Home | Amazing | Today | Tags | Publishers | Years | Search 
SQL Server DMVs in Action: Better Queries with Dynamic Management Views
SQL Server DMVs in Action: Better Queries with Dynamic Management Views

When I first discovered DMVs, I was enthralled because they made many difficult things so easy. It was simple to identify, typically within seconds, the core performance problems that affect SQL Server databases. For example, I could quickly discover which queries were taking the longest time to run, which indexes were missing, and...

Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-Based Information Systems: Developing Real-Time Tracking Applications

Location-based services (LBS) are nally coming out of research labs and getting into the hands of nal users. It is fairly common to see cellular carriers and private companies o ering LBS to locate your children, friends, and sites of interest, track assets, enhance the security of key personnel, help people with disabilities use...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Bioassay Techniques for Drug Development
Bioassay Techniques for Drug Development

The so-called “green wave”, triggered by a growing ecological awareness, has resulted in an increased interest in herbal formulations throughout the world, particularly in the last decade. The consumption of medicinal plants has almost doubled in the West during that period. The efficacy of a number of herbal formulations...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Ubiquitous Multimedia and Mobile Agents: Models and Implementations
Ubiquitous Multimedia and Mobile Agents: Models and Implementations

Ubiquitous multimedia systems, or mobile multimedia systems, offer the promise of pervasive delivery of multimedia content to mobile users and their handheld devices.

Ubiquitous Multimedia and Mobile Agents: Models and Implementations provides the hybridization of two paradigms, namely, ubiquitous/mobile multimedia and mobile...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Ambient Intelligence - Software and Applications: 3rd International Symposium on Ambient Intelligence
Ambient Intelligence - Software and Applications: 3rd International Symposium on Ambient Intelligence

Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyone’s life more comfortable. Another main concern of AmI originates from the human computer interaction domain and focuses on offering ways...

Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Computing is transforming our society in ways that are as profound as the changes wrought by physics and chemistry in the previous two centuries. Indeed, there is hardly an aspect of our lives that hasn't already been influenced, or even revolutionized, by digital technology. Given the importance of computing to modern society,...
HTML5 Developer's Cookbook (Developer's Library)
HTML5 Developer's Cookbook (Developer's Library)

Using HTML5, web developers can create standards-based browser applications with extraordinary richness and power, incorporating everything from drag-and-drop to native audio and video—all without any third-party plug-ins. Simply put, every web developer needs to master HTML5—and...

Grid Computing: International Symposium on Grid Computing (ISGC 2007)
Grid Computing: International Symposium on Grid Computing (ISGC 2007)
ISGC (International Symposium on Grid Computing) is one of the most important annual events in Asia that brings together scientists and engineers worldwide to exchange ideas, to present on challenges, solutions and future development in the field of Grid Computing. The objective of this Symposium is to facilitate the information...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy