More than ever before, today's Oracle DBA faces a database farm that is growing both in physical size and actual numbers. To keep these databases up and performing at exceptional levels, the database administrator needs more than a cobbled together set of scripts that they use to (hopefully) verify that everything is in order.
This user's guide does far more than simply outline the ARM Cortex-M3 CPU features; it explains step-by-step how to program and implement the processor in real-world designs. It teaches readers how to utilize the complete and thumb instruction sets in order to obtain the best functionality, efficiency, and reuseability. The author, an ARM...
This sixth edition of Water Quality & Treatment: A Handbook on Drinking Water serves as a handbook for scientists, engineers, and other professionals who study and work in drinking water—particularly the quality of water supplies, the quality of treated drinking water, and water treatment processes. It is meant as a resource for...
Practically next door to us in our Solar System, Mars is the most Earth-like of all the worlds held in perpetual motion by the Sun’s gravity. It is a planet that has fascinated and intrigued humans since prehistoric times. The Greeks named it Ares, after their god of war. The connection was easy to make because of the planet’s...
The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...
Get the inside scoop on Hyper-V for Windows Server 2008 R2
Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to...
The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.
Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!
Storage technologies have fundamentally changed the landscape
of digital media in a profound way. Gone are the days of using
a single hard disk drive on a workstation as the sole means to
store digital content. Nearly vanished is the practice of capturing
video and audio only on videotape. The practice of transferring
videotape...
Data mining has developed rapidly and has become very popular in the past two decades, but actually has
its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases.
The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In
corporate...
The computer program exclusion from Article 52 of the European Patent Convention (EPC) proved impossible to uphold as industry moved over to digital technology, and the Boards of Appeal of the European Patent Organisation (EPO) felt emboldened to circumvent the EPC in Vicom by creating the legal fiction of 'technical effect'. This...
It is a great pleasure for me to write this foreword about a book that comes out
of one of the first research projects funded by ANR, the French National Research
Agency. ANR was established by the French government in 2005 to fund research
projects, based on competitive schemes giving researchers the best opportunities to
realize...
This book provides an overview of steganography and digital watermarking, two areas of research which are
generally referred to as "information hiding." Steganography studies ways to make communication invisible by
hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...