsoft and Wiley teamed up to produce a series of textbooks that deliver compelling and...
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Learn how to solve complex differential equations using MATLAB®

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB® teaches readers how to numerically solve both ordinary and partial differential equations with ease. This innovative publication brings together a skillful treatment of MATLAB...

Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...

Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)
Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)

This book addresses coding, a new solution to the major challenge of communicating more bits of information in the same radio spectrum.

  • Explores concepts and new transmission methods that have arisen in the last 15 years
  • Discusses the method of faster than Nyquist signaling
  • ...
Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)
Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)

This book provides an introduction to concurrent, real-time, distributed programming with Java object-oriented language support as an algorithm description tool. It describes in particular the mechanisms of synchronization (cooperative and competitive) and sharing of data (internal class, static variables) between threads in Java. He...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications, and Emerging Technologies

Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Result Page: 310 309 308 307 306 305 304 303 302 301 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy