|
|
|
|
| | Oracle Essentials: Oracle Database 11gOracle is an enormous system, with myriad technologies, options, and releases. Most users-even experienced developers and database administrators-find it difficult to get a handle on the full scope of the Oracle database. And, as each new Oracle version is released, users find themselves under increasing pressure to learn about a whole range of new... | | Harnessing HibernateHarnessing Hibernate is an ideal introduction to the popular framework that lets Java developers work with information from a relational database easily and efficiently. Databases are a very different world than Java objects, and they often involve people with different skills and specializations. With Hibernate, bridging these two worlds is... |
|
| | Pro (IBM) WebSphere Application Server 7 InternalsPro (IBM) WebSphere Application Server 7 Internals covers the internal architecture and implementation of the WebSphere Application Server (WAS) version 7 product set and how other IBM products extend it. It presents information to enable administrators, developers, and architects to learn about the aspects of WAS that apply to them:
... | | CVD Diamond for Electronic Devices and SensorsSynthetic diamond is diamond produced by using chemical or physical processes. Like naturally occurring diamond it is composed of a three-dimensional carbon crystal. Due to its extreme physical properties, synthetic diamond is used in many industrial applications, such as drill bits and scratch-proof coatings, and has the potential to be used in... |
|
|
Unsupervised Learning with R
Work with over 40 packages to draw inferences from complex datasets and find hidden patterns in raw unstructured data
About This Book
-
Unlock and discover how to tackle clusters of raw data through practical examples in R
-
Explore your data and create your own models from scratch
... | | Cisco Security Professional's Guide to Secure Intrusion Detection SystemsThis book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco... | | Content Computing: Advanced Workshop on Content Computing, AWCC 2004This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004.
The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile... |
|
|
Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 |