Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Constraint Databases
Introduction to Constraint Databases
Constraint databases provide extra expressive power over relational databases in a largely hidden way at the data-storage or physical level. Constraints, such as linear or polynomial equations, are used to represent large sets in a compact manner. They keep the view of the database for a user or application programmer almost as simple as in...
OSWorkflow: A guide for Java developers and architects to integrating open-source Business Process Management
OSWorkflow: A guide for Java developers and architects to integrating open-source Business Process Management
This book covers all aspects of OSWorkflow for Java developers and system architects, from basics of Business Process Management and installing OSWorkflow to developing complex Java applications and integrating this open-source Java workflow engine with the third-party components Drools for business rules, Quartz for task scheduling, and Pentaho...
Flow-Based Programming: A New Approach to Application Development
Flow-Based Programming: A New Approach to Application Development
Imagine that you have a large and complex application running in your shop, and you discover that you need what looks like fairly complex changes made to it in a hurry. You consult your programmers and they tell you that the changes will probably take several months, but they will take a look. A meeting is called of all the people involved - not...
Vaguely Defined Objects: Representations, Fuzzy Sets and Nonclassical Cardinality theory
Vaguely Defined Objects: Representations, Fuzzy Sets and Nonclassical Cardinality theory
This unique monograph explores the cardinal, or quantitative, aspects of objects in the presence of vagueness, called vaguely defined objects. In the first part of the book such topics as fuzzy sets and derivative ideas, twofold fuzzy sets, and flow sets are concisely reviewed as typical mathematical representations of vaguely defined...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Foundations of Information and Knowledge Systems: 5th International Symposium, FoIKS 2008, Pisa, Italy, February 11-15, 2008
Foundations of Information and Knowledge Systems: 5th International Symposium, FoIKS 2008, Pisa, Italy, February 11-15, 2008
This book constitutes the refereed proceedings of the 5th International Symposium on Foundations of Information and Knowledge Systems, FoIKS 2008 held in Pisa, Italy, in February 2008.

The 13 revised full papers presented together with 9 revised short papers and 3 invited lectures were carefully selected during two rounds of reviewing and...

Understanding COM+
Understanding COM+
Developing enterprise applications has traditionally been a long, painful, and expensive task because applications developers often have to reinvent the wheel by writing, from scratch, the entire infrastructure needed to scale business logic up to the enterprise level. That's where COM+ comes in. It's an advanced Component Object Model (COM)...
Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory
Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory
With the evolution of our complex technological society and the introduction of new notions and innovative theoretical tools in the field of intelligent systems, the field of neural networks is undergoing an enormous evolution. These evolving and innovative theoretical tools are centered around the theory of soft computing, a theory that embodies...
McGraw-Hill's GMAT, 2008 Edition
McGraw-Hill's GMAT, 2008 Edition
Welcome to the GMAT. Were we saying this to you in person, we might duck after speaking those words. For many people, there’s nothing remotely welcoming about the GMAT. To many business school applicants, the test appears to be the most painful hurdle they must clear in their admissions process, and the one for which their work experience has...
Professional haXe and Neko
Professional haXe and Neko
Professional haXe and Neko

haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the...

Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

Mobile Web Development
Mobile Web Development
This complete, practical guide to writing mobile websites and applications shows developers how to build a powerful mobile web presence. Readers need knowledge of HTML, CSS, JavaScript, and a server-side language; the examples use PHP, but are easily adapted to other languages. The book does not use J2ME, but uses mobiles' web browsers and other...
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy