Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle SQL*Plus Pocket Reference (2nd Edition)
Oracle SQL*Plus Pocket Reference (2nd Edition)
SQL*Plus is available at every Oracle site--from the largest data warehouse to the smallest single-user system--and it's a critical tool for virtually every Oracle user. Despite its wide use, few developers and DBAs know how powerful a tool SQL*Plus can be.

This pocket reference provides quick reference information that will help you use...

Geoinformation: Remote Sensing, Photogrammetry and Geographic Information Systems, Second Edition
Geoinformation: Remote Sensing, Photogrammetry and Geographic Information Systems, Second Edition
Surveying and mapping has recently undergone a transition from discipline-oriented technologies, such as geodesy, surveying, photogrammetry and cartography, to the methodology-oriented integrated discipline of geoinformatics based on GPS positioning, remote sensing, digital photography for data acquisition, and GIS for data manipulation and data...
Mathematics and Computer Science II: Algorithms, Trees, Combinatorics and Probabilities (Trends in Mathematics)
Mathematics and Computer Science II: Algorithms, Trees, Combinatorics and Probabilities (Trends in Mathematics)

This is the second volume in a series of innovative proceedings entirely devoted to the connections between mathematics and computer science. Here mathematics and computer science are directly confronted and joined to tackle intricate problems in computer science with deep and innovative mathematical approaches.

The book...

Bug Patterns In Java
Bug Patterns In Java

This book is written for anyone familiar with programming in Java who wants to more effectively prevent, explain, communicate about, or fix bugs. This may include developers from industry, the government, or academia, was well as computer science students. Developers in each of these categories possess a wide range of...

Professional Apache Tomcat
Professional Apache Tomcat
This book will provide you, the server administrator, with the necessary knowledge to install and configure Tomcat, as well as many of the most popular enhancements to the Tomcat package.

If you've written any Java servlets or...

Sams Teach Yourself JavaServer Pages in 21 Days
Sams Teach Yourself JavaServer Pages in 21 Days
Sams Teach Yourself JavaServer Pages in 21 Days offers a proven tutorial format to teach JSP in 21 example-driven lessons. While many competing JSP books are aimed at Java professionals, this book addresses the needs of the growing number of Web publishing professionals migrating to JavaServer Pages for its ability to create dynamic, interactive...
Communications Policy and Information Technology: Promises, Problems, Prospects (Telecommunications Policy Research Conference)
Communications Policy and Information Technology: Promises, Problems, Prospects (Telecommunications Policy Research Conference)
New technologies, although developed with optimism, often fall short of their predicted potential and create new problems. Communications technologies are no different. Their utopian proponents claim that universal access to advanced communications technologies can help to feed the hungry, cure the sick, educate the illiterate, improve the global...
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Mastering Network Security
Mastering Network Security
The new edition of the highly-acclaimed and best-selling Mastering Network Security is here, and just in time! The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security...
From Computer to Brain
From Computer to Brain

In From Computer to Brain: Foundations of Computational Neuroscience, William Lytton provides a gentle but rigorous introduction to the art of modeling neurons and neural systems. It is an accessible entry to the methods and approaches used to model the brain at many di erent levels, ranging from synapses and dendrites to neurons and...

Peripheral Arterial Disease: Diagnosis and Treatment (Contemporary Cardiology)
Peripheral Arterial Disease: Diagnosis and Treatment (Contemporary Cardiology)

Recognized experts comprehensively review the clinical, surgical, radiological, and scientific aspects of atherosclerotic peripheral arterial disease (PAD), including endovascular, gene, and drug therapies. In their far-ranging discussions, the authors examine in depth the risk factors and antiplatelet therapies for PAD patients at high risk...

The Online Rules of Successful Companies: The Fool-Proof Guide to Building Profits
The Online Rules of Successful Companies: The Fool-Proof Guide to Building Profits
In The Online Rules of Successful Companies: The Fool-Proof Guide to Building Profits, leading Internet entrepreneur Robin "Roblimo" Miller (developer for Slashdot and Freshmeat Web sites) presents systematic rules for building the profitability of your business online, whatever you sell - products,...
Result Page: Previous 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy