Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Database Programming with JDBC and Java
Database Programming with JDBC and Java

Java and databases make a powerful combination. Getting the two sides to work together, however, takes some effort--largely because Java deals in objects while most databases do not.This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust model for writing...

Linux Annoyances for Geeks
Linux Annoyances for Geeks
GNU/Linux is an immensely popular operating system that is both extremely stable and reliable. But it can also induce minor headaches at the most inopportune times, if you're not fully up to speed with its capabilities.

A unique approach to running and administering Linux systems, Linux Annoyances...

SAS for Mixed Models (Second Edition)
SAS for Mixed Models (Second Edition)
David A. Dickey
Professor of Statistics, North Carolina State University

This revision of an already excellent text includes information-rich examples serving as templates for a wide variety of applications.

Geert Molenberghs
Center for Statistics, Hasselt University, Diepenbeek,
...
Modeling Decisions: Information Fusion and Aggregation Operators (Cognitive Technologies)
Modeling Decisions: Information Fusion and Aggregation Operators (Cognitive Technologies)
Information fusion techniques and aggregation operators produce the most comprehensive, specific datum about an entity using data supplied from different sources, thus enabling us to reduce noise, increase accuracy, summarize and extract information, and make decisions. These techniques are applied in fields such as economics, biology and...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Measure Theory: Second Edition (Birkhäuser Advanced Texts   Basler Lehrbücher)
Measure Theory: Second Edition (Birkhäuser Advanced Texts Basler Lehrbücher)

Intended as a self-contained introduction to measure theory, this textbook also includes a comprehensive treatment of integration on locally compact Hausdorff spaces, the analytic and Borel subsets of Polish spaces, and Haar measures on locally compact groups. This second edition includes a chapter on measure-theoretic probability...

Bayesian Networks in R: with Applications in Systems Biology (Use R!)
Bayesian Networks in R: with Applications in Systems Biology (Use R!)
While there have been significant advances in capturing data from the entities across complex real-world systems, their associations and relationships are largely unknown. Associations between the entities may reveal interesting system-level properties that may not be apparent otherwise. Often these associations are hypothesized...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
Linking Teacher Evaluation and Student Learning
Linking Teacher Evaluation and Student Learning

In Linking Teacher Evaluation and Student Learning, researchers Pamela D. Tucker and James H. Stronge show that including measures of student achievement in teacher evaluations can help schools focus their efforts to meet higher standards. You'll see how four school systems have built such measures into their...

Totally Implantable Venous Access Devices
Totally Implantable Venous Access Devices

Since their first application in 1982, Totally Implantable Venous Access Devices (TIVADs) have become increasingly important in the clinical practice, as more intensive chemotherapy and parenteral treatments have come into use. At this time, there is objective evidence that TIVADs are a safe, effective strategy for long-term venous access;...

Weather Matters for Energy
Weather Matters for Energy

It is the purpose of this book to provide the meteorological knowledge and tools to improve the risk management of energy industry decisions, ranging from the long term finance and engineering planning assessments to the short term operational measures for scheduling and maintenance. Most of the chapters in this book are based on...

Current Practice Guidelines in Primary Care: 2007
Current Practice Guidelines in Primary Care: 2007

The ultimate at-a-glance clinical companion - updated annually

  • The most current screening, prevention, and management guidelines for more than 60 common outpatient conditions
  • Content drawn from a wide array of recommendations regularly updated by government agencies, medical and scientific...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy