 |
|
|
|
 Database Performance Tuning and OptimizationThe book provides comprehensive coverage of database performance tuning and optimization using Oracle 8i as the RDBMS. The chapters contain both theoretical discussions dealing with principles and methodology as well as actual SQL scripts to implement the methodology. The book combines theory with practice so as to make it useful for DBAs and... |  |  The Fractal Structure of Data Reference: Applications to the Memory HierarchyFor purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to... |  |  Ontologies-Based Business IntegrationThe globalization of everyday business and increasing international trade lead to a growing need to improve national and international business collaborations and transactions. Upcoming new technologies for e-business transactions allow for new ways of process, information and application integration. But business partners almost always have... |
|
 Algorithm Design for Networked Information Technology Systems
Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation... |  |  Advanced Web Services
Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application... |  |  Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian... |
|
|
 Spring Persistence with Hibernate (Beginning)
Persistence is an important set of techniques and technologies for accessing and transacting data, and ensuring that data is mobile regardless of specific applications and contexts. In Java development, persistence is a key factor in enterprise, e-commerce, and other transaction-oriented applications.
Today, the Spring Framework is... |  |  Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Must-have guide for professionals responsible for securing credit and debit card transactions
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking... |  |  |
|
|
Result Page: 43 42 41 40 39 38 37 36 35 34 |