Sebanyak 369 item atau buku ditemukan

Marketing Strategy

The essential marketing text for business students and professionals--updated and revised to accommodate rapid changes in the business world. First issued in 1991, Steven Schnaars's text combines a centrist approach to basic theory with real-world business examples. In clear and focused language, Schnaar focuses on the three Cs--customers, competition, and changing market trends.

The essential marketing text for business students and professionals--updated and revised to accommodate rapid changes in the business world.

Economic Games and Strategic Behaviour

Theory and Application

'Researchers should find plenty of material of interest and certainly a perusal of at least the first three chapters and the concluding one should be rewarding and may well tempt one to go through the entire work.' - S. Das Gupta, Zentralblatt fur Mathematik und ihre Grenzgebiete 'In closing, allow me to shamelessly steal a Woody Allen joke which should not be a stranger to many readers of Kyklos. This is a forceful book, which is seriously written, well formatted, rich in economic applications and policy implications (to lesser extent, however), and just can not be read as fast (although great readability or light reading might be what the author takes pride to offer). One should not flip through it from cover to cover in one day and conclude: "It is about two-person repeated games with self-enforcing agreements'. Incidentally, I just reveal, in my humblest opinion, the most appropriate title of this interesting and most welcome monograph (Calling this Economic Games and Strategic Behaviour resembles renaming "Mighty Aphrodite" as "A Film by Woody Allen".' - Jong-Shin Wei, Kyklos Economic Games and Strategic Behaviour is a seminal volume which introduces a model providing solutions to economic games subject to repeated play. It develops a link between strategic bargaining and the theory of self-enforcing contracts to give insights into the long-term relationships between two parties, such as firms or governments, who meet in a negotiating situation.

This is a forceful book, which is seriously written, well formatted, rich in economic applications and policy implications (to lesser extent, however), and just can not be read as fast (although great readability or light reading might be ...

Official Adobe Print Publishing Guide

This guide explores the processes and issues involved in preparing colour publications for reproduction on a commercial printing press (the prepress process). Advice is offered on when to perform a prepress task and when it is better to leave it in the hands of the prepress professional. It addresses the principles and applications of working with desktop publishing applications, such as Adobe Photoshop and Adobe Illustrator. Included in this guide are tips and pointers, and a reference section.

This guide explores the processes and issues involved in preparing colour publications for reproduction on a commercial printing press (the prepress process).

Java Cryptography

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.

This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography ...