|
|
|
|
Structured Query Language (SQL): a Practical IntroductionLet's start from basics. What is a database? In very general terms, a database is a collection of related data. Notice the word related, this implies that the collection of letters on this page do not by themselves constitute a database. But if we think of them as a collection of letters arranged to form words, then they can be conceptualised as... | | Springer Handbook of Nanotechnology
Since 2004 the Springer Handbook of Nanotechnology has established itself as the definitive reference in the nanoscience and nanotechnology area. It integrates the knowledge from nanofabrication, nanodevices, nanomechanics, Nanotribology, materials science, and reliability engineering in just one volume. Beside the presentation of... | | Beginning SQL Server 2005 AdministrationFor the first time, SQL Server 2005 provides features that can support large-scale enterprise databases. With this powerful new release, you may find yourself being called upon to perform duties that are no longer strictly "administrative," duties that have become much more complicated and difficult. With that in mind, a team of... |
|
Managing Worldwide Operations and Communications With Information TechnologyA data warehouse consists of a set of materialized views that contain derived data from several data sources. Materialized views are beneficial because they allow efficient retrieval of summary data. However, materialized views need to be refreshed periodically in order to avoid staleness. During a materialized view refresh only changes to the base... | | Access 2002 Programming by ExampleThis book addresses an unmet need in this topic area. It is a complete beginner's tutorial resource to tips, troubleshooting, techniques, and program development for Access 2002. The book covers fundamentals such as database normalization, query design, object manipulation, and optimization and custom programming for forms and reports. It makes the... | | Practical Signcryption (Information Security and Cryptography)
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives... |
|
|
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |