|
|
|
|
|
Data Warehousing: Architecture and ImplementationA start-to-finish process for deploying successful data warehouses.
This book delivers what every data warehousing project participant needs most: a thorough overview of today's best solutions, and a reliable step-by-step process for building warehouses that meet their objectives. It answers the key questions asked by everyone involved in a... | | JAVA 2 Network Security (2nd Edition) The complete insider's guide to securing Java 2 enterprise applications!
- Building secure enterprise applications with Java 2!
- Integrating Java 2 into your overall security strategy
- Detailed coverage for managers, developers, netadmins, and security specialists
- ...
| | Managing Now
Information technology is a familiar aspect of our lives. We use computers,
e-mail, software, cell phones, iPods, fax machines, flash drives, scanners, and
BlackBerry®-type devices every day. We search for travel information on Expedia,
download airline tickets from AA.com, and register for and take college courses
online.... |
|
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |