Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Semantische Technologien: Grundlagen. Konzepte. Anwendungen. (German Edition)
Semantische Technologien: Grundlagen. Konzepte. Anwendungen. (German Edition)

Dieses Lehrbuch bietet eine umfassende Einführung in Grundlagen, Potentiale und Anwendungen Semantischer Technologien. Es richtet sich an Studierende der Infor¬matik und angrenzender Fächer sowie an Entwickler, die Seman¬tische Technologien am Arbeitsplatz oder in verteilten Applikationen nutzen möchten. Mit seiner an...

Java: An Introduction to Problem Solving and Programming (6th Edition)
Java: An Introduction to Problem Solving and Programming (6th Edition)

Java: An Introduction to Problem Solving and Programming, 6e, is ideal for introductory Computer Science courses using Java, and other introductory programming courses in departments of Computer Science, Computer Engineering, CIS, MIS, IT, and Business. Students are introduced to object-oriented programming and important...

Super-Resolved Imaging: Geometrical and Diffraction Approaches (SpringerBriefs in Physics)
Super-Resolved Imaging: Geometrical and Diffraction Approaches (SpringerBriefs in Physics)
Super resolution is one of the most fascinating and applicable fields in optical data processing. The urge to obtain highly resolved images using low-quality imaging optics and detectors is very appealing.

The field of super resolution may be categorized into two groups: diffractive and geometrical super
...
Ancient Scholarship and Grammar: Archetypes, Concepts and Contexts
Ancient Scholarship and Grammar: Archetypes, Concepts and Contexts

The volume aims at investigating archetypes, concepts and contexts of the ancient philological discipline from a historical, methodological and ideological perspective. It includes 26 contributions by leading scholars divided into four sections: The ancient scholars at work, The ancient grammarians on Greek language and linguistic...

Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Programming Pig
Programming Pig

This guide is an ideal learning tool and reference for Apache Pig, the open source engine for executing parallel data flows on Hadoop. With Pig, you can batch-process data without having to create a full-fledged application—making it easy for you to experiment with new datasets.

Programming Pig introduces...

Microsoft SQL Server 2008 R2 Administration Cookbook
Microsoft SQL Server 2008 R2 Administration Cookbook

Most books about SQL Server take one of the two approaches. The first approach is to provide a broad introduction to SQL Server administration. While overviews are great for beginners, they don't provide enough information, leaving the reader wanting for details and practical advice. The second approach is to attempt to cover every...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Scientific and Statistical Database Management: 23rd International Conference, SSDBM 2011
Scientific and Statistical Database Management: 23rd International Conference, SSDBM 2011

Welcome to the proceedings of the 23rd International Conference on Scientific and Statistical Database Management held in Portland, Oregon, where it celebrated its 30th birthday. The first incarnation of SSDBM (then called the Workshop on Statistical Database Management) took place in Menlo Park, California, in December 1981. Since...

Introduction to Design Patterns in C++ with Qt (2nd Edition)
Introduction to Design Patterns in C++ with Qt (2nd Edition)

I still remember how I first got to know C++ and Qt. It was around 15 years ago while working on my diploma thesis. Most of the development we did at that time was done in Fortran and C. I was working on a Linux system with FVWM as a window manager. One day I read an article about KDE—a cool, new open source project...

Working with Microsoft Dynamics CRM 2011
Working with Microsoft Dynamics CRM 2011

We love Microsoft Dynamics CRM 2011, and we hope that by the time you finish reading this book, you will love Microsoft Dynamics CRM, too. We understand that you might be skeptical about the possibility of falling for a piece of software, but we want you to know right up front that our goal is to show you all of the wonderful and...

Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Result Page: Previous 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy