Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IBM InfoSphere Replication Server and Data Event Publisher
IBM InfoSphere Replication Server and Data Event Publisher

Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many...

Mastering matplotlib
Mastering matplotlib

A practical guide that takes you beyond the basics of matplotlib and gives solutions to plot complex data

About This Book

  • Customize, configure, and handle events, and interact with figures using matplotlib
  • Create highly intricate and complicated graphs using matplotlib
  • ...
Pattern Recognition: 31st DAGM Symposium, Jena, Germany, September 9-11, 2009, Proceedings
Pattern Recognition: 31st DAGM Symposium, Jena, Germany, September 9-11, 2009, Proceedings

In 2009, for the second time in a row, Jena hosted an extraordinary event. In 2008, Jena celebrated the 450th birthday of the Friedrich Schiller University of Jena with the motto “Lichtgedanken” – “flashes of brilliance.” This year, for almost one week, Jena became the center for the pattern recognition research...

Reliable Software Technologies - Ada-Europe 2011: 16th Ada-Europe International Conference on Reliable Software Technologies
Reliable Software Technologies - Ada-Europe 2011: 16th Ada-Europe International Conference on Reliable Software Technologies

The 16th edition of the International Conference on Reliable Software Technologies – Ada-Europe 2011—took place in the John McIntyre Conference Centre, Edinburgh (UK). Previous editions of the conference were held in Switzerland (Montreux 1996 and Geneva 2007), United Kingdom (London 1997 and York 2005), Sweden (Uppsala...

.NET for Java Developers: Migrating to C#
.NET for Java Developers: Migrating to C#

.NET for Java Developers is the definitive guide to leveraging your Java programming experience in the .NET environment. Understanding the similarities and differences between the C# and Java APIs enables Java programmers to quickly begin rapid application Windows development using C#. The...

Databases, Information Systems, and Peer-to-Peer Computing: First International Workshop, DBISP2P, Berlin Germany
Databases, Information Systems, and Peer-to-Peer Computing: First International Workshop, DBISP2P, Berlin Germany
This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Databases, Information Systems, and Peer-to-Peer Computing, DBISP2P 2003, held in Berlin, Germany in September 2003 as a satellite event of VLDB 2003.The 16 revised full papers presented together with the abstract of an invited contribution were...
Parameterized and Exact Computation: 5th International Symposium
Parameterized and Exact Computation: 5th International Symposium

The International Symposium on Parameterized and Exact Computation (IPEC, formerly IWPEC) is an international symposium series that covers research in all aspects of parameterized and exact algorithms and complexity. Started in 2004 as a biennial workshop, it became an annual event from 2008.

The four previous meetings of the...

Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009

This volume collects the papers accepted for presentation at MIRAGE 2009. The MIRAGE conference is continuing to receive international recognition, with this year’s presentations coming from 25 countries despite the large worldwide financial crisis. This time Asia submitted far fewer papers than previously and fewer than Europe. France...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Getting Started with Magento Extension Development
Getting Started with Magento Extension Development

This practical guide to building Magento modules from scratch takes you step-by-step through the whole process, from first principles to practical development. At the end of it you’ll have acquired expertise based on thorough understanding.

Overview

  • Get a detailed insight into the structure of...
Using Event-B for Critical Device Software Systems
Using Event-B for Critical Device Software Systems

Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation).

This is assessed...

Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy