Home | Amazing | Today | Tags | Publishers | Years | Search 
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software visualization encompasses the development and evaluation of methods for graphically representing different aspects of software, including its structure, its execution, and its evolution. Software visualization combines techniques from areas like software engineering, programming languages, data mining, computer graphics, information...
MCITP Self-Paced Training Kit (Exam 70-442): Designing and Optimizing Data Access by Using Microsoft  SQL Server(TM) 2005
MCITP Self-Paced Training Kit (Exam 70-442): Designing and Optimizing Data Access by Using Microsoft SQL Server(TM) 2005
Announcing an all-new Self-Paced Training Kit designed to help maximize your performance on 70-442, one of the required exams for the Microsoft Certified IT Professional (MCITP) Database Developer certification. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed...
Managing Worldwide Operations and Communications With Information Technology
Managing Worldwide Operations and Communications With Information Technology
A data warehouse consists of a set of materialized views that contain derived data from several data sources. Materialized views are beneficial because they allow efficient retrieval of summary data. However, materialized views need to be refreshed periodically in order to avoid staleness. During a materialized view refresh only changes to the base...
Adaptive Business Intelligence
Adaptive Business Intelligence
From the reviews of the first edition: 

"In this book the authors explain the science and application of numerous prediction and optimization techniques as well as how these concepts can be used to develop adaptive decision-making systems. The book is suitable for business and IT managers who make decisions in complex industrial and...

Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Poor data quality can seriously hinder or damage the efficiency and effectiveness of organizations and businesses. The growing awareness of such repercussions has led to major public initiatives like the "Data Quality Act" in the USA and the "European 2003/98" directive of the European Parliament.

Batini and...

MCTS Self-Paced Training Kit (Exam 70-529): Microsoft  .NET Framework 2.0 Distributed Application Development
MCTS Self-Paced Training Kit (Exam 70-529): Microsoft .NET Framework 2.0 Distributed Application Development

Key Book Benefits:

- Comprehensive study guide written by exam-certified authors - Deeper, more focused coverage of exam objectives and sub-objectives-plus instructive case studies and troubleshooting scenarios to enhance your performance on the job - 425 practice questions on CD - Test engine that enables customized testing,...

Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Computer Science Handbook, Second Edition
Computer Science Handbook, Second Edition

The second edition of this elemental handbook reviews the current state of theory and practice in the field while emphasizing a more practical/applied approach to IT topics such as information management, net-centric computing, and human computer interaction. With a complete revision of its sections on software engineering, architecture, and...

How Personal & Internet Security Works (How It Works)
How Personal & Internet Security Works (How It Works)

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft...

A Programmer's Introduction to PHP 4.0
A Programmer's Introduction to PHP 4.0

No matter what language you are familiar with, this book will benefit you. Beginning with a rapid introduction to PHP's syntax and basic functionality, you will swiftly understand PHP. The book then steers you toward advanced issues, like PHP's role in database manipulation, sessions, and user interactivity.

Author W.J. Gilmore also...

Developing Bioinformatics Computer Skills
Developing Bioinformatics Computer Skills
Bioinformatics--the application of computational and analytical methods to biological problems--is a rapidly evolving scientific discipline. Genome sequencing projects are producing vast amounts of biological data for many different organisms, and, increasingly, storing these data in public databases. Such biological databases are growing...
Machine Learning
Machine Learning
The field of machine learning is concerned with the question of how to construct
computer programs that automatically improve with experience. In recent years
many successful machine learning applications have been developed, ranging from
data-mining programs that learn to detect fraudulent credit card transactions, to...
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy