Home | Amazing | Today | Tags | Publishers | Years | Search 
Deductive Databases and Their Applications
Deductive Databases and Their Applications
Deductive Databases and their Applications is an introductory text aimed at undergraduate students with some knowledge of database and information systems. The text comes complete with exercises and solutions to encourage students to tackle problems practically as well as theoretically. The author presents the origins of deductive databases in...
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
For businesses that are either planning to launch a new e-business or increase the profits of an existing one, this book provides techniques and methods to increase effectiveness and growth. Approaches to viewing a company's foundation introspectively through products, services, branding, target markets, online objectives, and budget are discussed,...
FileMaker Pro 9 Bible
FileMaker Pro 9 Bible
"Ray Cologon's contributions to the FileMaker developer community are unsurpassed. When Ray says something, we are all well advised to pay close attention."
— Steven H. Blackwell, FileMaker Pro expert, developer, and author

Before starting a FileMaker Pro development project, get this book

...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Learn effective and scalable database design techniques in a SQL Server environment. Pro SQL Server 2008 Relational Database Design and Implementation covers everything from design logic that business users will understand all the way to the physical implementation of the design in a SQL Server database. Grounded in best practices and a...
High Performance MySQL: Optimization, Backups, Replication, and More
High Performance MySQL: Optimization, Backups, Replication, and More
High Performance MySQL is the definitive guide to building fast, reliable systems with MySQL. Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity. High Performance MySQL teaches you advanced...
Algorithmics: The Spirit of Computing (3rd Edition)
Algorithmics: The Spirit of Computing (3rd Edition)
From a review of the first edition:

‘This book is a veritable tour de force. Harel writes with uncommon verve, clarity and imagination.'

‘Through the use of tantalizing questions and aptly chosen and often amusing examples, the author transmits to the reader the excitement and intellectual satisfaction of computer science...

Networks on Chips: Technology and Tools (Systems on Silicon)
Networks on Chips: Technology and Tools (Systems on Silicon)
The exponentially increasing complexity and heterogeneity of future SoCs forces the designer to abandon traditional bus -based structures and to implement innovative networks-on-chip. This book, written by two leading researchers, is the first of its kind. It is a must on the bookshelf of anybody having an interest in SoC design Heinrich Meyr,...
iSCSI: The Universal Storage Connection
iSCSI: The Universal Storage Connection
iSCSI: The Universal Storage Connection is an informative overview and in-depth guide to the emerging iSCSI standard, the technology that enables data storage, access, and management over networks, intranets, and the Internet. The iSCSI protocol reduces the total cost of ownership of shared storage solutions and enables an...
The Essential Guide to Flex 3
The Essential Guide to Flex 3
Flex 3 is the next generation of a technology that revolutionized web applications. It is the next evolutionary step of Flash, which has grown from a web animation medium to a powerful enterprise web design and development platform. With nearly 98% of all web browsers, and a growing number of mobile devices, running Flash Player, a knowledge of...
Handbook of Research on Wireless Security
Handbook of Research on Wireless Security
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy