Catálogo de publicaciones

Compartir en
redes sociales


Navegación

Tipo

Acceso

Plataformas

Temática

Mostrando 10 de 11.986 registro(s)

Filtros temática quitar todos

Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design

Más información

978-1-55860-672-2 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2001 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  


Information Modeling and Relational Databases provides an introduction to ORM (Object Role Modeling)-and much more. In fact, it's the only book to go beyond introductory coverage and provide all of the in-depth instruction you need to transform knowledge from domain experts into a sound database design.


Inside, ORM authority Terry Halpin blends conceptual information with practical instruction that will let you begin using ORM effectively as soon as possible. Supported by examples, exercises, and useful background information, his step-by-step approach teaches you to develop a natural-language-based ORM model and then, where needed, abstract ER and UML models from it. This book will quickly make you proficient in the modeling technique that is proving vital to the development of accurate and efficient databases that best meet real business objectives.

* The most in-depth coverage of Object Role Modeling available anywhere-written by a pioneer in the development of ORM.
* Provides additional coverage of Entity Relationship (ER) modeling and the Unified Modeling Language-all from an ORM perspective.
* Intended for anyone with a stake in the accuracy and efficacy of databases: systems analysts, information modelers, database designers and administrators, instructors, managers, and programmers.
* Explains and illustrates required concepts from mathematics and set theory.
* Via a companion Web site, provides answers to exercises, appendices covering the history of computer generations, subtype matrices, and advanced SQL queries, and links to downloadable ORM tools.


Information Modeling and Relational Databases

Más información

978-0-12-373568-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2008 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

Information Modeling and Relational Databases, second edition, provides an introduction to ORM (Object-Role Modeling)and much more. In fact, it is the only book to go beyond introductory coverage and provide all of the in-depth instruction you need to transform knowledge from domain experts into a sound database design. This book is intended for anyone with a stake in the accuracy and efficacy of databases: systems analysts, information modelers, database designers and administrators, and programmers.

Terry Halpin, a pioneer in the development of ORM, blends conceptual information with practical instruction that will let you begin using ORM effectively as soon as possible. Supported by examples, exercises, and useful background information, his step-by-step approach teaches you to develop a natural-language-based ORM model, and then, where needed, abstract ER and UML models from it. This book will quickly make you proficient in the modeling technique that is proving vital to the development of accurate and efficient databases that best meet real business objectives.



*Presents the most indepth coverage of Object-Role Modeling available anywhere, including a thorough update of the book for ORM2, as well as UML2 and E-R (Entity-Relationship) modeling.

*Includes clear coverage of relational database concepts, and the latest developments in SQL and XML, including a new chapter on the impact of XML on information modeling, exchange and transformation.

* New and improved case studies and exercises are provided for many topics.

* The book's associated web site provides answers to exercises, appendices, advanced SQL queries, and links to downloadable ORM tools.

Information Security and Cryptology: ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers

Más información

ISBNs: 978-3-540-26226-8 (impreso) 978-3-540-32083-8 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas  


Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers

Más información

ISBNs: 978-3-540-24015-0 (impreso) 978-3-540-31815-6 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas  


Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers

Más información

ISBNs: 978-3-540-31012-9 (impreso) 978-3-540-33153-7 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Cobertura temática: Ciencias de la computación e información - Ciencias químicas - Ciencias biológicas  


Information Systems Development: Advances in Theory, Practice, and Education

Más información

ISBNs: 978-0-387-25026-7 (impreso) 978-0-387-28809-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ingeniería eléctrica, electrónica e informática - Agricultura, silvicultura y pesca - Educación  


libros Acceso Abierto
Agregar a Mi catálogo

Information Theory in Molecular Evolution: Information Theory in Molecular Evolution

Más información

978-3-0365-1212-9 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias naturales - Ciencias biológicas - Ciencias de la salud - Medios de comunicación  


Information Visualization: Perception for Design

Más información

978-1-55860-819-1 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2004 ScienceDirect

Cobertura temática: Ciencias biológicas - Ciencias agrícolas y veterinarias - Medios de comunicación  

Most designers know that yellow text presented against a blue background reads clearly and easily, but how many can explain why, and what really are the best ways to help others and ourselves clearly see key patterns in a bunch of data?

This book explores the art and science of why we see objects the way we do. Based on the science of perception and vision, the author presents the key principles at work for a wide range of applications--resulting in visualization of improved clarity, utility, and persuasiveness. The book offers practical guidelines that can be applied by anyone: interaction designers, graphic designers of all kinds (including web designers), data miners, and financial analysts.

*First work to use the science of perception to help serious designers and analysts optimize understanding and perception of their data visualizations.

* Major revision of this classic work, with a new chapter on visual thinking, new sections on face perception and flow visualization, and a much expanded chapter on color and color sequences.

*New to this edition is the full color treatment throughout, to better display over 400 illustrations.

Infosec Management Fundamentals

Más información

978-0-12-804172-7 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2015 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas  

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities.

  • Teaches ISO/IEC 27000 best practices on information security management
  •  Discusses risks and controls within the context of an overall information security management system (ISMS)
  • Provides foundational information for experienced professionals as well as those new to the industry.

InfoSecurity 2008 Threat Analysis

Más información

978-1-59749-224-9 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2008 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.

Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.

* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence