Home | Amazing | Today | Tags | Publishers | Years | Search 
Database Systems: Design, Implementation, and Management
Database Systems: Design, Implementation, and Management

For many reasons, few books survive to reach their eighth edition. Authors and publishers who let the success of their earlier work produce the comfort of complacency usually pay the price of watching the marketplace dismantle their creations. This database systems book has been successful through seven editions because we–the...

Quick Guide to Flash Catalyst
Quick Guide to Flash Catalyst

This book is here to help you get your job done. In general, you may use the code in this book in your programs and documentation. You do not need to contact us for permission unless you’re reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does...

Redis Cookbook
Redis Cookbook

Redis is a data structure server with an in-memory dataset for speed. It is called a data structure server and not simply a key value store because Redis implements data structures allowing keys to contain binary safe strings, hashes, sets and sorted sets, as well as lists. This combination of flexibility and speed makes Redis the ideal tool...

Computer Aided and Integrated Manufacturing Systems, Volume 4: Computer Aided Design / Computer Aided Manufacturing
Computer Aided and Integrated Manufacturing Systems, Volume 4: Computer Aided Design / Computer Aided Manufacturing

This 5 volume MRW (Major Reference Work) is entitled "Computer Aided and Integrated Manufacturing Systems". A brief summary description of each of the 5 volumes will be noted in their respective PREFACES. An MRW is normally on a broad subject of major importance on the international scene. Because of the breadth of a major...

WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7
WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7

I am quite honored that the authors of this book asked me if I could write the foreword. They have a long and concrete experience in implementing business processes, and we have interacted together in the context of telecommunication operators, where they delivered successful business process implementation.

What I would like to...

Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)
Bridging the Gap Between Graph Edit Distance and Kernel Machines (Series in Machine Perception and Artifical Intelligence)

When we rst started working on the problem of making the kernel machine approach applicable to the classi cation of graphs a couple of years ago, our e orts were mainly driven by the fact that kernel methods had led to impressive performance results on many data sets. It didn't take us long to appreciate the sheer elegance of how...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

Getting Started with Citrix XenApp 6
Getting Started with Citrix XenApp 6

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure...

Google Power Search
Google Power Search

If you’re like me, you use Google every day to find things—news, technical support, events, tips, research documents, and more. Were you to master Google’s powerful search refinement operators and lesser-known features, over a year’s time you could save days scouring over irrelevant results.

...

Droid 2 For Dummies (Computer/Tech)
Droid 2 For Dummies (Computer/Tech)

Don’t be fooled: Just because the Droid 2 is a smartphone doesn’t mean that it’s harboring some form of insidious intelligence. There’s no alien brain in the device. It isn’t going to take over the world, though it can intimidate you — that is, until you understand and accept that it’s your...

Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Result Page: 1349 1348 1347 1346 1345 1344 1343 1342 1341 1340 1339 1338 1337 1336 1335 1334 1333 1332 1331 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy