Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter Regular Expression ...
Lee masAn understanding of the techniques used to make distributed computing systems and networks reliable, fault-tolerant and secure ...
Lee masThis book constitutes the refereed proceedings of the 7th International Conference on Reliable Software Technologies, Ada-Europe ...
Lee masThis book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...
Lee masThis book constitutes the refereed proceedings of the 11th International Conference on Reliable Software Technologies, Ada- ...
Lee masOver the last 11 years, ECDL has created a strong interdisciplinary com- nity of researchers and practitioners in the ?eld ...
Lee masThis book constitutes the refereed proceedings of the 9th European Conference on Research and Advanced Technology for Digital ...
Lee masThis book constitutes the refereed proceedings of the proceedings of the 10thEuropean Conference onDigital Libraries (ECDL ...
Lee masThe web framework Ruby on Rails for developing database based web applications provides a Model-View-Controller framework. ...
Lee masRuleML 2005 also accommodated the ?rst Workshop on OWL: Experiences and Directions. Rules are widely recognized to be a major ...
Lee masThis book constitutes the refereed proceedings of the 31st Conference on Current Trends in Theory and Practice of Computer ...
Lee masSQL Server 2000 is the leading relational database for the Windows platform. It's a full-featured, enterprise-class database ...
Lee masThis no-fluff desk reference offers direct access to the information you need to get the job done. It covers basic T-SQL ...
Lee masSQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language ...
Lee masThe scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Lee masThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Lee masAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lee masThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lee masthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Lee masNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Lee mas