|
|
SQL and Relational Theory: How to Write Accurate SQL CodeUnderstanding SQL's underlying theory is the best way to guarantee that your SQL code is correct and your database schema is robust and maintainable. On the other hand, if you're not well versed in the theory, you can fall into several traps. In SQL and Relational Theory, author C.J. Date demonstrates how you can apply relational theory... | | Blown to Bits: Your Life, Liberty, and Happiness After the Digital ExplosionEvery day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,... | | Intelligence: The Eye, the Brain, and the ComputerThis book treats the question of how far we have come in understanding intelligence and in duplicating it mechanically. The major facets of intelligence--reasoning, vision, language and learning are discussed as an approach to contrasting biological intelligence with current computer realizations.... |
|
|
Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... | | Foundations of Quantum PhysicsOur book is meant to be a text for a first undergraduate course in quantum physics. Both of us have taught this course numerous times and have used several different texts, some of them excellent. Obviously, though, there are changes we would make and that is the reason we are writing this book.
Two of the most widely used books for this course... | | Fundamentals of Database Systems (3rd Edition)Fundamentals of Database Systems combines clear explanations of theory and design, broad coverage of models and real systems, and excellent examples with up-to-date introductions to modern database technologies. This edition is completely revised and updated, and reflects the latest trends in technological and application development.... |
|
| | Web 2.0 Security - Defending AJAX, RIA, AND SOAService-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security... | | Eclipse Plug-ins (3rd Edition) (Eclipse Series)Build commercial-grade extensions to Eclipse and WebSphere Studio Workbench
This is the first definitive, start-to-finish guide to building commercial-quality extensions for both Eclipse and IBM's WebSphere Studio Workbench. Leading Eclipse developers Eric Clayberg and Dan Rubel don't merely introduce the basics: they show how... |
|
Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 75 74 |