Thomas Kyte has a simple philosophy: You can treat Oracle as a black box and shove data inside of it, or you can learn how ...
اقرأ المزيد
This book covers the new 10g management and performance tools and provides essential primers on Unix, Linux and Windows NT ...
اقرأ المزيد
This is a defining book on the Oracle database for any developer or database administrator who works with Oracle-driven database ...
اقرأ المزيد
JDBC is the most commonly used API in Java to access and manipulate data in a database. Oracle is one of the most popular ...
اقرأ المزيد
This book starts by reintroducing the database as a integral part of the software development ecosystem. You'll learn how ...
اقرأ المزيدThe project aims at building document organize system that manages a group of documents and pursuers distributed within different ...
اقرأ المزيد
Exploratory data analysis (EDA) is about detecting and describing patterns, trends, and relations in data, motivated by certain ...
اقرأ المزيد
The Facebook API allows web developers to create Facebook applications and access Facebook data from other applications. ...
اقرأ المزيد
The impact of social networks and the influence that fashion influencers have on the choices people make for shopping is ...
اقرأ المزيد
The interplay of electronic textiles and wearable technology, wearables for short, and fashion, design and science is a highly ...
اقرأ المزيد
Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
اقرأ المزيد
Fast Track to MDX gives you all the necessary background to let you to write useful, powerful MDX expressions and introduces ...
اقرأ المزيد
Feasibility and Infeasibility in Optimization is a timely expository book that summarizes the state of the art in both classical ...
اقرأ المزيد
The lives of people all around the world, especially in industrialized nations, continue to be changed by the presence and ...
اقرأ المزيد
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيد
This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
اقرأ المزيد