Applying and Extending Oracle Spatial
This book is an advanced practical guide to applying and extending Oracle Spatial. This book is for existing users of Oracle and Oracle Spatial who have, at a minimum, basic operational experience of using Oracle or an equivalent database. Advanced skills are not required....
Finance Bundling and Finance Transformation: Shared Services Next Level
In managerial literature the challenges of ramping-up, growing and enhancing a (Finance) Shared Services Organization are regularly neglected. Therefore, the compilation will address two objectives: First, based on a generic phase model of an SSO’s development, frequently arising questions related to the management of SSOs shall be...
Group Policy: Fundamentals, Security, and the Managed Desktop
The Ultimate Book on Group Policy
Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...
Getting Started with SQL Server 2012 Cube Development
Written specifically for SQL Server developers, this is a great primer on Analysis Services and cube development. With lots of practical exercises and real-world scenarios, you'll be up and running in no time.
Learn how to develop a complete business intelligence solution using SQL Server...
Robotics in General Surgery
Robotics in General Surgery provides a comprehensive review of the current applications of the robotic platform in all the general surgery subspecialties. Additionally, for each subspecialty it serves as a procedure-oriented instruction manual in terms of technical details of procedures, including fundamentals of robot positioning and...
Quantum Attacks on Public-Key Cryptosystems
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...
Deep Sequencing Data Analysis (Methods in Molecular Biology)
The new genetic revolution is fuelled by Deep Sequencing (or Next Generation Sequencing) apparatuses which, in essence, read billions of nucleotides per reaction. Effectively, when carefully planned, any experimental question which can be translated into reading nucleic acids can be applied.In Deep Sequencing Data...
Massively Parallel Evolutionary Computation on GPGPUs (Natural Computing Series)
Evolutionary algorithms (EAs) are metaheuristics that learn from natural collective behavior and are applied to solve optimization problems in domains such as scheduling, engineering, bioinformatics, and finance. Such applications demand acceptable solutions with high-speed execution using finite computational resources. Therefore, there have...
This book will help you use the amazing resource that is Google Maps to your own ends. From showing maps on mobiles to creating GIS applications, this lively, recipe-packed guide is all you need.
Add to your website's functionality by utilizing Google Maps' power
|Result Page: Previous 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Next |