Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guerilla Data Analysis Using Microsoft Excel

Buy
This book includes step-by-step examples and case studies that teach users the many power tricks for analyzing data in Excel. These are tips honed by Bill Jelen, “MrExcel,” during his 10-year run as a financial analyst charged with taking mainframe data and turning it into useful information quickly. Topics include perfectly sorting with one click every time, matching lists of data, data consolidation, data subtotals, pivot tables, and much more.
(HTML tags aren't allowed.)

Agile and Iterative Development: A Manager's Guide
Agile and Iterative Development: A Manager's Guide

Agile/iterative methods: From business case to successful implementation

This is the definitive guide for managers and students to agile and iterative development methods: what they are, how they work, how to implement them—and why you should.

Using statistically significant...

Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...

Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Innovation in the High-Tech Economy (Contributions to Economics)
Innovation in the High-Tech Economy (Contributions to Economics)

This book constitutes the proceedings of the First International Conference on Management Science and Engineering: Innovation and High-tech Services, ICMSE 2013, held in Macau, in June 2013. The papers are contributed by innovative researchers, engineers and practitioners in the field of management science, information system, finance,...

Quicken 2004 for Dummies
Quicken 2004 for Dummies
Computerize your checkbook, track your stocks, bank online, and much more. When money talks, you can tell it what to say. Quicken 2004 and this handy guidebook will help you manage your bills, maximize investments, minimize taxes, multiply savings, and maintain detailed financial records that will delight your tax preparer—especially if...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy