|
|
|
|
|
Introduction to CryptographyDue to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.
In the first part, this book covers the key concepts of cryptography on... | | Radically Transparent: Monitoring and Managing Reputations OnlineThe explosion of social media blogs, social networking sites, and video sharing sites has ushered in a new era of digital transparency that puts the power to enhance or destroy a reputation in the hands of the consumer. This timely and practical book shows you how to harness the power of social media with crucial, proven tactics and strategies... | | The Handbook of Global Media Research
Bringing together the perspectives of more than 40 internationally acclaimed authors, The Handbook of Global Media Research explores competing methodologies in the dynamic field of transnational media and communications, providing valuable insight into research practice in a globalized media landscape.
|
|
Dynamic Enterprise Architecture: How to Make It WorkThis book presents an approach to enterprise architecture, which enables corporations to achieve their business objectives faster. Focusing on the governance of IT in the organization, it provides tangible tools, advice and strategies for implementing and designing the architectural process within a corporation that will make a major contribution... | | | | The Definitive Guide to GCC, Second Edition
The GNU Compiler Collection (GCC) offers a variety of compilers for different programming languages including C, C++, Java, Fortran, and Ada. The Definitive Guide to GCC, Second Edition has been revised to reflect the changes made in the most recent major GCC release, version 4. Providing in-depth information on GCC's enormous... |
|
|
|
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 |