Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SAP HANA Starter
SAP HANA Starter

SAP HANA is SAP's in-memory database technology, and the focal point of their next generation strategy. Using column-based storage to provide highly compressed and rapidly accessed data, a SAP HANA application can be several hundred times faster than the same application on previous generation database technology.

SAP HANA...

Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
A Cell Biologist's Guide to Modeling and Bioinformatics
A Cell Biologist's Guide to Modeling and Bioinformatics
A step-by-step guide to using computational tools to solve problems in cell biology

Combining expert discussion with examples that can be reproduced by the reader, this text introduces an array of informatics tools that are available for analyzing biological data and modeling cellular processes. You learn to fully leverage public databases and...

Basic Math and Pre-Algebra For Dummies
Basic Math and Pre-Algebra For Dummies

Tips for simplifying tricky operations

Get the skills you need to solve problems and equations and be ready for algebra class

Whether you're a student preparing to take algebra or a parent who wants to brush up on basic math, this fun, friendly guide has the tools you need to get in gear. From positive,
...

IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)
IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)

In 1862, the gardener James Bateman sent several specimens of the Christmas orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did not blossom until 1857. It had been discovered several decades before by the French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The most significant...

Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Database Programming with JDBC and Java
Database Programming with JDBC and Java

Java and databases make a powerful combination. Getting the two sides to work together, however, takes some effort--largely because Java deals in objects while most databases do not.This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust model for writing...

Linux Annoyances for Geeks
Linux Annoyances for Geeks
GNU/Linux is an immensely popular operating system that is both extremely stable and reliable. But it can also induce minor headaches at the most inopportune times, if you're not fully up to speed with its capabilities.

A unique approach to running and administering Linux systems, Linux Annoyances...

SAS for Mixed Models (Second Edition)
SAS for Mixed Models (Second Edition)
David A. Dickey
Professor of Statistics, North Carolina State University

This revision of an already excellent text includes information-rich examples serving as templates for a wide variety of applications.

Geert Molenberghs
Center for Statistics, Hasselt University, Diepenbeek,
...
Modeling Decisions: Information Fusion and Aggregation Operators (Cognitive Technologies)
Modeling Decisions: Information Fusion and Aggregation Operators (Cognitive Technologies)
Information fusion techniques and aggregation operators produce the most comprehensive, specific datum about an entity using data supplied from different sources, thus enabling us to reduce noise, increase accuracy, summarize and extract information, and make decisions. These techniques are applied in fields such as economics, biology and...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Measure Theory: Second Edition (Birkhäuser Advanced Texts   Basler Lehrbücher)
Measure Theory: Second Edition (Birkhäuser Advanced Texts Basler Lehrbücher)

Intended as a self-contained introduction to measure theory, this textbook also includes a comprehensive treatment of integration on locally compact Hausdorff spaces, the analytic and Borel subsets of Polish spaces, and Haar measures on locally compact groups. This second edition includes a chapter on measure-theoretic probability...

Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy