|
|
|
|
IBM InfoSphere Replication Server and Data Event Publisher
Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many... | | Mastering matplotlib
A practical guide that takes you beyond the basics of matplotlib and gives solutions to plot complex data
About This Book
-
Customize, configure, and handle events, and interact with figures using matplotlib
-
Create highly intricate and complicated graphs using matplotlib
- ...
| | Pattern Recognition: 31st DAGM Symposium, Jena, Germany, September 9-11, 2009, Proceedings
In 2009, for the second time in a row, Jena hosted an extraordinary event. In 2008, Jena celebrated the 450th birthday of the Friedrich Schiller University of Jena with the motto “Lichtgedanken” – “flashes of brilliance.” This year, for almost one week, Jena became the center for the pattern recognition research... |
|
|
|
Getting Started with Magento Extension Development
This practical guide to building Magento modules from scratch takes you step-by-step through the whole process, from first principles to practical development. At the end of it you’ll have acquired expertise based on thorough understanding.
Overview
-
Get a detailed insight into the structure of...
| | Using Event-B for Critical Device Software Systems
Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation).
This is assessed... | | Investigating Computer-Related CrimeWritten by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic... |
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 |