 |
|
|
|
 SQL and Relational Theory: How to Write Accurate SQL Code
This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course—
using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things,
experience gained from teaching live seminars based on the first edition.
One... |  |  Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
This volume includes the articles presented at the 14th International Workshop
on Combinatorial Image Analysis, IWCIA 2011, held in Madrid, Spain, May
23–25, 2011. The 13 previous meetings were held in Paris (France) 1991, Ube
(Japan) 1992, Washington D.C. (USA) 1994, Lyon (France) 1995, Hiroshima
(Japan) 1997, Madras... |
|
|
Result Page: 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 |