|
|
Feminism: A Reference Handbook
This book is intended to provide a gateway into the study of modern feminism, to give an overview of resources on the subject, and to present the modern feminist vision of women’s issues and status. I have focused on what has come to be known as the “second wave” of feminism and on today’s... | | Database Design and Relational Theory: Normal Forms and All That Jazz
This book began life as a comparatively short chapter in a book called Database in Depth: Relational Theory for
Practitioners (O’Reilly, 2005). That book was superseded by SQL and Relational Theory: How to Write Accurate
SQL Code (O’Reilly, 2009), where the design material, since it was somewhat tangential to ... | | Cisco Router Configuration Handbook (2nd Edition) (Networking Technology)
There are many sources of information and documentation for configuring Cisco networking
devices, but few provide a quick and portable solution for networking professionals. This book is designed to provide a quick-and-easy reference guide for a wide range of commonly used features that can be configured on... |
|
iOS in Practice
My professional coding career has gone from large to small in a variety of ways. I
started on 3279 terminals at IBM, and with each professional move (from Ericsson to
Travelocity and others) I went to smaller machines and smaller companies. Now I
work on computers you can fit in your pocket and at a company of one: ... | | Agile Oracle Application Express
Before Oracle Application Express (APEX) can be discussed in the light of Agile software development, the stage must be set by defining, for the purposes of this book, what is meant by Agile software development.
This chapter introduces you to the core principles of Agile software development. The core principles were... | | Software Similarity and Classification (SpringerBriefs in Computer Science)
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define... |
|
|
|
Result Page: 2111 2110 2109 2108 2107 2106 2105 2104 2103 2102 2101 2100 2099 2098 2097 2096 2095 2094 2093 |