Wheelers Books
Refine By
Publication Date
Fiction / Non-Fiction
    Age
      Format
        Extended Format
        Show Large Print:
        Publication Country
          Latest Additions
          Language
            Price
            -

            Computing and Information Technology

            Stock Availability: Sort by: View:

            Total 3 jump to: go
            The UK Guide to the Internet
             

            The UK Guide to the Internet (Paperback)

            By James, Mike

            • RRP: $49.99
            • $49.99
            • In Stock US

            This guide covers every aspect of the Internet from a UK perspective, including just how to get that link. It considers how to select an Internet provider and set up a browser to connect to their service. It covers the selection of a service provider and which software to use.

            ISBN 9781871962437
            Released AU 15 Sep 1996
            Publisher I/O Press
            Interest Age General Audience
            Availability
            Internationally sourced; ships 6-12 working days
            View details for this title
            Learn Informatica in 1 Day: Definitive Guide to Learn Informatica for Beginners
             

            Learn Informatica in 1 Day: Definitive Guide to Learn Informatica for Beginners (Trade Paperback / Paperback)

            By Rungta, Krishna

            • RRP: $28.50
            • $28.50
            • In Stock US

            This is a practical step by step hand-on guide to learn and master Informatica. Informatica is widely used ETL tool and provided end to end data integration and management solution. This book introduces Informatica in detail. It provides a detailed step by step installation tutor...ial of Informatica. It teaches various activities like data cleansing, data profiling, transforming and scheduling the workflows from source to target in simple steps, etc. Here is what you will learn - Chapter 1: Introduction to Informatica Chapter 2: Informatica Architecture Tutorial Chapter 3: How to Download & Install Informatica PowerCenter Chapter 4: How to Configure Client and Repository in Informatica Chapter 5: Source Analyzer and Target Designer in Informatica Chapter 6: Mappings in Informatica: Create, Components, Parameter, Variable Chapter 7: Workflow in Informatica: Create, Task, Parameter, Reusable, Manager Chapter 8: Workflow Monitor in Informatica: Task & Gantt Chart View Examples Chapter 9: Debugger in Informatica: Session, Breakpoint, Verbose Data & Mapping Chapter 10: Session Properties in Informatica Chapter 11: Introduction to Transformations in Informatica and Filter Transformation Chapter 12: Source Qualifier Transformation in Informatica with EXAMPLE Chapter 13: Aggregator Transformation in Informatica with Example Chapter 14: Router Transformation in Informatica with EXAMPLE Chapter 15: Joiner Transformation in Informatica with EXAMPLE Chapter 16: Rank Transformation in Informatica with EXAMPLE Chapter 17: Sequence Transformation in Informatica with EXAMPLE Chapter 18: Transaction Control Transformation in Informatica with EXAMPLE Chapter 19: Lookup Transformation in Informatica & Re-usable Transformation Example Chapter 20: Normalizer Transformation in Informatica with EXAMPLE Chapter 21: Performance Tuning in Informatica Download Today Free to Read for Kindle Unlimited Subscribers!
            Read more

            ISBN 9781522018926
            Released AU 4 Aug 2017
            Publisher Independently Published
            Interest Age General Audience
            Availability
            Internationally sourced; ships 6-12 working days
            View details for this title
            Applications of Secure Multiparty Computation
             

            Applications of Secure Multiparty Computation (Hardback)

            Edited by Laud, Peeter; Kamm, Liina

            • RRP: $384.50
            • $384.50
            • In Stock US

            This book describes how many different computational tasks can be solved securely, yet efficiently. It describes how protocols can be combined to larger applications, and how the security-efficiency trade-offs of different components of an secure multi-party computation (SMC) app...lication should be chosen.
            Read more

            ISBN 9781614995319
            Released AU 31 Jul 2015
            Publisher IOS Press
            Interest Age General Audience
            Series Cryptology and Information Security
            Availability
            Internationally sourced; ships 6-12 working days
            View details for this title
            Total 3 jump to: go