Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g.... Investing in Emerging Markets: The Rules of the Game
You see it in every business paper or magazine. You hear it on every financial talk show. You are deluged with “facts” presented as certainty: China will be the number one economy. The BRIC countries (Brazil, Russia, India, China) will continue to outstrip the developed world in growth for decades to come. Emerging markets are...
Pentaho Data Integration Beginner's Guide, Second Edition
Get up and running with the Pentaho Data Integration tool using this hands-on, easy-to-read guide
Manipulate your data by exploring, transforming, validating, and integrating it
Learn to migrate data between applications
Explore several features of Pentaho Data...
|Result Page: 13 12 11 10 9 8 7 6 5 4 |