Flylib.com
index_K
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]
KEY 2nd
key (see candidate key; see also foreign key; primary key; surrogate)
values are tuples
Knuth, Donald E.
Previous page
Table of content
Next page
Database in Depth: Relational Theory for Practitioners
ISBN: 0596100124
EAN: 2147483647
Year: 2006
Pages: 127
Authors:
C.J. Date
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Scope Risk
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Appendix A Selected Detail From the PERIL Database
Software Configuration Management
The DoD CM Process Model
A Practical Approach to Documentation and Configuration Status Accounting
Configuration Change Management
Appendix P Project Statement of Work
Appendix T Software Configuration Management Plan (SCMP)
Data Structures and Algorithms in Java
The Java Collections Framework Revisited
Binary Search
Tree Traversal
Advanced Searching and Sorting
Projects
Competency-Based Human Resource Management
Competency-Based HR Planning
Competency-Based Employee Recruitment and Selection
Competency-Based HR Management The Next Steps
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix C Examples of Life-Career Assessment Exercises
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Rotoscoping Techniques with Photoshop
Motion Matte Painting in Photoshop
Making Movies from Stills
Motion Titling Effects
Custom Scene Transitions
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Instrumenting .NET Applications with WMI
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies