Home | Amazing | Today | Tags | Publishers | Years | Search 
SQL and Relational Theory: How to Write Accurate SQL Code
SQL and Relational Theory: How to Write Accurate SQL Code
Understanding SQL's underlying theory is the best way to guarantee that your SQL code is correct and your database schema is robust and maintainable. On the other hand, if you're not well versed in the theory, you can fall into several traps. In SQL and Relational Theory, author C.J. Date demonstrates how you can apply relational theory...
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Intelligence: The Eye, the Brain, and the Computer
Intelligence: The Eye, the Brain, and the Computer
This book treats the question of how far we have come in understanding intelligence and in duplicating it mechanically. The major facets of intelligence--reasoning, vision, language and learning are discussed as an approach to contrasting biological intelligence with current computer realizations....
Erlang Programming
Erlang Programming

This book is an in-depth introduction to Erlang, a programming language ideal for any situation where concurrency, fault tolerance, and fast response is essential. Erlang is gaining widespread adoption with the advent of multi-core processors and their new scalable approach to concurrency. With this guide you'll learn how to write complex...

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Foundations of Quantum Physics
Foundations of Quantum Physics
Our book is meant to be a text for a first undergraduate course in quantum physics. Both of us have taught this course numerous times and have used several different texts, some of them excellent. Obviously, though, there are changes we would make and that is the reason we are writing this book.

Two of the most widely used books for this course...

Fundamentals of Database Systems (3rd Edition)
Fundamentals of Database Systems (3rd Edition)
Fundamentals of Database Systems combines clear explanations of theory and design, broad coverage of models and real systems, and excellent examples with up-to-date introductions to modern database technologies. This edition is completely revised and updated, and reflects the latest trends in technological and application development....
Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)
Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)

Robert Sedgewick has thoroughly rewritten and substantially expanded and updated his popular work to provide current and comprehensive coverage of important algorithms and data structures. Christopher Van Wyk and Sedgewick have developed new C++ implementations that both express the methods in a concise and direct manner, and...

Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
Eclipse Plug-ins (3rd Edition) (Eclipse Series)
Eclipse Plug-ins (3rd Edition) (Eclipse Series)
Build commercial-grade extensions to Eclipse and WebSphere Studio Workbench

This is the first definitive, start-to-finish guide to building commercial-quality extensions for both Eclipse and IBM's WebSphere Studio Workbench. Leading Eclipse developers Eric Clayberg and Dan Rubel don't merely introduce the basics: they show how...

Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 75 74 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy