Mostrando 109,981 - 110,000 Resultados de 114,067 Para Buscar 'Anost~', tiempo de consulta: 1.16s Limitar resultados
  1. 109981
    Publicado 2014
    “…This IBM® Redbooks® publication describes how the IBM Big Data Platform provides the integrated capabilities that are required for the adoption of Information Governance in the big data landscape. …”
    Libro electrónico
  2. 109982
    Publicado 2015
    “…With this hands-on guide, you’ll learn how to write effective, idiomatic Python code by leveraging its best—and possibly most neglected—features. Author Luciano Ramalho takes you through Python’s core language features and libraries, and shows you how to make your code shorter, faster, and more readable at the same time. …”
    Libro electrónico
  3. 109983
    por Ihrig, Colin J. author
    Publicado 2013
    “…Respected companies such as Dow Jones and LinkedIn are among the many organizations to have seen Node’s potential and adopted it into their businesses. Pro Node.js for Developers provides a comprehensive guide to this exciting new technology. …”
    Libro electrónico
  4. 109984
    por Avon, Jack. author
    Publicado 2015
    “…What You'll Learn Understand the accounting and finance concepts that underpin working financial models Approach financial issues and solutions from a modeler's perspective Think about end users when developing a financial model Plan, design, and build a financial model Who This Book Is For Beginning to intermediate modelers who wish to expand and enhance their knowledge of using Excel to build and analyze financial models…”
    Libro electrónico
  5. 109985
    Publicado 2013
    “…You will have learned about the advanced techniques and new features in this program and how to apply them to your creations. …”
    Video
  6. 109986
    Publicado 2015
    “…Review empirical data from actual attacks conducted by unsophisticated and elite APT hackers alike Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads…”
    Libro electrónico
  7. 109987
    “…Yet there are times when developers require a task or component that does not exist and it would make their life much easier if they could create that task or component, and that is what this book it is about. It shows how to write .NET scripts and use the powerful Microsoft .NET library to implement new functionality as needed. …”
    Libro electrónico
  8. 109988
    Publicado 2015
    “…Becoming a strategic leader isn't about mimicking an icon. The most effective leaders seize opportunity in a way that consciously integrates environmental requirements, stakeholder expectations, and personal ability. …”
    Libro electrónico
  9. 109989
    Publicado 2014
    “…Download the Solid video compilation or stream it through our HD player, you’ll discover the possibilities, including: Companies —Explore what’s working, from getting funding to design and marketing to moving from an early adopter market into the mainstream. Foundations —Expand your notion of the possible, and learn how radically new products can spring from re-imagining existing services, processes, and machines. …”
    Video
  10. 109990
    Publicado 2016
    “…He is a member of the IEEE Software Advisory board and writes regularly about software and interaction design…”
    Video
  11. 109991
    por Ayala, Luis. author
    Publicado 2016
    “…Discussion of cybers-physical attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. …”
    Libro electrónico
  12. 109992
    Publicado 2016
    “…This book contains numerous illustrations about how to manage and configure the storage system, by using the new user interface. …”
    Libro electrónico
  13. 109993
    Publicado 2016
    Tabla de Contenidos: “…Theories and Concepts -- 1 Perspectives on value and valuation -- 1.1 Introduction -- 1.2 Application of valuation -- 1.3 Approaches to valuation -- 1.4 Steps in value creation -- 1.5 Value drivers -- 1.6 Empirical evidence on value drivers -- 1.7 Strategic models of valuation -- 1.8 Stock price maximization -- 1.8.1 Shareholder value and wealth creation -- 1.8.2 Value drivers for shareholder wealth creation -- 1.8.3 Measures of shareholder value creation -- 1.8.3.1 Economic value -- 1.8.3.2 Equity spread -- 1.8.3.3 Implied value -- 1.8.3.4 Cash flow return on investment (CFROI) -- 1.8.4 Measures of shareholder wealth creation -- 1.8.5 Hybrid wealth creation measure -- 1.8.5.1 Market value added (MVA) -- 1.9 Linkage between strategic management and shareholder value -- 1.9.1 Value-based management -- 1.9.2 Significance of shared value -- 1.9.3 Intangibles -- 1.9.4 Valuation of intangibles -- 1.9.4.1 Market approach -- 1.9.4.2 Cost approach -- 1.9.4.3 Income method -- 1.9.4.4 Calculated intangible value (CIV) -- 1.9.5 Brand value -- 1.9.6 Brand valuation -- 1.10 Challenges in valuing intangibles -- 1.11 Innovation and value creation -- 1.12 Review of research studies on usage of valuation methods -- 1.13 Challenges for valuation -- 1.14 Review on theories of valuation -- 1.15 Most valuable companies -- Appendix: Financial statement analysis -- Sources and uses of cash -- Cash flow identity -- Measures of cash flow -- Common size statements -- Common base year statements -- Ratio analysis -- Short-term solvency or liquidity measures -- Current ratio -- Quick or acid test ratio -- Absolute liquid or cash ratio -- Profitability measures -- Net profit margin -- Return on assets (ROA) -- Return on capital employed (ROCE) -- Return on equity (ROE)…”
    Libro electrónico
  14. 109994
    Publicado 2011
    “…These tools can help reduce costs associated with content management and help organizations deliver improved customer service. …”
    Libro electrónico
  15. 109995
    Publicado 2015
    “…In this O’Reilly report, DJ Patil and Hilary Mason outline the steps you need to take if your company is to be truly data-driven—including the questions you should ask and the methods you should adopt. You’ll not only learn examples of how Google, LinkedIn, and Facebook use their data, but also how Walmart, UPS, and other organizations took advantage of this resource long before the advent of Big Data. …”
    Libro electrónico
  16. 109996
    Publicado 2018
    “…"Java is the world’s most popular programming language, but it’s known for having a steep learning curve. …”
    Libro electrónico
  17. 109997
    Publicado 2023
    Materias: “…Cloud computing Cost control…”
    Libro electrónico
  18. 109998
    Publicado 2020
    “…The Global Spanish Empire tackles broad questions about Indigenous cultural persistence, pluralism, and place making using a global comparative perspective grounded in the shared experience of Spanish colonialism…”
    Libro electrónico
  19. 109999
    Publicado 2023
    “…The articles draw upon the work of co-researchers both with and without the lived experience of disability who have adopted inclusive research as a paradigm to redress the exclusion of people with intellectual disabilities as researchers. …”
    Libro electrónico
  20. 110000
    Publicado 2022
    “…However, some of the reliability measures most frequently used have lately been discussed controversially, indicating that there is room for improvement. …”
    Libro electrónico