Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ultra Low-Power Electronics and Design (Solid Mechanics and Its Applications)
Ultra Low-Power Electronics and Design (Solid Mechanics and Its Applications)
Power consumption is a key limitation in many high-speed and high-data-rate electronic systems today, ranging from mobile telecom to portable and desktop computing systems, especially when moving to nanometer technologies. Ultra Low-Power Electronics and Design offers to the reader the unique opportunity of accessing in an easy and...
Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
Thinking in Java (4th Edition)
Thinking in Java (4th Edition)

Thinking in Java has earned raves from programmers worldwide for its extraordinary clarity, careful organization, and small, direct programming examples. From the fundamentals of Java syntax to its most advanced features, Thinking in Java is designed to teach, one simple step at a time.

...
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Uncertainty and Intelligent Information Systems
Uncertainty and Intelligent Information Systems
Intelligent systems are necessary to handle modern computer-based technologies managing information and knowledge. This book discusses the theories required to help provide solutions to difficult problems in the construction of intelligent systems. Particular attention is paid to situations in which the available information and data may be...
Oracle Essbase 9 Implementation Guide
Oracle Essbase 9 Implementation Guide

The hot new data analysis trends involve business intelligence and analytics. The technology that supports business intelligence and analytics better than anything else is today's multidimensional OLAP technology - and there is none better than Oracle Essbase! Although storing data in a cube and developing analytical applications leaves...

C++ Database Development
C++ Database Development

Learn the fundamentals of creating and using object oriented databases with C++ Database Development, 2nd Edition. This comprehensive guide covers the history and principles of database management, advanced techniques for designing and writing C++ persistent object database programs, and using PARODY the Persistent, Almost-Relational...

Introduction to Contextual Processing: Theory and Applications
Introduction to Contextual Processing: Theory and Applications

Contextual computing has been around for several years with a variety of names such as pervasive computation and omnipresent computing. Recently there has been a drive toward making personal digital assistants (PDAs) more aware of their environment. For example, a cell phone may sense that it is in a conference room and reason that it should...

ADempiere 3.6 Cookbook
ADempiere 3.6 Cookbook

ADempiere is one of the leading open source ERP products in today's business market. ADempiere offers everything you need to make your business successful. Efficient data management, streamlining business processes, reduction in costs, and minimal complexity.

Written in a cookbook style, this book offers solutions using a...

Python 2.6 Text Processing Beginners Guide
Python 2.6 Text Processing Beginners Guide

The Python Text Processing Beginner's Guide is intended to provide a gentle, hands-on introduction to processing, understanding, and generating textual data using the Python programming language. Care is taken to ensure the content is example-driven, while still providing enough background information to allow for a solid...

Codin' for the Web: A Designer's Guide to Developing Dynamic Web Sites
Codin' for the Web: A Designer's Guide to Developing Dynamic Web Sites

EVEN THE MOST SKILLED WEB DESIGNERS can find the complexities of creating a full-functioned Web site to be a daunting task. Here to help designers create sites that not only work, but work well and are easy to update and maintain is an easy-to-read guide to Web programming basics from best-selling author Charles Wyke-Smith. Just as architects...

unlimited object storage image
Result Page: 747 746 745 744 743 742 741 740 739 738 737 736 735 734 733 732 731 730 729 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy