Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Database Performance Tuning and Optimization
Database Performance Tuning and Optimization
The book provides comprehensive coverage of database performance tuning and optimization using Oracle 8i as the RDBMS. The chapters contain both theoretical discussions dealing with principles and methodology as well as actual SQL scripts to implement the methodology. The book combines theory with practice so as to make it useful for DBAs and...
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
Ontologies-Based Business Integration
Ontologies-Based Business Integration
The globalization of everyday business and increasing international trade lead to a growing need to improve national and international business collaborations and transactions. Upcoming new technologies for e-business transactions allow for new ways of process, information and application integration. But business partners almost always have...
Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

Advanced Web Services
Advanced Web Services

Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application...

Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
Patterns of Enterprise Application Architecture
Patterns of Enterprise Application Architecture

The practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented....

Databases A Beginner's Guide
Databases A Beginner's Guide

Thirty-five years ago, databases were found only in special research laboratories, where computer scientists struggled with ways to make them efficient and useful, publishing their findings in countless research papers. Today databases are a ubiquitous part of the information technology (IT) industry and business in general. We directly and...

Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...
Spring Persistence with Hibernate (Beginning)
Spring Persistence with Hibernate (Beginning)

Persistence is an important set of techniques and technologies for accessing and transacting data, and ensuring that data is mobile regardless of specific applications and contexts. In Java development, persistence is a key factor in enterprise, e-commerce, and other transaction-oriented applications.

Today, the Spring Framework is...

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility
Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility

Never has ethical business conduct received as much attention and focus as it does at present, in the wake of the far-reaching financial and societal effects of the dramatic collapses that have thundered through Corporate America. Whether your company is private, publicly-held, works with the government – either contractually or through...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy