Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter Regular Expression ...
Lire la suiteAn understanding of the techniques used to make distributed computing systems and networks reliable, fault-tolerant and secure ...
Lire la suiteThis book constitutes the refereed proceedings of the 7th International Conference on Reliable Software Technologies, Ada-Europe ...
Lire la suiteThis book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Conference on Reliable Software Technologies, Ada- ...
Lire la suiteOver the last 11 years, ECDL has created a strong interdisciplinary com- nity of researchers and practitioners in the ?eld ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th European Conference on Research and Advanced Technology for Digital ...
Lire la suiteThis book constitutes the refereed proceedings of the proceedings of the 10thEuropean Conference onDigital Libraries (ECDL ...
Lire la suiteThe web framework Ruby on Rails for developing database based web applications provides a Model-View-Controller framework. ...
Lire la suiteRuleML 2005 also accommodated the ?rst Workshop on OWL: Experiences and Directions. Rules are widely recognized to be a major ...
Lire la suiteThis book constitutes the refereed proceedings of the 31st Conference on Current Trends in Theory and Practice of Computer ...
Lire la suiteSQL Server 2000 is the leading relational database for the Windows platform. It's a full-featured, enterprise-class database ...
Lire la suiteThis no-fluff desk reference offers direct access to the information you need to get the job done. It covers basic T-SQL ...
Lire la suiteSQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language ...
Lire la suiteThe scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Lire la suiteThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Lire la suiteAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lire la suitethe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Lire la suiteNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Lire la suite