 |
|
 Effective C++: 50 Specific Ways to Improve Your Programs and Design (2nd Edition)
This book is a direct outgrowth of my experiences teaching C++ to professional programmers. I've found that most students, after a week of intensive instruction, feel comfortable with the basic constructs of the language, but they tend to be less sanguine about their ability to put the constructs together in an effective manner. Thus... |  |  ULSI Technology
ULSI Technology describes the theoretical and practical aspects of the most advanced state of electronics technology-ultralarge-scale integration (ULSI), where an integrated circuit (IC) chip contains over 10 million semiconductor devices. With ULSI technology, the cost of electronics products will decrease while the system functionality and... |  |  Parameterized and Exact Computation: 5th International Symposium
The International Symposium on Parameterized and Exact Computation (IPEC, formerly IWPEC) is an international symposium series that covers research in all aspects of parameterized and exact algorithms and complexity. Started in 2004 as a biennial workshop, it became an annual event from 2008.
The four previous meetings of the... |
|
|
|
 Star Schema The Complete Reference
The definitive guide to dimensional design for your data warehouse
Learn the best practices of dimensional design. Star Schema: The Complete Reference offers in-depth coverage of design principles and their underlying rationales. Organized around design concepts and illustrated with detailed examples, this is a... |  |  Gender Issues and Sexuality: Essential Primary Sources
Gender Issues and Sexuality: Essential Primary Sources provides insight into the personal, social, and political issues of gender and sexuality—issues that range from what many hold as intimate matters of personal belief to matters that stir, shake, and thus profoundly shape modern society.
The women’s rights and gay... |  |  Role-Based Access Control
Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,... |
|
Result Page: 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 |