Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Active Rules in Database Systems (Monographs in Computer Science)

Buy
A timely survey of the field from the point of view of some of the subject's most active researchers. Divided into several parts organized by theme, the book first covers the underlying methodology regarding active rules, followed by formal specification, rule analysis, performance analysis, and support tools. It then moves on to the implementation of active rules in a number of commercial systems, before concluding with applications and future directions for research. All researchers in databases will find this a valuable overview of the topic.
(HTML tags aren't allowed.)

Sams Teach Yourself SQL in 24 Hours (3rd Edition)
Sams Teach Yourself SQL in 24 Hours (3rd Edition)

Sams Teach Yourself SQL in 24 Hours, Third Edition presents the key features of SQL (Structured Query Language) in an easy to understand format with updated code examples, notes, diagrams, exercises, and quizzes. New material covers more information on transactions, constructs, embedded databases, and object-oriented programming. In this...

Linux Kernels Internals (2nd Edition)
Linux Kernels Internals (2nd Edition)

Since the introduction of Linix version 1.2 in March 1995, a worldwide community has evolved from programmers who were attracted by the reliability and flexibility of this completely free operating system. Now at version 2.0, Linux is no longer simply the operating system of choice for hackers, but is being successfully employed in commercial...

Juniper Networks Field Guide and Reference
Juniper Networks Field Guide and Reference

Juniper Networks® creates and deploys high-performance routing platforms used by many of the world's largest service providers. Written by the leading experts and technical writers at Juniper Networks, the Juniper Networks® Field Guide and Reference is the definitive practical guide and reference to Juniper...


Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Configuration Management Principles and Practice
Configuration Management Principles and Practice

Configuration management (CM) is an important, but often neglected, practice that allows application developers and project managers to better identify potential problems, manage changes, and track the progress of software projects. An effective CM strategy—one that adheres to the practice's complexity while harnessing its depth—can...

Mastering Algorithms with C
Mastering Algorithms with C
This book offers robust solutions for everyday programming tasks, providing all the necessary information to understand and use common programming techniques. It includes implementations and real-world examples of each data structure in the text and full source...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy