Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Database Performance Tuning and Optimization
Database Performance Tuning and Optimization
The book provides comprehensive coverage of database performance tuning and optimization using Oracle 8i as the RDBMS. The chapters contain both theoretical discussions dealing with principles and methodology as well as actual SQL scripts to implement the methodology. The book combines theory with practice so as to make it useful for DBAs and...
Electron Microprobe Analysis and Scanning Electron Microscopy in Geology
Electron Microprobe Analysis and Scanning Electron Microscopy in Geology
The favourable reception given to the first (1996) edition of this book suggests that the joint treatment of electron microprobe analysis (EMPA) and scanning electron microscopy (SEM) with a specifically geological slant  has been found to serve a useful purpose. It was therefore decided to proceed with this second, revised and updated,...
Acoustic Diffusers and Absorbers: Theory, Design and Application
Acoustic Diffusers and Absorbers: Theory, Design and Application
Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed...
UMTS Networks and Beyond
UMTS Networks and Beyond
An all-encompassing coverage on UMTS Networks including an in-depth discussion of current work on UMTS evolution and 4G .

UMTS Networks and Beyond offers a comprehensive introduction to the networking aspects of UMTS and the networks coming after UMTS. The book is unique in that it systematically...

Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
Sit down at the keyboard and cinch that deal! Press the send button and get the account!

Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...

The Science and Art of Using Telescopes (Patrick Moore's Practical Astronomy Series)
The Science and Art of Using Telescopes (Patrick Moore's Practical Astronomy Series)
Amateur astronomers have to start somewhere. Most begin by buying a modest astronomical telescope and getting to know the night sky. After a while, many want to move on to the next stage, but this can be problematic. The magazines advertise a mass of commercially-made equipment – some of it very expensive – which can represent a major...
Transactions on Edutainment I (Lecture Notes in Computer Science / Transactions on Edutainment) (No. 1)
Transactions on Edutainment I (Lecture Notes in Computer Science / Transactions on Edutainment) (No. 1)

This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of Edutainment, such as Game-based Learning and Serious Games, Interactive Storytelling, Virtual Learning Environments, VR-based...

Parallel Algorithm Derivation and Program Transformation
Parallel Algorithm Derivation and Program Transformation
Transformational programming and parallel computation are two emerging fields that may ultimately depend on each other for success. Perhaps because ad hoc programming on sequential machines is so straightforward, sequential programming methodology has had little impact outside the academic community, and transformational methodology has had little...
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

Microsoft SQL Server 2008 Reporting Services Unleashed
Microsoft SQL Server 2008 Reporting Services Unleashed

The authoritative, example-rich guide to Microsoft’s powerful reporting platform

With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

unlimited object storage image
Result Page: 860 859 858 857 856 855 854 853 852 851 850 849 848 847 846 845 844 843 842 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy