Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Autonomic Communication
Autonomic Communication

New paradigms for communication/networking systems are needed in order to tackle such emerging issues as heterogeneity, complexity and management of evolvable infrastructures, thus requiring approaches that are both task- and knowledge-driven. The networking and seamless integration of concepts, technologies and devices in a dynamically changing...

Assessing Food Safety of Polymer Packaging
Assessing Food Safety of Polymer Packaging

Many foods depend on additives for safety, stability or preservation. Foods are packaged to protect them and keep them in good condition while they are delivered to shops, stacked on shelves or stored at home. The packaging material has to both preserve the food and to protect it from deterioration, outside contamination or damage during...

PostGIS Cookbook
PostGIS Cookbook

For web developers and software architects this book will provide a vital guide to the tools and capabilities available to PostGIS spatial databases. Packed with hands-on recipes and powerful concepts.

Overview

  • Integrate PostGIS with web frameworks and implement OGC standards such as WMS and WFS using...
The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

Sas R 9.1.3 Etl Studio: User's Guide
Sas R 9.1.3 Etl Studio: User's Guide
This manual explains how to use SAS ETL Studio to specify metadata for sources, specify metadata for targets, and create jobs that specify how data is extracted, transformed, and loaded from sources to targets.

Features that are new in SAS ETL Studio 9.1.3 include the following:

Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
Handbook of Applied Algorithms: Solving Scientific, Engineering, and Practical Problems
Handbook of Applied Algorithms: Solving Scientific, Engineering, and Practical Problems

Although vast activity exists, especially recent, the editors did not find any book that treats applied algorithms in a comprehensive manner. The editors discovered a number of graduate courses in computer science programs with titles such as “Design and Analysis of Algorithms, “Combinatorial Algorithms” “Evolutionary...

Community-Built Databases: Research and Development
Community-Built Databases: Research and Development

Communities have built collections of information in a collaborative manner for centuries. Around 250 years ago, more than 140 people wrote l’Encyclopedie in 28 volumes with 70,000 articles. More recently, Wikipedia has demonstrated how collaborative efforts can be a powerful method of building a massive data storage. It is...

Introducing Windows Server 2012
Introducing Windows Server 2012
Windows Server 2012 is probably the most significant release of the Windows Server platform ever. With an innovative new user interface, powerful new management tools, enhanced Windows PowerShell support, and hundreds of new features in the areas of networking, storage, and virtualization, Windows Server 2012...
Information Management: Strategies for Gaining a Competitive Advantage with Data
Information Management: Strategies for Gaining a Competitive Advantage with Data

Information Management: Gaining a Competitive Advantage with Data is about making smart decisions to make the most of company information. Expert author William McKnight develops the value proposition for information in the enterprise and succinctly outlines the numerous forms of data storage. Information Management will...

Debian 7: System Administration Best Practices
Debian 7: System Administration Best Practices

Learn the best ways to install and administer a Debian Linux distribution

Overview

  • An in-depth look at Debian administration subjects
  • Discover what distinguishes Debian from other Linux distributions
  • Learn how to install, maintain, and administer Debian Linux

...

MySQL Connector/Python Revealed: SQL and NoSQL Data Storage Using MySQL for Python Programmers
MySQL Connector/Python Revealed: SQL and NoSQL Data Storage Using MySQL for Python Programmers
Move data back and forth between database and application. The must-have knowledge in this book helps programmers learn how to use the official driver, MySQL Connector/Python, by which Python programs communicate with the MySQL database. 

This book takes you from the initial installation of the connector through basic
...
unlimited object storage image
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy