|
|
|
|
|
Introduction to Cryptography with Java AppletsCryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of... | | The Financial Numbers Game: Detecting Creative Accounting PracticesPraise for The Financial Numbers Game "So much for the notion 'those who can, do-those who can't, teach.' Mulford and Comiskey function successfully both as college professors and real-world financial mercenaries. These guys know their balance sheets. The Financial Numbers Game should serve as a survival manual for both... | | Pediatric Allergy, Asthma and Immunology
Pediatric Allergy,Asthma and Immunology is a new discipline
that finds its foundation in this book, whose
roots linke me to Elena and Luisa Businco,with whom I
founded the first Italian Pediatric Allergy Division some
30years ago, now called the Pediatric Allergy and Immunology
Division. There I discovered this world,... |
|
CCSP CSI Exam Certification Guide (CCSP Self-Study, 642-541)The Cisco Certified Security Professional (CCSP) certification is the newest midlevel certification from Cisco Systems. This certification is on a par with CCNP and CCDP. The aim of this certification is to provide professional-level recognition to network engineers in the design and implementation of Cisco secure networks. This... | | Pain Medicine and Management: Just the FactsThis concise, yet comprehensive review is the perfect tool to prepare for certification, re-certification, CME–or for use as a clinical refresher. Featuring the insights of the world’s leading authorities, its highly efficient format conveniently condenses and simplifies only the most important content, for maximum yield and... | | Financial Reporting and Analysis: Using Financial Accounting Information
USERS OF FINANCIAL STATEMENTS INCLUDE A
company’s managers, stockholders, bondholders,
security analysts, suppliers, lending
institutions, employees, labor unions, regulatory
authorities, and the general public. They use the
financial reports to make decisions. For example,
potential investors use the financial... |
|
ULSI Technology
ULSI Technology describes the theoretical and practical aspects of the most advanced state of electronics technology-ultralarge-scale integration (ULSI), where an integrated circuit (IC) chip contains over 10 million semiconductor devices. With ULSI technology, the cost of electronics products will decrease while the system functionality and... | | Insall & Scott Surgery of the Knee: Expert Consult - Online and Print, 5e
Online and in print, Insall & Scott Surgery of the Knee, edited by W. Norman Scott, MD, and 11 section editors who are experts in their fields, is your complete, multimedia guide to the most effective approaches for diagnosis and management of the full range of knee disorders affecting patients of all ages. From anatomical and... | | It's Not About the TechnologyThis book attempts to answer the question: “What is that mindset, that particular kind of thinking, that is required of us to be successful in a high technology company and why?”
To be sure, the “high” in the high technology does not accord the company any special place in... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |