Home | Amazing | Today | Tags | Publishers | Years | Search 
Guerilla Data Analysis Using Microsoft Excel
Guerilla Data Analysis Using Microsoft Excel
This book includes step-by-step examples and case studies that teach users the many power tricks for analyzing data in Excel. These are tips honed by Bill Jelen, “MrExcel,” during his 10-year run as a financial analyst charged with taking mainframe data and turning it into useful information quickly. Topics include perfectly sorting...
Networks: Design and Management
Networks: Design and Management
Networks are groups of computers that communicate by either cable or wireless transmissions. By the use of computer networking, we can share data with others. Today, all businesses, small or large use some type of computers and most use computer networking to handle their daily business operations such as bookkeeping, inventory tracking, document...
The Architecture of the Visible (Technologies: Studies in Culture & Theory Series)
The Architecture of the Visible (Technologies: Studies in Culture & Theory Series)
Soon after the launch of the first Sputnik in 1957, Hannah Arendt observed in The Human Condition that for the first time 'an earth-born object made by m a n . . . moved in the proximity of the heavenly bodies as though it had been admitted tentatively to their sublime company', an event which she described as 'second in importance to no other, not...
Excel 2007 Miracles Made Easy: Mr. Excel Reveals 25 Amazing Things You Can Do with the New Excel
Excel 2007 Miracles Made Easy: Mr. Excel Reveals 25 Amazing Things You Can Do with the New Excel
In this addendum to Learn Excel from Mr. Excel, the amazing new features offered in Excel 2007 are introduced. Revealing the features that make this new version the best new release of Excel since 1997, this guide provides the necessary information to teach users to quickly unleash the powerful new features in Excel 2007, create...
Doing Business in 2004: Understanding Regulation
Doing Business in 2004: Understanding Regulation
A vibrant private sector—with firms making investments, creating jobs, and improving productivity— promotes growth and expands opportunities for poor people. To create one, governments around the world have implemented wide-ranging reforms, including macro-stabilization programs, price liberalization, privatization, and trade-barrier...
The Complete Idiot's Guide to Yoga (2nd Edition)
The Complete Idiot's Guide to Yoga (2nd Edition)

This book is for anyone interested in health, fitness, or the healing arts. It teaches you the basics of stretching, breathing, and meditation, with exercises designed to help you relax, become more flexible, more productive, and more self-satisfied.

About the Author

Joan
...

Algorithmic Architecture
Algorithmic Architecture
How to use Algorithms to solve complex design issues

Why does the word design owe its origin to Latin and not Greek roots? Where do the limits of the human mind lie? How does ambiguity enter the deterministic world of computation? Who was Parmenides and why is his philosophy still puzzling today? This unique volume
...
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES...
Intermediate Business Programming with C++
Intermediate Business Programming with C++

Lecture Objectives: This electronic textbook presents lectures that may be used in a college or university semester class dealing with the writing of business programs using C++ from Microsoft Visual Studio .NET 2005. The major programming emphasis is upon the creation of Object Oriented Programs for business and the use of data structures.

...
Java 2 Game Programming (The Premier Press Game Development Series)
Java 2 Game Programming (The Premier Press Game Development Series)
With the power of today's personal computer, game developers no longer need to rely on low-level "tricks" to write computer games. Increasingly, object-oriented programming languages, such as Java, are being used to create cutting-edge games. "Java 2 Game Programming" gives you an inside look at how Java can be used to create...
Data Warehousing and Knowledge Discovery: 10th International Conference, DaWak 2008 Turin, Italy, September 1-5, 2008, Proceedings
Data Warehousing and Knowledge Discovery: 10th International Conference, DaWak 2008 Turin, Italy, September 1-5, 2008, Proceedings
Data Warehousing and Knowledge Discovery have been widely accepted as key technologies for enterprises and organizations as a means of improving their abilities in data analysis, decision support, and the automatic extraction of knowledge from data. With the exponentially growing amount of information to be included in the decision making process,...
Information Assurance Architecture
Information Assurance Architecture
Safeguard Your Organization’s Information!

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information...

Result Page: 1032 1031 1030 1029 1028 1027 1026 1025 1024 1023 1022 1021 1020 1019 1018 1017 1016 1015 1014 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy