As users come to depend on MySQL, they find that they have to deal with issues of reliability, scalability, and performance--issues that are not well documented but are critical to a smoothly functioning site. This book is an insider's guide to thes
基于Java构建的淘宝:主要讲述了淘宝的构建发展历史 吕为德:How to maintain critical User Experience through out designer/developer workflow in a high fidelity way 李严冰:虚拟化技术作为云计算的平台 丘丹:WEb网站架构案例分析:以优酷网为案例
Intrusion detection and analysis has received a lot of criticism and publicity over the last several years. The Gartner report took a shot saying Intrusion Detection Systems are dead, while others believe Intrusion Detection is just reaching its mat
Book Descr iption This is a short, concise, hands-on manual for managers at all levels - a handbook for a leader's first 90 days in office. This work contains lots of practical tools and questions for self-assessment. Written in a friendly and acces
Over the last several years, single-supply operation has become an increasingly important requirement as systems get smaller, cheaper, and more portable. Portable systems rely on batteries, and total circuit power consumption is an important and oft
Modern high speed sampling ADCs are designed to give low distortion and wide dynamic range in signal processing systems. Realization of specified performance levels depends upon a number of factors external to the ADC itself, including proper design
PREFACE This book celebrates the importance of the question; it is not meant to be a collection of facts or procedures. The writing of this book was inspired by 16 years of queries from the research community.The con- tributors and I have tried to m
This paper describes a visual object detection framework that is capable of processing images extremely rapidly while achieving high detection rates. There are three key contributions. The first is the introduction of a new image representation call
When used in tandem with other debugging capabilities of Code Composer Studio, the DSP/BIOS real-time analysis tools provide critical views into target program behavior during program executionówhere traditional debugging techniques that stop the ta
These reviewers contributed their considerable hands-on expertise to the entire development process for Advanced Linux Programming. As the book was being written, these dedicated professionals reviewed all the material for technical content, organiz
The MAX4080/MAX4081 are high-side, current-sense amplifiers with an input voltage range that extends from 4.5V to 76V making them ideal for telecom, automotive, backplane, and other systems where high-voltage current monitoring is critical. The MAX4
This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pat
The Scientist and Engineer Guide to Digital Signal Processing——Second Edition by Steven W. Smith This book was written for scientists and engineers in a wide variety of fields: physics, bioengineering, geology, oceanography, mechanical and electrica
Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of an
Probability and Statistics by Example Volume 2, Markov Chains 2008 Cambridge Probability and Statistics are as much about intuition and problem solving as they are about theorem proving. Because of this, students can find it very difficult to make a
The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under
J2EE 圣经 Why should you read this book? First, because the authors know what they’re talking about and can explain it in ways that you can understand. Second, because it really does cover the fundamentals of J2EE incredibly well. The first five parts
This practical book provides a step-by-step approach to testing mission-critical applications for scalability and performance before they're deployed -- a vital topic to which other books devote one chapter, if that. Businesses today live and die by