Historically, a course on data structures has been a mainstay of most computerscience departments. Over the last 18 years, however, the focus of this coursehas broadened considerably. The topic of data structures has now been subsumed<br&g t;unde
From corporate IT departments to academic institutions, XML has become the language of choice for storing and transmitting data across diverse application domains. XQuery, an XML Query Language invented by the World Wide Web Consortium, offers a pow
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The worksho
本书的配套源代码。 本书英文原名:C++ Classes and Data Structures For sophomore- to junior-level courses in Data Structures or CS-2, offered in departments of Computer Science, CIS, IT, and Business. Most data structures texts are filled with so many technical detai
This book is an outgrowth of lectures in Mathematics 240, "Applied Stochastic Processes," which I have taught a number of times at Duke University. The majority of the students in the course are graduate students from departments other than mathem a
There are two approaches to undergraduate and graduate courses in linear statistical models and experimental design in applied statistics. One is a two-term sequence focusing on regression followed by ANOVA/Experimental design. Applied Linear Statis
一个电子商务网站的架设过程,从设计到编码,很细致。 PART 1 Phase I of Development ■ CHAPTER 1 Starting an E-Commerce Site ■ CHAPTER 2 Laying Out the Foundations ■ CHAPTER 3 Starting the TShirtShop Project ■ CHAPTER 4 Creating the Product Catalog:Part 1 ■ CHAPTER 5 Creating t
The R/3 System consists of a number of components that are completely integrated with one another. This integration allows the various departments and units of an enterprise to share and maintain the same information. Purchasing is a component of Ma
In today’s dynamic business environment, IT departments are under permanent pressure to meet two divergent requirements: to reduce costs and to support business agility with higher flexibility and responsiveness of the IT infrastructure. Grid and Cl
Since development first began on Spring in 2003, there's been a constant buzz about it in Java development publications and corporate IT departments. The reason is clear: Spring is a lightweight Java framework in a world of complex heavyweight archi
SQL语言艺术英文原版,DBA珍藏. For all the buzz about trendy IT techniques, data processing is still at the core of our systems, especially now that enterprises all over the world are confronted with exploding volumes of data. Database performance has become a
Editorial Reviews Product Descr iption New to P-H Signal Processing Series (Alan Oppenheim, Series Ed) this text covers the principles and applications of "multidimensional" and "image" digital signal processing. For Sr/grad level courses in image p
Editorial Reviews Product Descr iption New to P-H Signal Processing Series (Alan Oppenheim, Series Ed) this text covers the principles and applications of "multidimensional" and "image" digital signal processing. For Sr/grad level courses in image p
This book is intended for computer professionals and university students. Anyone who is interested in learning about RISC processors will benefit from this book, which has been structured so that it can be used for self-study. The reader is assumed
The motivation to write this book came a few years back when a colleague from one of the engineering departments (University of Louisiana at Lafayette) approached us with a problem that required modeling a real life data set which looked highly posi
The.Art.of.SQL SQL 语言艺术 For all the buzz about trendy IT techniques, data processing is still at the core of our systems, especially now that enterprises all over the world are confronted with exploding volumes of data. Database performance has beco
Clues derived from the locations connected to violent repeat criminal offenders, such as serial murderers, rapists, and arsonists, can be of significant assistance to law enforcement. Such information allows police departments to focus their activit