Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Neo4j High Performance
Neo4j High Performance

Design, build, and administer scalable graph database systems for your applications using Neo4j

About This Book

  • Explore the numerous components that provide abstractions for pretty much any functionality you need from your persistent graphs
  • Familiarize yourself with how to test the...
Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science)
Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science)
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source...
Portable DBA: SQL Server
Portable DBA: SQL Server

Carry essential SQL Server administration information and troubleshooting techniques along with you so you can handle a wide variety of tasks on the spot. This handy resource offers fast access to administrative commands, syntax diagrams, error resolutions, best practices, and more. With coverage of the most commonly used SQL Server...

Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle is a complete, hands-on guide for instructors learning how to use Moodle, the popular course management system (CMS) that enables remote web-based learning and supplements traditional classroom learning. Updated for the latest version, this new edition explains exactly how Moodle works by offering plenty of examples,...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Database Annotation in Molecular Biology: Principles and Practice
Database Annotation in Molecular Biology: Principles and Practice
Two factors dominate current molecular biology: the amount of raw data is increasing very rapidly and successful applications in biomedical research require carefully curated and annotated databases.  The quality of the data - especially nucleic acid sequences - is satisfactory; however, annotations depend on features inferred from the data...
Microsoft® Visual Web Developer(TM) 2008 Express Edition Step by Step
Microsoft® Visual Web Developer(TM) 2008 Express Edition Step by Step

Visual Web Developer 2008 is a modern Integrated Development Environment (IDE) that makes it easier for developers to create pages that use Web services, controls, and data. With Visual Web Developer, you can use.NET Framework 3.5 SP1 as a platform to create Web pages with ASP.NET. Web controls in ASP.NET are powerful...

Managing Time in Relational Databases: How to Design, Update and Query Temporal Data
Managing Time in Relational Databases: How to Design, Update and Query Temporal Data

Managing Time in Relational Databases shows how to make the rich information content of bi-temporal data available to business users, while simplifying the design, maintenance and retrieval of that data. Metadata declarations eliminate the need to directly model temporal data. Temporal data maintenance is isolated in code that...

Heuristic Search: Theory and Applications
Heuristic Search: Theory and Applications

Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...

Building Cisco Remote Access Networks
Building Cisco Remote Access Networks
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
VB.NET: Your Visual Blueprint for Building Versatile Programs on the .NET Framework (With CD-ROM)
VB.NET: Your Visual Blueprint for Building Versatile Programs on the .NET Framework (With CD-ROM)
Each step in this great guide is displayed with callouts so you can see exactly where the action takes place on the screen. VB.NET functions are thoroughly covered, including designing forms and controls, using multimedia and databases, integrating VB.NET with ASP.NET, and creating server-side Web applications. This book also includes a special...
Multimedia Systems and Content-Based Image Retrieval
Multimedia Systems and Content-Based Image Retrieval
Multimedia systems and content-based image retrieval are very important areas of research in computer technology. Numerous research works are being done in these fields at present. These two areas are changing our life-styles because they together cover creation, maintenance, accessing and retrieval of video, audio, image, textual and graphic...
unlimited object storage image
Result Page: 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy