Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inside the SQL Server Query Optimizer
Inside the SQL Server Query Optimizer

The SQL Server Query Optimizer is perceived by many to be a magic black box, transforming SQL queries into high performance execution plans in the blink of an eye through some unknowable process. The truth is that, while the Query Optimizer is indeed the highly-complex result of decades of research, learning how it works its magic is not only...

Pathways Through Applied and Computational Physics (Undergraduate Lecture Notes in Physics)
Pathways Through Applied and Computational Physics (Undergraduate Lecture Notes in Physics)

This book is intended for undergraduates and young researchers who wish to understand the role that different branches of physics and mathematics play in the execution of actual experiments. The unique feature of the book is that all the subjects addressed are strictly interconnected within the context of the execution of a single experiment...

Pro SQL Azure (Expert's Voice in .NET)
Pro SQL Azure (Expert's Voice in .NET)

SQL Azure represents Microsoft’s cloud-based delivery of its enterprise-caliber, SQL Server database management system (formerly under the code name "Oslo"). Pro SQL Azure introduces you to this new platform, showing you how to program and administer it in a variety of cloud computing scenarios. You’ll learn to...

Python How to Program (With CD-ROM)
Python How to Program (With CD-ROM)

The authoritative DEITEL LIVE-CODE introduction to Python programming

This new book by the world's leading programming language textbook authors carefully explains how to use Python as a general-purpose programming language and how to program multi-tier, client/server,...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Reoperative Pelvic Surgery
Reoperative Pelvic Surgery

The close anatomical proximity of the colon, rectum and anus to the gynecologic and urologic organs often results in a disease affecting one of these organ systems to create complications in another. Many colorectal, gynecologic, and urologic diseases, and the management of their complications, necessitate technically-challenging...

Social Media ROI: Managing and Measuring Social Media Efforts in Your Organization (Que Biz-Tech)
Social Media ROI: Managing and Measuring Social Media Efforts in Your Organization (Que Biz-Tech)

“Blanchard is demanding. He won’t allow you to flip through this book, nod your head, and leave. If you’re in, you’re going to have to invest to get your rewards.”

--Chris Brogan, president of Human Business Works

...

Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation
Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation

If you’re looking for a serious infusion of life-blood into your company, transformational outsourcing could be the answer. This new, bold approach is not just about handing off non-core functions in order to cut costs. It’s about transforming the entire operating model—to boost a company’s stock price, increase its...

Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum computationmay seem to be a topic for science fiction, but small quantum computers have existed for several years and larger machines are on the drawing table. These efforts have been fueled by a tantalizing property: while conventional computers employ a binary representation that allows computational power to scale linearly with resources...
Actors in Scala
Actors in Scala

Recent trends in computer architecture make concurrency and parallelism an essential ingredient of efficient program execution. The actor model of concurrency allows you to express real-world concurrency in a natural way using concurrent processes that communicate via asynchronous messages. Scala is a programming language for the Java...

Windows Runtime via C# (Developer Reference)
Windows Runtime via C# (Developer Reference)

Delve inside the Windows Runtime - and learn best ways to design and build Windows Store apps. Guided by Jeffrey Richter, a recognized expert in Windows and .NET programming, along with principal Windows consultant Maarten van de Bospoort, you'll master essential concepts. And you'll gain practical insights and tips for how to...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy