The information that I gathered together in this book is the result of working with some of the most talented UNIX professionals on the topic. I have enjoyed every minute of my association with these UNIX gurus and it has been my pleasure to have th
Perl 正则表达式 处理 文本 英文版 This book introduces the basic ideas of text mining, which is a group of techniques that extracts useful information from one or more texts. This is a practical book, one that focuses on applications and examples. Although some
IBM powervm介绍{DEscr iptION} This slide says Power VM October Announcements Tech Talk. Below this is the names: Craig Johnson, Power Systems software. Bob Kovacs, Virtualization and Development. Carol Hernandez, Power Firmware Architecture. Vess Natc
In the fall of 2000 the Engineering Information Foundation (EIF) Board of Directors asked Donald W. King to advise them on possi-ble future research directions. In a presentation to the Board, Mr. King recommended a four-phase approach to a research
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring toge