Explore our comprehensive collection of books, articles, digital media, and more
Improving security performance on the banking system distributed database \
Principles of distributed database systems /
Distributed systems : concepts and design /
Distributed systems : principles and paradigms /
Distributed computing : principles, algorithms, and systems /
Parallel and distributed logic programming : towards the design of a framework for the next generation database machines /
Databases and database systems : concepts and issues /
Distributed systems : an algorithmic approach /
OCP Oracle database 11g : administration II exam guide exam 1Z0-053 /
Database concepts /
Database systems : the complete book /
Fundamentals of database systems /
Database solutions : a step-by-step guide to building databases /
Modern database management /
An introduction to database systems /
Database system concepts /
Oracle database 11g PL/SQL programming /
Principles of data mining /
Microsoft Access 2013 : a case approach /
Microcomputer data-base management /
Database and XML technologies : 4th International XML Database Symposium, XSym 2006, Seoul, Korea, September 10-11, 2006 : proceedings /
E-business /
Computer data-base organization /
Intelligent E-commerce system development using an intelligent agent and natural language understanding /
Microsoft Access 2002 /
Fundamentals of relational database management systems /
Lab Manual Oracle 10g Data Base: Data Base Management System \
GO! with Microsoft Access 2010 Introductory /
Database design, application development, and administration /
Database processing : fundamentals, design and implementation /
Investigating distributed database deadlock based on attribute level \
Energy-aware virtual network embedding approach for distributed cloud /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Web application security of E-Money transfer systems \
A method for improving the Bluetooth key exchange security /
Developing a robust digital image watermark by using frequency and spatial domains \
Enhanced Method for RSA cryptoststem algorithm \
Estimation of null value in relational data base system using K-nearest neighbor and decision tree \
Proposed method of factorization analysis to break the RSA algorithm \
Improving the watermarking performance using combined redundant discrete wavelet transform and contourlet transform scheme \