|
|
Books > Computing & IT > Computer programming > General
SQL Clearly Explained, Third Edition, provides an in-depth
introduction to using SQL (Structured Query Language). Readers will
learn not only SQL syntax, but also how SQL works. Although the
core of the SQL language remains relatively unchanged, the most
recent release of the SQL standard (SQL:2008) includes two sets of
extensions: 1) support for object-relational databases and 2)
support for XML. As a result, the set of standard SQL commands has
been greatly extended and this new edition takes that into account.
This new edition includes updated tips and tricks to reflect the
current concepts of SQL and XML standards; several new chapters
covering object-relational and XML extensions; and an ancillary
package that includes case studies, a syllabus, exams and more.
This book is intended for working SQL programmers, database
administrators, database designers, database analysts, and
application system developers as well as those who are developing
new features for database management systems who want to know about
user needs. This would include anyone working with electronic
content in the relational database context but also XML. Web
services, etc.
This book provides comprehensive coverage of the latest
trends/advances in subjective and objective quality evaluation for
traditional visual signals, such as 2D images and video, as well as
the most recent challenges for the field of multimedia quality
assessment and processing, such as mobile video and social media.
Readers will learn how to ensure the highest storage/delivery/
transmission quality of visual content (including image, video,
graphics, animation, etc.) from the server to the consumer, under
resource constraints, such as computation, bandwidth, storage
space, battery life, etc.
The Heinz Nixdorf Museum Forum (HNF) is the world's largest c-
puter museum and is dedicated to portraying the past, present and
future of information technology. In the "Year of Informatics 2006"
the HNF was particularly keen to examine the history of this still
quite young discipline. The short-lived nature of information
technologies means that individuals, inventions, devices,
institutes and companies"age" more rapidly than in many other
specialties. And in the nature of things the group of computer
pioneers from the early days is growing smaller all the time. To
supplement a planned new exhibit on "Software and Inform- ics" at
the HNF, the idea arose of recording the history of informatics in
an accompanying publication.
Mysearchforsuitablesourcesandauthorsveryquickly cameupwith the
right answer, the very rst name in Germany: Friedrich L. Bauer,
Professor Emeritus of Mathematics at the TU in Munich, one of the -
thers of informatics in Germany and for decades the indefatigable
author of the"Historical Notes" column of the journal Informatik
Spektrum. Friedrich L. Bauer was already the author of two works on
the history of informatics, published in different decades and in
different books. Both of them are notable for their knowledgeable,
extremely comp- hensive and yet compact style. My obvious course
was to motivate this author to amalgamate, supplement and
illustrate his previous work.
Exchange Server is necessary to support Outlook and SharePoint in
the enterprise messaging at virtually all Fortune 1000 firms.
Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and
Migration describes everything that you need to know about
designing, planning, and implementing an Exchange 2003 environment.
This book covers, in detail, the tools and techniques that
messaging system planners and administrators will require in order
to establish a functioning interoperability environment between
Exchange 2003 and previous versions of Exchange including Exchange
5.5 and Exchange 2000. The book describes various deployment
topologies and environments to cater for a multitude of different
organizational requirements. The book has been updated to reflect
the new changes that Microsoft introduced with Exchange 2003 and
SP1 and SP2 updates in relation to major architectural changes to
migrations techniques and other services such as RPC over HTTP and
journaling functionality.
* Details for consultants and system administrators to migrate from
older versions of Exchange 5.5 and Exchange 2000 to the latest
revisions of Exchange 2003
* Critical information on integration with Office 2003 and Windows
2003
* Based on actual implementations of the released version of
Exchange
2003 in larger enterprise environments
* NEW! Cover critical updates to Exchange 2003 with updates from
SP1 and SP2, such as new implementations of RPC over HTTP and cross
site migrations
* NEW! Coverage of the Exchange journaling feature updates in
Exchange
2003 SP1 and SP2
"The book...has enough depth for even a seasoned professional to
pick up enough tips to pay back the price of the book many times
over." -Dr. Paul Dorsey, President, Dulcian, Inc., Oracle Magazine
PL/SQL Developer of the Year 2007, and President Emeritus, New York
Oracle Users Group "This is a fascinating guide into the world of
Oracle SQL with an abundance of well-collected examples. Without a
doubt, this book is helpful to beginners and experts alike who seek
alternative ways to resolve advanced scenarios."-Oleg
Voskoboynikov, Ph.D., Database Architect The World's #1 Hands-On
Oracle SQL Workbook-Fully Updated for Oracle 11g Crafted for
hands-on learning and tested in classrooms worldwide, this book
illuminates in-depth every Oracle SQL technique you'll need. From
the simplest query fundamentals to regular expressions and with
newly added coverage of Oracle's powerful new SQL Developer tool,
you will focus on the tasks that matter most. Hundreds of
step-by-step, guided lab exercises will systematically strengthen
your expertise in writing effective, high-performance SQL. Along
the way, you'll acquire a powerful arsenal of useful skills-and an
extraordinary library of solutions for your real-world challenges
with Oracle SQL. Coverage includes 100% focused on Oracle SQL for
Oracle 11 g, today's #1 database platform-not "generic" SQL! Master
all core SQL techniques including every type of join such as
equijoins, self joins, and outer joins Understand Oracle functions
in depth, especially character, number, date, timestamp, interval,
conversion, aggregate, regular expressions, analytical, and more
Practice all types of subqueries, such as correlated and scalar
subqueries, and learn about set operators and hierarchical queries
Build effective queries and learn fundamental Oracle SQL Developer
and SQL*Plus skills Make the most of the Data Dictionary and create
tables, views, indexes, and sequences Secure databases using Oracle
privileges, roles, and synonyms Explore Oracle 11 g's advanced data
warehousing features Learn many practical tips about performance
optimization, security, and architectural solutions Avoid common
pitfalls and understand and solve common mistakes For every
database developer, administrator, designer, or architect,
regardless of experience!
For a long time, there has been a need for a practical,
down-to-earth developers book for the Java Cryptography Extension.
I am very happy to see there is now a book that can answer many of
the technical questions that developers, managers, and researchers
have about such a critical topic. I am sure that this book will
contribute greatly to the success of securing Java applications and
deployments for e-business. --Anthony Nadalin, Java Security Lead
Architect, IBM
For many Java developers and software engineers, cryptography is an
"on-demand" programming exercise, where cryptographic concepts are
shelved until the next project requires renewed focus. But
considerations for cryptography must be made early on in the design
process and it s imperative that developers know what kinds of
solutions exist.
One of Java s solutions to help bridge the gap between academic
research and real-world problem solving comes in the form of a
well-defined architecture for implementing cryptographic solutions.
However, to use the architecture and its extensions, it is
important to recognize the pros and cons of different cryptographic
algorithms and to know how to implement various devices like key
agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at
the level that developers need to know to work with the JCE and
with their own applications but that doesn t overwhelm by packing
in details unimportant to the busy professional. The JCE is
explored using numerous code examples and instructional detail,
with clearly presented sections on each aspect of the Java library.
An online open-source cryptography toolkit and the code for all of
the examples further reinforces the concepts covered within the
book. No other resource presents so concisely or effectively the
exact material needed to begin utilizing the JCE.
* Written by a seasoned veteran of both cryptography and
server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric
ciphers, message digests, message authentication codes, digital
signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the
examples in the book, open-source cryptographic toolkits, and
further resources"
This book reviews the algorithms for processing geometric data,
with a practical focus on important techniques not covered by
traditional courses on computer vision and computer graphics.
Features: presents an overview of the underlying mathematical
theory, covering vector spaces, metric space, affine spaces,
differential geometry, and finite difference methods for
derivatives and differential equations; reviews geometry
representations, including polygonal meshes, splines, and
subdivision surfaces; examines techniques for computing curvature
from polygonal meshes; describes algorithms for mesh smoothing,
mesh parametrization, and mesh optimization and simplification;
discusses point location databases and convex hulls of point sets;
investigates the reconstruction of triangle meshes from point
clouds, including methods for registration of point clouds and
surface reconstruction; provides additional material at a
supplementary website; includes self-study exercises throughout the
text.
Mirror Images: Popular Culture and Education is the first
international and multidisciplinary effort to coalesce knowledge on
education and popular culture studied as broad phenomena and not as
a collection of case studies. In this volume, popular culture has
been thematically treated as it appears in a variety of media,
including movies, digital games, advertising, television, popular
songs, and the internet. The book considers education in both
formal and informal settings, and looks critically at the accepted
dichotomy between education and popular culture. It argues that
popular culture is capable of educating and that education shares
many characteristics with popular culture, and tries to overcome
these dichotomous relationships while also trying to clarify the
reciprocal effects between the two. The book calls disciplinary and
media boundaries into question in an effort to widen the
possibility of enlarging the vocabulary and the verbs of all that
stays unnamed by what is considered knowledge.
While many architects use PHP for projects, they are often not
aware of the power of PHP in creating enterprise-level
applications. This book covers the latest version of PHP - version
5 -- and focuses on its capabilities within a multi-tier
application framework. It contains numerous coding samples and
commentaries on them. A chapter discusses object orientation in PHP
as it applies to the multi-tier architecture and other chapters
discuss HTTP and SOAP, the two communication protocols most useful
in tying together multiple layers. There is also coverage of
database design and query construction as well as information about
tricks you can use in generating user interfaces.
-Covers PHP as it relates to developing software in a multi-tier
environment-a crucial aspect of developing robust software with low
cost and ease of use as design goals.
-Makes extensive use of Simple Object Access Protocol (SOAP) and
Web Services as implemented in PHP and NuSOAP.
-Shows precisely how to make use of the InnoDB table type newly
available in MySQL. InnoDB supports true referential integrity and
row-level locking.
-An application example (a multi-currency bookkeeping application)
runs throughout the book, showing various PHP capabilities as well
as the database interaction.
-An accompanying web site includes the source code for all of the
examples and the sample download.
While women maintain an increased visibility in the games culture,
the issues involving gender in computing gaming is still relevant;
and it is evident that the industry could benefit from the
involvement of women in all aspects from consumer to developer.
Gender Divide and the Computer Game Industry takes a look at the
games industry from a gendered perspective and highlights the
variety of ways in which women remain underrepresented in this
industry. This reference source provides a comprehensive overview
on the issue of gender, computer games, and the ICT sector. It
supplies students and academics in numerous disciplines with the
concerns of the computer games industry, male dominated
occupations, and the complexity of gender in the workforce.
"Software Defined Networks" discusses the historical networking
environment that gave rise to SDN, as well as the latest advances
in SDN technology. The book gives you the state of the art
knowledge needed for successful deployment of an SDN, including:
How to explain to the non-technical business decision makers in
your organization the potential benefits, as well as the risks, in
shifting parts of a network to the SDN modelHow to make intelligent
decisions about when to integrate SDN technologies in a networkHow
to decide if your organization should be developing its own SDN
applications or looking to acquire these from an outside vendorHow
to accelerate the ability to develop your own SDN application, be
it entirely novel or a more efficient approach to a long-standing
problem
Discusses the evolution of the switch platforms that enable SDN
Addresses when to integrate SDN technologies in a networkProvides
an overview of sample SDN applications relevant to different
industriesIncludes practical examples of how to write SDN
applications
 |
Privacy and Identity Management for Life
- 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers
(Hardcover, 2010 ed.)
Michele Bezzi, Penny Duquenoy, Simone Fischer-Hubner, Marit Hansen, Ge Zhang
|
R1,441
Discovery Miles 14 410
|
Ships in 18 - 22 working days
|
|
|
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe-
formation Society, the need for individuals to protect their
autonomy and retain control over their personal information is
becoming more and more important. Today,
informationandcommunicationtechnologies-andthepeopleresponsible for
making decisions about them, designing, and implementing
them-scarcely consider those requirements, thereby potentially
putting individuals' privacy at risk. The increasingly
collaborative character of the Internet enables anyone to compose
services and contribute and distribute information. It may become
hard for individuals to manage and control information that
concerns them and particularly how to eliminate outdated or
unwanted personal information, thus
leavingpersonalhistoriesexposedpermanently.
Theseactivitiesraisesubstantial new challenges for personal privacy
at the technical, social, ethical, regulatory, and legal levels:
How can privacy in emerging Internet applications such as c-
laborative scenarios and virtual communities be protected? What
frameworks and technical tools could be utilized to maintain
life-long privacy? DuringSeptember3-10,2009,
IFIP(InternationalFederationforInformation
Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT
Misuseand theLaw),11. 4(NetworkSecurity)and11.
6(IdentityManagement)heldtheir5th
InternationalSummerSchoolincooperationwiththeEUFP7integratedproject
PrimeLife in Sophia Antipolis and Nice, France. The focus of the
event was on privacy and identity managementfor emerging Internet
applications throughout a person's lifetime. The aim of the IFIP
Summer Schools has been to encourage young a- demic and industry
entrants to share their own ideas about privacy and identity
management and to build up collegial relationships with others. As
such, the Summer Schools havebeen introducing participants to the
social implications of information technology through the process
of informed discussion.
Graphics and game developers must learn to program for mobility.
This book will teach you how.
"This book - written by some of the key technical
experts...provides a comprehensive but practical and easily
understood introduction for any software engineer seeking to
delight the consumer with rich 3D interactive experiences on their
phone. Like the OpenGL ES and M3G standards it covers, this book is
destined to become an enduring standard for many years to come."
- Lincoln Wallen, CTO, Electronic Arts, Mobile
This book is an escalator, which takes the field to new levels.
This is especially true because the text ensures that the topic is
easily accessible to everyone with some background in computer
science...The foundations of this book are clear, and the authors
are extremely knowledgeable about the subject.
- Tomas Akenine-Moller, bestselling author and Professor of
Computer Science at Lund University
"This book is an excellent introduction to M3G. The authors are all
experienced M3G users and developers, and they do a great job of
conveying that experience, as well as plenty of practical advice
that has been proven in the field."
- Sean Ellis, Consultant Graphics Engineer, ARM Ltd
The exploding popularity of mobile computing is undeniable. From
cell phones to portable gaming systems, the global demand for
multifunctional mobile devices is driving amazing hardware and
software developments. 3D graphics are becoming an integral part of
these ubiquitous devices, and as a result, Mobile 3D Graphics is
arguably the most rapidly advancing area of the computer graphics
discipline.
Mobile 3D Graphics is about writing real-time 3D graphics
applications for mobile devices. The programming interfaces
explained and demonstrated in this must-have reference enable
dynamic 3D media on cell phones, GPS systems, portable gaming
consoles and media players.
The text begins by providing thorough coverage of background
essentials, then presents detailed hands-on examples, including
extensive working code in both of the dominant mobile APIs, OpenGL
ES and M3G.
C/C++ and Java Developers, graphic artists, students, and
enthusiasts would do well to have a programmable mobile phone on
hand to try out the techniques described in this book.
The authors, industry experts who helped to develop the OpenGL ES
and M3G standards, distill their years of accumulated knowledge
within these pages, offering their insights into everything from
sound mobile design principles and constraints, to efficient
rendering, mixing 2D and 3D, lighting, texture mapping, skinning
and morphing.
Along the way, readers will benefit from the hundreds of included
tips, tricks and caveats.
*Written by experts at Nokia whose workshops at industry
conferences are blockbusters
*The programs used in the examples are featured in thousands of
professional courses each year
*Extensive working sample code is presented throughout the book and
on the companion website"
In e-learning, the learner spends a significant amount of time
online, interacting with Web-based applications. This interaction
carries tremendous weight in the learning process, because it
directly influences the way the learner receives, comprehends, and
ultimately retains information. Affective, Interactive, and
Cognitive Methods for E-Learning Design: Creating an Optimal
Education Experience brides a current gap in e-learning literature
through focus on the study and application of human computer
interaction principles in the design of online education in order
to offer students the optimal learning experience. This advanced
publication gives insight into the most significant design issues
encountered and offers solutions to help in the creation of an
ideal learning environment.
Each day, new applications and methods are developed for utilizing
technology in the field of medical sciences, both as diagnostic
tools and as methods for patients to access their medical
information through their personal gadgets. However, the maximum
potential for the application of new technologies within the
medical field has not yet been realized. Mobile Devices and Smart
Gadgets in Medical Sciences is a pivotal reference source that
explores different mobile applications, tools, software, and smart
gadgets and their applications within the field of healthcare.
Covering a wide range of topics such as artificial intelligence,
telemedicine, and oncology, this book is ideally designed for
medical practitioners, mobile application developers, technology
developers, software experts, computer engineers, programmers, ICT
innovators, policymakers, researchers, academicians, and students.
Visual Knowledge Modeling for Semantic Web Technologies: Models and
Ontologies aims to make visual knowledge modeling available to
individuals as an intellectual method and a set of tools at
different levels of formalization. It aims to provide to its
readers a simple, yet powerful visual language to structure their
thoughts, analyze information, transform it to personal knowledge,
and communicate information to support knowledge acquisition in
collaborative activities.
Through a series of step-by-step tutorials and numerous hands-on
exercises, this book aims to equip the reader with both a good
understanding of the importance of space in the abstract world of
engineers and the ability to create a model of a product in virtual
space - a skill essential for any designer or engineer who needs to
present ideas concerning a particular product within a professional
environment. The exercises progress logically from the simple to
the more complex; while Solid Works or NX is the software used, the
underlying philosophy is applicable to all modeling software. In
each case, the explanation covers the entire procedure from the
basic idea and production capabilities through to the real model;
the conversion from 3D model to 2D manufacturing drawing is also
clearly explained. Topics covered include modeling of prism,
axisymmetric, symmetric and sophisticated shapes; digitization of
physical models using modeling software; creation of a CAD model
starting from a physical model; free form surface modeling;
modeling of product assemblies following bottom-up and top-down
principles; and the presentation of a product in accordance with
the rules of technical documentation. This book, which includes
more than 500 figures, will be ideal for students wishing to gain a
sound grasp of space modeling techniques. Academics and
professionals will find it to be an excellent teaching and research
aid, and an easy-to-use guide.
In recent years there has been an explosion of research into linear
programming, as well as further steady advances in integer
programming. This research has been reported in the research
literature but there has been little done from the view of a
"combined whole". This book aims to overcome this. With an
international authorship of contributors from acknowledged experts
in their field, this book provides a clear exposition on such
topics as simplex algorithms, and interior point algorithms, both
from a theoretical and a computational viewpoint. Surveying recent
research that is currently only available in journals this topical
book will be of interest not only in the field of mathematics, but
also in computer science and operations research as well.
|
|