Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter Regular Expression ...
WeiterlesenAn understanding of the techniques used to make distributed computing systems and networks reliable, fault-tolerant and secure ...
WeiterlesenThis book constitutes the refereed proceedings of the 7th International Conference on Reliable Software Technologies, Ada-Europe ...
WeiterlesenThis book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th International Conference on Reliable Software Technologies, Ada- ...
WeiterlesenOver the last 11 years, ECDL has created a strong interdisciplinary com- nity of researchers and practitioners in the ?eld ...
WeiterlesenThis book constitutes the refereed proceedings of the 9th European Conference on Research and Advanced Technology for Digital ...
WeiterlesenThis book constitutes the refereed proceedings of the proceedings of the 10thEuropean Conference onDigital Libraries (ECDL ...
WeiterlesenThe web framework Ruby on Rails for developing database based web applications provides a Model-View-Controller framework. ...
WeiterlesenRuleML 2005 also accommodated the ?rst Workshop on OWL: Experiences and Directions. Rules are widely recognized to be a major ...
WeiterlesenThis book constitutes the refereed proceedings of the 31st Conference on Current Trends in Theory and Practice of Computer ...
WeiterlesenSQL Server 2000 is the leading relational database for the Windows platform. It's a full-featured, enterprise-class database ...
WeiterlesenThis no-fluff desk reference offers direct access to the information you need to get the job done. It covers basic T-SQL ...
WeiterlesenSQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language ...
WeiterlesenThe scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
WeiterlesenThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
WeiterlesenAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
WeiterlesenThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Weiterlesenthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
WeiterlesenNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Weiterlesen