 |
|
 Deductive Databases and Their ApplicationsDeductive Databases and their Applications is an introductory text aimed at undergraduate students with some knowledge of database and information systems. The text comes complete with exercises and solutions to encourage students to tackle problems practically as well as theoretically. The author presents the origins of deductive databases in... |  |  |  |  |
|
 FileMaker Pro 9 Bible"Ray Cologon's contributions to the FileMaker developer community are unsurpassed. When Ray says something, we are all well advised to pay close attention." — Steven H. Blackwell, FileMaker Pro expert, developer, and author
Before starting a FileMaker Pro development project, get this book ... |  |  Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |  |  |
|
 High Performance MySQL: Optimization, Backups, Replication, and MoreHigh Performance MySQL is the definitive guide to building fast, reliable systems with MySQL. Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity. High Performance MySQL teaches you advanced... |  |  Algorithmics: The Spirit of Computing (3rd Edition)From a review of the first edition:
‘This book is a veritable tour de force. Harel writes with uncommon verve, clarity and imagination.'
‘Through the use of tantalizing questions and aptly chosen and often amusing examples, the author transmits to the reader the excitement and intellectual satisfaction of computer science... |  |  Networks on Chips: Technology and Tools (Systems on Silicon)The exponentially increasing complexity and heterogeneity of future SoCs forces the designer to abandon traditional bus -based structures and to implement innovative networks-on-chip. This book, written by two leading researchers, is the first of its kind. It is a must on the bookshelf of anybody having an interest in SoC design Heinrich Meyr,... |
|
 iSCSI: The Universal Storage ConnectioniSCSI: The Universal Storage Connection is an informative overview and in-depth guide to the emerging iSCSI standard, the technology that enables data storage, access, and management over networks, intranets, and the Internet. The iSCSI protocol reduces the total cost of ownership of shared storage solutions and enables an... |  |  The Essential Guide to Flex 3Flex 3 is the next generation of a technology that revolutionized web applications. It is the next evolutionary step of Flash, which has grown from a web animation medium to a powerful enterprise web design and development platform. With nearly 98% of all web browsers, and a growing number of mobile devices, running Flash Player, a knowledge of... |  |  Handbook of Research on Wireless SecuritySecurity is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to... |
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |