 |
|
 Database and XML Technologies: First International XML Database Symposium, XSYM 2003, Berlin, Germany, September 8, 2003, ProceedingsThis book constitutes the refereed proceedings of the First International XML Database Symposium, XSym 2003, held in Berlin, Germany in September 2003.
The 18 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on XML-relational database management systems, XML... |  |  Network Security Assessment: Know Your NetworkHow secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this... |  |  Oracle Essentials: Oracle Database 11gOracle is an enormous system, with myriad technologies, options, and releases. Most users-even experienced developers and database administrators-find it difficult to get a handle on the full scope of the Oracle database. And, as each new Oracle version is released, users find themselves under increasing pressure to learn about a whole range of new... |
|
 Mainframe Basics for Security Professionals: Getting Started with RACFSecurity—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers... |  |  Sams Teach Yourself Django in 24 HoursIn just 24 lessons of one hour or less, you will be able to build full-featured production websites using Django, the powerful web development framework based on Python.
Designed for experienced website developers who have at least some familiarity with the Python programming language,... |  |  Contributions to Ubiquitous Computing (Studies in Computational Intelligence)Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.
This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed... |
|
|
|
| Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 |