الكتب الالكترونية

عدد الكتب: 21 - 40 /40
978-3-540-72163-5
Information Security, Practice and Experience

ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...

اقرأ المزيد
978-1-4302-0134-2
JDBC Metadata, MySQL, and Oracle Recipes

JDBC Metadata, MySQL, and Oracle Recipes is the only book that focuses on metadata or annotation-based code recipes for JDBC ...

اقرأ المزيد
978-1-4302-0000-0
Logging in Java with the JDK 1.4 Logging API and Apache log4j

This exceptional book explains fundamentals in detail, supported by realistic examples, while most other books on the market ...

اقرأ المزيد
978-1-4302-0148-9
Oracle Applications DBA Field Guide

Oracle Applications DBA Field Guide provides scripts, notes, guidelines, and references to guide you safely through the crucial ...

اقرأ المزيد
978-1-4302-0469-5
Oracle Database 11g

Oracle Database 11g : New Features for DBAs and Developers is a comprehensive, example–laden review of the most significant ...

اقرأ المزيد
978-1-4302-0280-6
Pro Oracle Application Express

Application Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...

اقرأ المزيد
978-1-4302-0214-1
Pro Oracle Database 10g RAC on Linux

Real Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope ...

اقرأ المزيد
978-1-4302-0446-6
Pro Oracle Spatial for Oracle Database 11g

Pro Oracle Spatial for Oracle Database 11g shows how to take advantage of Oracle Databases built–in feature set for working ...

اقرأ المزيد
978-3-540-68800-6
Progress in Cryptology - VIETCRYPT 2006

The papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...

اقرأ المزيد
978-3-540-78440-1
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

اقرأ المزيد
978-0-387-34456-0
Research and Practical Issues of Enterprise Information Systems

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-0-387-75902-9
Research and Practical Issues of Enterprise Information Systems II : IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007) October 14–16, 2007, Beijing, China

This book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...

اقرأ المزيد
978-0-387-76312-5
Research and Practical Issues of Enterprise Information Systems II : Volume 2 IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007) October 14–16, 2007, Beijing, China

This book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...

اقرأ المزيد
978-3-540-30598-9
Security in Communication Networks

The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...

اقرأ المزيد
978-3-540-73770-4
Tests and Proofs

Constitutes the thoroughly refereed post-proceedings of the First International Conference on Test and Proofs, TAP 2007, ...

اقرأ المزيد
978-3-540-79124-9
Tests and Proofs : Second International Conference, TAP 2008, Prato, Italy, April 9-11, 2008. Proceedings

This book covers the area of convergence of software proofing and testing and feature current research work that combines ...

اقرأ المزيد
978-3-030-64381-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-540-32648-9
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

اقرأ المزيد
978-3-540-69019-1
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

اقرأ المزيد
978-1-4302-0498-5
Troubleshooting Oracle Performance

What do you do when your database application isn't running fast enough? You troubleshoot, of course. Finding the slow part ...

اقرأ المزيد
عدد الكتب: 21 - 40 /40