Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

Writing and Querying MapReduce Views in CouchDB
Writing and Querying MapReduce Views in CouchDB

If you are reading this book, then you likely have already installed CouchDB, explored the Futon web administration console, and created a few documents using the cURL command-line tool. You may even have created a CouchApp or other type of application that accesses documents stored in a CouchDB database. However, to use CouchDB for...

Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen
Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen

The 7th Workshop on Approximation and Online Algorithms (WAOA 2009) focused on the design and analysis of algorithms for online and computationally hard problems. Both kinds of problems have a large number of applications from a variety of fields. WAOA 2009 took place in Copenhagen, Denmark, during September 10–11, 2009. The workshop...

concrete5 Beginner's Guide
concrete5 Beginner's Guide

The concrete5 Beginner's Guide will show you how to get up and running with concrete5 as quickly and painlessly as possible. Taking you from installation to deployment, this is the only reference that you will need for creating your new concrete5 site.

By using a number of real-world examples, as well as taking you through the...

Information Retrieval Technology: 6th Asia Information Retrieval Societies Conference
Information Retrieval Technology: 6th Asia Information Retrieval Societies Conference

The Asia Information Retrieval Societies Conference (AIRS) 2010 was the sixth conference in the AIRS series, aiming to bring together international researchers and developers to exchange new ideas and the latest results in information retrieval.

The scope of the conference encompassed the theory and practice of all aspects of...

Oracle Application Express 4.0 with Ext JS
Oracle Application Express 4.0 with Ext JS

Oracle Application Express (APEX) is a rapid web application development tool integrated directly into the Oracle database. APEX is a completely web-based application featuring many ready to use components, allowing developers to build and deploy professional web applications rapidly. Using SQL and PL/SQL as the development language it...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Data Management and Query Processing in Semantic Web Databases
Data Management and Query Processing in Semantic Web Databases

The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which...

Scaling MongoDB
Scaling MongoDB

This text is for MongoDB users who are interested in sharding. It is a comprehensive look at how to set up and use a cluster.

This is not an introduction to MongoDB; I assume that you understand what a document, collection, and database are, how to read and write data, what an index is, and how and why to set up a...

Result Page: 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 272 271 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy