Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter Regular Expression ...
اقرأ المزيدAn understanding of the techniques used to make distributed computing systems and networks reliable, fault-tolerant and secure ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Conference on Reliable Software Technologies, Ada-Europe ...
اقرأ المزيدThis book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th International Conference on Reliable Software Technologies, Ada- ...
اقرأ المزيدOver the last 11 years, ECDL has created a strong interdisciplinary com- nity of researchers and practitioners in the ?eld ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th European Conference on Research and Advanced Technology for Digital ...
اقرأ المزيدThis book constitutes the refereed proceedings of the proceedings of the 10thEuropean Conference onDigital Libraries (ECDL ...
اقرأ المزيدThe web framework Ruby on Rails for developing database based web applications provides a Model-View-Controller framework. ...
اقرأ المزيدRuleML 2005 also accommodated the ?rst Workshop on OWL: Experiences and Directions. Rules are widely recognized to be a major ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 31st Conference on Current Trends in Theory and Practice of Computer ...
اقرأ المزيدSQL Server 2000 is the leading relational database for the Windows platform. It's a full-featured, enterprise-class database ...
اقرأ المزيدThis no-fluff desk reference offers direct access to the information you need to get the job done. It covers basic T-SQL ...
اقرأ المزيدSQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language ...
اقرأ المزيدThe scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
اقرأ المزيدThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
اقرأ المزيدAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
اقرأ المزيدthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
اقرأ المزيدNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
اقرأ المزيد