Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Databases > Web / Internet databases
This authoritative book teaches IT professionals responsible for
Exchange messaging systems how to efficiently manage the program's
many and complex system capabilities and features. Once you've
designed and implemented a messaging system, the bulk of the
day-to-day work involves monitoring to ensure an optimum traffic
flow, accomplished by continuously reviewing and fine-tuning dozens
of system specifications and components. Monitoring and Managing
Microsoft Exchange 2003 teaches readers proven and innovative
techniques, tools, and procedures for managing and optimizing
systems of all sizes and types built on Exchange 2003. Based on the
author's own twenty years of messaging system experience and the
collective experience of HP, the leading implementer of Exchange
Server systems, this book will be a leading resource for Exchange
administrators and designers.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The Only Official Guide to the #1 Personal Finance Software Take control of your personal finances using the best practices and time-saving tips in Quicken(R) 2018 for Windows The Official Guide! Find out the most effective methods for tracking your income, expenses, savings, transactions, investments, and so much more. Endorsed by the makers of Quicken, this practical resource shows you, step by step, how to take full advantage of the software's powerful features, including the Quicken mobile app. You'll also get professional advice to help you reduce debt, stay on budget, save money, invest wisely, and plan for a secure financial future. -Customize Quicken for your preferences-Track income and expenses-Automate transactions and tasks-Record bank and credit card transactions-Use online banking features-Reconcile checking, savings, and credit card accounts-Track investments and optimize your portfolio-Monitor your assets, loans, and net worth-Evaluate your financial position-Reduce debt, save money, and plan for retirement-Simplify tax preparation and maximize deductions-Create Quicken reports
An Industrial IoT Approach for Pharmaceutical Industry Growth, Volume Two uses an innovative approach to explore how the Internet of Things (IoT) and big data can improve approaches and make discoveries. Rapid growth of the IoT has encouraged many companies in the manufacturing sector to make use of this technology to unlock its potential. Using clear language and real-world case studies, this book discusses systems level from both a human-factors point-of-view and the perspective of networking, databases, privacy and anti-spoofing. The wide variety in topics presented offers multiple perspectives on how to integrate the Internet of Things into pharmaceutical manufacturing. This book represents a useful resource for researchers in pharmaceutical sciences, information and communication technologies, and those who specialize in healthcare and pharmacovigilance.
Generating huge interest and backed by the global WorldWideWeb consortium the semantic web is the key initiative driving the future of the World Wide Web. Towards the Semantic Web focuses on the application of Semantic Web technology and ontologies in particular to electronically available information to improve the quality of knowledge management in large and distributed organizations. Ontologies are formal structures supporting knowledge sharing and reuse. They can be used to represent explicitly the semantics of structured and semi-structured information which enable sophisticated automatic support for acquiring, maintaining and accessing information. Covering the key technologies for the next generation of the WWW, this book is an excellent mixture of theory, tools and applications in an important area of WWW research.
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The most efficient way to learn J2EE programming techniquesTwo Oracle experts demonstrate techniques for working within J2EE and JDeveloper for the thousands of developers currently using Oracle Forms and the PL/SQL language. Oracle is shifting their focus towards Java technologies, so you will need to know how to use the Java-based J2EE and JDeveloper. The book includes explanations of the Application Development Framework (ADF). Throughout, high-level and low-level Forms concepts are related to Java concepts so that you can become comfortable with the new terminology. Covers the new components required when developing and deploying a J2EE application Special mentions in the text describe how JDeveloper techniques translate to PL/SQL or Oracle Forms Covers JDeveloper 10.1.3 and ADF Faces All code and examples will be available online
Here are the proceedings of the 4th International Workshop on Principles and Practice of Semantic Web Reasoning, PPSWR 2006. The book presents 14 revised full papers together with 1 invited talk and 6 system demonstrations, addressing major aspects of semantic Web research, namely forms of reasoning with a strong interest in rule-based languages and methods. Coverage includes theoretical work on reasoning methods, concrete reasoning methods and query languages, and practical applications.
Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness
Managing vagueness/fuzziness is starting to play an important role in Semantic Web research, with a large number of research efforts underway. Foundations of Fuzzy Logic and Semantic Web Languages provides a rigorous and succinct account of the mathematical methods and tools used for representing and reasoning with fuzzy information within Semantic Web languages. The book focuses on the three main streams of Semantic Web languages: Triple languages RDF and RDFS Conceptual languages OWL and OWL 2, and their profiles OWL EL, OWL QL, and OWL RL Rule-based languages, such as SWRL and RIF Written by a prominent researcher in this area, the book is the first to combine coverage of fuzzy logic and Semantic Web languages. The first part of the book covers all the theoretical and logical aspects of classical (two-valued) Semantic Web languages. The second part explains how to generalize these languages to cope with fuzzy set theory and fuzzy logic. With an extensive bibliography, this book provides in-depth insight into fuzzy Semantic Web languages for non-fuzzy set theory and fuzzy logic experts. It also helps researchers of non-Semantic Web languages get a better understanding of the theoretical fundamentals of Semantic Web languages.
This book presents the design, implementation and validation of a value-added supportive infrastructure for Semantic Web based business application services across mobile and fixed networks, applied to an emergency healthcare application. This infrastructure has been realized by the CASCOM European research project. For end users, the CASCOM framework provides seamless access to semantic Web services anytime, anywhere, by using any mobile computing device. For service providers, CASCOM offers an innovative development platform for intelligent and mobile business application services in the Semantic Web. The essential approach of CASCOM is the innovative inter-disciplinary combination of intelligent agent, Semantic Web, peer-to-peer, and mobile computing technology. Conventional peer-to-peer computing environments are extended with components for mobile and wireless communication. Semantic Web services are provided by peer software agents, which exploit the coordination infrastructure to efficiently operate in highly dynamic environments. The generic coordination support infrastructure includes efficient communication means, support for context-aware adaptation techniques, as well as flexible, resource-efficient service discovery, execution, and composition planning. The book has three main parts. First, the state-or-the-art is reviewed in related research fields. Then, a full proof-of-concept design and implementation of the generic infrastructure is presented. Finally, quantitative and qualitative analysis is presented on the basis of the field trials of the emergency application. |
You may like...
Blockchain Technology for Global Social…
Jane Thomason, Sonja Bernhardt, …
Hardcover
R5,107
Discovery Miles 51 070
Ambient Intelligence Services in IoT…
Dmitry Korzun, Ekaterina Balandina, …
Hardcover
R5,103
Discovery Miles 51 030
IoT and Cloud Computing Advancements in…
Ram Shringar Rao, Vishal Jain, …
Hardcover
R6,235
Discovery Miles 62 350
Innovations, Developments, and…
Miltiadis D Lytras, Naif Aljohani, …
Hardcover
R6,418
Discovery Miles 64 180
|