 |
|
|
 Pro Oracle SQL (Expert's Voice in Oracle)
Pro Oracle SQL unlocks the power of SQL in the Oracle Database—one of the most potent SQL implementations on the market today. To master it requires a three-pronged approach: learn the language features, learn the supporting features that Oracle provides to help use the language effectively, and learn to think and work in... |  |  Easy To Understand Guide Hom Com
TO MANY PEOPLE, the word "computer" is a kind of future shock - an image of huge, intimidating machines banked in specially climate-controlled rooms, deep in corporate America. The people who use them, we think, are an elite group - far from ordinary people, hunched over their glowing video screens like sorcerers bending over a... |  |  Parameterized and Exact Computation: 5th International Symposium
The International Symposium on Parameterized and Exact Computation (IPEC, formerly IWPEC) is an international symposium series that covers research in all aspects of parameterized and exact algorithms and complexity. Started in 2004 as a biennial workshop, it became an annual event from 2008.
The four previous meetings of the... |
|
 Protecting SQL Server Data
For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.
These... |  |  Platforms, Markets and Innovation
`In her pioneering book Platform Leadership (with Michael Cusumano), Gawer gave us the strategy of building coalitions of customers, suppliers, and complementors. Now, she brings together a number of the leading researchers in the area of platform strategy to give us a book that will be a key reference for both practitioners and... |  |  BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer ... |
|
 Becoming a Tiger: How Baby Animals Learn to Live in the Wild
It's a jungle out there. And survival is never a given. Somehow, a blind, defenseless tiger kitten must evolve into a deadly, efficient predator; a chimp must learn to distinguish edible plants from lethal poisons; a baby buffalo must be able to pick its mother out of a herd of hundreds. Contrary to common belief, not everything is... |  |  |  |  JavaScript by Example (2nd Edition)
The World’s Easiest Java Script Tutorial–Fully Updated!
JavaScript by Example, Second Edition, is the easiest, most hands-on way to learn JavaScript. Legendary programming instructor Ellie Quigley has thoroughly... |
|
| Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 |