![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > Database software > General
The book provides a unified presentation of algorithms for association rule and sequential pattern discovery. For both mining problems, the presentation relies on the lattice structure of the search space. All algorithms are built as processes running on this structure. Proving their properties takes advantage of the mathematical properties of the structure. Mining for association rules and sequential patterns is known to be a problem with large computational complexity. The issue of designing efficient parallel algorithms should be considered as critical. Most algorithms in the book are devised for both sequential and parallel execution. Parallel algorithm design takes advantage of the lattice structure of the search space. Partitioning is performed via lattice recursive bisection. Database partitioning is also used as an additional source of parallelism.Part of the motivation for writing this book was postgraduate teaching. Since the book only assumes elementary mathematical knowledge in the domains of lattices, combinatorial optimization, probability calculus, and statistics, it is fit for use by undergraduate students as well. The algorithms are described in a C-like pseudo programming language. The computations are shown in great detail. This makes the book also fit for use by implementers: computer scientists in many domains as well as industry engineers.
Computersystemsresearch is heavilyinfluencedby changesincomputertechnol- ogy. As technology changes alterthe characteristics ofthe underlying hardware com- ponents of the system, the algorithms used to manage the system need to be re- examinedand newtechniques need to bedeveloped. Technological influencesare par- ticularly evident in the design of storage management systems such as disk storage managers and file systems. The influences have been so pronounced that techniques developed as recently as ten years ago are being made obsolete. The basic problem for disk storage managers is the unbalanced scaling of hard- warecomponenttechnologies. Disk storage managerdesign depends on the technolo- gy for processors, main memory, and magnetic disks. During the 1980s, processors and main memories benefited from the rapid improvements in semiconductortechnol- ogy and improved by several orders ofmagnitude in performance and capacity. This improvement has not been matched by disk technology, which is bounded by the me- chanics ofrotating magnetic media. Magnetic disks ofthe 1980s have improved by a factor of 10in capacity butonly a factor of2 in performance. This unbalanced scaling ofthe hardware components challenges the disk storage manager to compensate for the slower disks and allow performance to scale with the processor and main memory technology. Unless the performance of file systems can be improved over that of the disks, I/O-bound applications will be unable to use the rapid improvements in processor speeds to improve performance for computer users. Disk storage managers must break this bottleneck and decouple application perfor- mance from the disk.
Real Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope with bigger workloads and more users. Many books limit themselves by conceptualizing and theorizing about RAC technology, but this book is the first to portray implementing and administering an Oracle 10"g" RAC system in a Linux environment. This book features basic concepts underlying Linux and Oracle RAC, design strategies, hardware procurement and configuration, and many other topics. The RAC-specific technologies described include configuration of the interconnect, OCFS, ASM, Cluster Ready Services, and Grid Control. The Oracle features RMAN and Data Guard are also discussed, along with available hardware options. The authors include practical examples and configuration information, so that upon reading this book, youll be armed with the information you need to build an Oracle RAC database on Linux, whether it is on a single laptop or a 64-node Itanium cluster.
School library media specialists will find this concepts-based approach to teaching electronic literacy an indispensable basic tool for instructing students and teachers. It provides step-by-step instruction on how to find and evaluate needed information from electronic databases and the Internet, how to formulate successful electronic search strategies and retrieve relevant results, and how to interpret and critically analyze search results. The chapters contain a suggested lesson plan and sample assignments for the school library media specialist to use in teaching electronic literacy skills to students and teachers. Dr. Kathleen W. Craver, a nationally recognized specialist in technology in the library media center, identifies the universal concepts of electronic literacy and provides the library media specialist with the rationales, background, methods, and model assignments to teach students and faculty to become proficient and critical users of electronic information technologies. At the beginning of each chapter, Craver furnishes a rationale for change that school library media specialists can use to justify these essential modifications to their teaching curriculum. Chapters include: The Structure of Electronic Information; The Common Vocabulary and Characteristics of Electronic Resources; Formulating Electronic Search Strategies; The Physical Arrangement of Information; Choosing Appropriate On-Site and Remote Electronic Libraries; Choosing Appropriate Electronic Databases; Internet Search Tools and Techniques; Identifying Electronic Resources; On-Site Electronic Records Access; Using Primary Electronic Resources; and Evaluating Electronic Sources. The Appendix contains a listof principal vendors. A glossary of terms and a bibliography of suggested reading complete the work. This basic teaching guide provides the media specialist with all the tools necessary to help novice users to be successful and avoid the frustration of electronic database searching and retrieval.
This book describes an interactive statistical computing environment called 1 XploRe. As the name suggests, support for exploratory statistical analysis is given by a variety of computational tools. XploRe is a matrix-oriented statistical language with a comprehensive set of basic statistical operations that provides highly interactive graphics, as well as a programming environ ment for user-written macros; it offers hard-wired smoothing procedures for effective high-dimensional data analysis. Its highly dynamic graphic capa bilities make it possible to construct student-level front ends for teaching basic elements of statistics. Hot keys make it an easy-to-use computing environment for statistical analysis. The primary objective of this book is to show how the XploRe system can be used as an effective computing environment for a large number of statistical tasks. The computing tasks we consider range from basic data matrix manipulations to interactive customizing of graphs and dynamic fit ting of high-dimensional statistical models. The XploRe language is similar to other statistical languages and offers an interactive help system that can be extended to user-written algorithms. The language is intuitive and read ers with access to other systems can, without major difficulty, reproduce the examples presented here and use them as a basis for further investigation.
This monograph describes an innovative prototyping framework for data and knowledge intensive systems. The proposed approach will prove especially useful for advanced and research-oriented projects that aim to develop a traditional database perspective into fully-fledged advanced database approaches and knowledge engineering technologies. The book is organised in two parts. The first part, comprising chapters 1 to 4, provides an introduction to the concept of prototyping, to database and knowledge-based technologies, and to the main issues involved in the integration of data and knowledge engineering. The second part, comprising chapters 5 to 12, illustrates the proposed approach in technical detail. Audience: This volume will be of interest to researchers in the field of databases and knowledge engineering in general, and for software designers and knowledge engineers who aim to expand their expertise in data and knowledge intensive systems.
This book provides the foundation and understanding necessary for proper design of databases for today's distributed and multi-database architectures. Introductory chapters help novices understand essential topics such as SQL, relational databases, transaction processing, and deadlock detection, while subsequent sections dealing with homogeneous, distributed databases, heterogeneous multi-databases, and federated databases enable readers to understand the complexities of distributed database design. Packed with over 200 illustrations, 50 equations, and two full chapters of examples.
The use of parallel processing technology in the next generation of
Database Management Systems (DBMSs) makes it possible to meet new
and challenging requirements. Database technology in rapidly
expanding new application areas brings unique challenges such as
increased functionality and efficient handling of very large
heterogeneous databases.
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.
Sybase Adaptive Server Enterprise 15 is a high-performance, mission-critical database management system designed to meet the increasing demands of large databases and high-transaction volumes, while providing a cost-effective database management system. "The Official New Features Guide to Sybase ASE 15" focuses on the many enhancements in Sybase ASE 15 including semantic partitions, computed columns, functional indexes, and scrollable cursors.
Maintaining SQL Server 2005 high availability in a global information environment is the database administrators greatest practical challenge. Availability is as much about people and processes as it is about technology. Microsoft SQL Server 2005 High Availability covers the technology, people, processes, and real-world best practices for planning, deploying, administering, and maintaining highly available SQL Server 2005 instances. With years of experience as a database consultant and production DBA, Allan Hirt provides in-depth, detailed advice on what it takes to ensure SQL Server high availability for businesses of any size. This is not an academic text; its not based on lab experiments, but on real-world experience. This book is a dramatic update and revision of the authors previous best-seller on SQL Server 2000. It gives sound guidance to DBAs and system administrators on how to really get the job done.
Database technology and entity-relationship (ER) modeling have meanwhile reached the level of an established technology. This book presents the achievements of research in this field in a comprehensive survey. It deals with the entity-relationship model and its extensions with regard to an integrated development and modeling of database applications and, consequently, the specification of structures, behavior and interaction. Apart from research on the ER model and the syntax, semantics, and pragmatics of database modeling the book also presents techniques for the translation of the ER model into classical database models and languages such as relational, hierarchical, and network models and languages, and also into object-oriented models. The book is of interest for all database theoreticians as well as practitioners who are provided with the relevant foundations of database modeling.
N etwork-based computing domain unifies all best research efforts presented from single computer systems to networked systems to render overwhelming computational power for several modern day applications. Although this power is expected to grow with respect to time due to tech nological advancements, application requirements impose a continuous thrust on network utilization and on the resources to deliver supreme quality of service. Strictly speaking, network-based computing dornain has no confined scope and each element offers considerable challenges. Any modern day networked application strongly thrives on efficient data storage and management system, which is essentially a Database System. There have been nurnber of books-to-date in this domain that discuss fundamental principles of designing a database systern. Research in this dornain is now far matured and rnany researchers are venturing in this dornain continuously due to a wide variety of challenges posed. In this book, our dornain of interest is in exposing the underlying key challenges in designing algorithms to handle unpredictable requests that arrive at a Distributed Database System(DDBS) and evaluating their performance. These requests are otherwise called as on-line requests arriving at a system to process. Transactions in an on-line Banking service, Airline Reservation systern, Video-on-Demand systern, etc, are few examples of on-line requests."
Despite the significant ongoing work in the development of new database systems, many of the basic architectural and performance tradeoffs involved in their design have not previously been explored in a systematic manner. The designers of the various systems have adopted a wide range of strategies in areas such as process structure, client-server interaction, concurrency control, transaction management, and memory management. This monograph investigates several fundamental aspects of the emerging generation of database systems. It describes and investigates implementation techniques to provide high performance and scalability while maintaining the transaction semantics, reliability, and availability associated with more traditional database architectures. The common theme of the techniques developed here is the exploitation of client resources through caching-based data replication. Client Data Caching: A Foundation for High Performance Object Database Systems should be a value to anyone interested in the performance and architecture of distributed information systems in general and Object-based Database Management Systems in particular. It provides useful information for designers of such systems, as well as for practitioners who need to understand the inherent tradeoffs among the architectural alternatives in order to evaluate existing systems. Furthermore, many of the issues addressed in this book are relevant to other systems beyond the ODBMS domain. Such systems include shared-disk parallel database systems, distributed file systems, and distributed virtual memory systems. The presentation is suitable for practitioners and advanced students in all of these areas, although a basic understanding of database transaction semantics and techniques is assumed.
This title includes: Section - I: Setting Up Oracle 9i, Database Concepts, Installation Of Oracle 9i, Post Installation Steps, Setting Up Interactive Sql Plus, Section - Ii: Setting Up The Business Model, A Business Model For Retail Banking, Project Planning For The Retail Banking Model, Section - Iii: Structured Query Language (Sql), Interactive Sql Part-I, Interactive Sql Part - Ii, Interactive Sql Part - Iii, Interactive Sql Part - Iv, Section - Iv: Advance Sql, Sql Performance Tuning, Security Management Using Sql, Oops In Oracle, Advance Features In Sql Plus, Section - V: Pl / Sql, Introduction To Pl/Sql, Pl / Sql Transactions, Pl/Sql Security, and, Pl/Sql Database Objects.
This volume aims to present recent advances in database technology from the viewpoint of the novel database paradigms proposed in the last decade. It focuses on the theory of the extended relational model, and an example of an extended relational database programming language, Algres, is described. A free copy of Algres complements this work, and is available on the Internet. The work should be of interest to graduate studen ts following advanced database courses, advanced data-oriented applications developers, and researchers in the field of database programming languages and software engineering who need a flexible prototyping platform for the development of software tools.
"SQL Injection Attacks and Defense, First Edition: " Winner of the Best Book Bejtlich Read Award ""SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."" -Richard Bejtlich, "Tao Security blog " SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. "SQL Injection Attacks and Defense, Second Edition" is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack. "SQL Injection Attacks and Defense, Second Edition" includes all
the currently known information about these attacks and significant
insight from its team of SQL injection experts, who tell you about:
Understanding SQL Injection - Understand what it is and how it
works Find, confirm and automate SQL injection discovery Tips and
tricks for finding SQL injection within code Create exploits for
using SQL injection Design apps to avoid the dangers these attacks
SQL injection on different databases SQL injection on different
technologies SQL injection testing techniques Case Studies
Introduction to Clinical Informatics fills a void in the Computer in Health Care series. With this volume, Patrice Degoulet and Marius Fieschi provide a comprehensive view of medical informatics and carry that concept forward into the realm of clinical informatics. The authors draw upon their experi ences as medical school faculty members in France, where informatics has long been integrated into the curriculum and where the French version of this very book has been used, tested, and revised. In intent and content, this volume stands as the companion volume to Introduction to Nursing Informatics, one of the series' best selling titles. For practitioners and students of medicine, pharmacy, and other health profes sions, Introduction to Clinical Informatics offers an essential understanding how computing can support patient care, clarifying practical uses and critical issues. Today medical schools in the United States are making informatics a part of their curriculum, with required medical informatics blocks at the onset of training serving as the base for problem-based learning throughout the course of study. In an increasingly networked and computerized environ ment, health-care providers are having to alter how they practice. Whether in the office, the clinic, or the hospital, health-care professionals have access to a growing array of capabilities and tools as they deliver care. Learning to use these becomes a top priority, and this volume becomes a valuable resource."
The database industry is a multi-billion, world-wide, all-encompassing part of the software world. Quantifiers in Action: Generalized Quantification in Query, Logical and Natural Languages introduces a query language called GQs-Generalized Quantification in Query. Most query languages are simply versions of First Order Logic (FOL). GQs are an extension of the idea of quantifier in FOL. GQs are a perfect example of a practical theory within databases. This book provides a brief background in logic and introduces the concept of GQs, and then develops a query language based on GQs. Using Query Language with Generalized Quantifiers, the reader explores the efficient implementation of the concept, always a primary consideration in databases. This professional book also includes several extensions for use with documents employing question and answer techniques. Designed for practitioners and researchers within the database management field; also suitable for advanced-level students in computer science.
Your database is the foundation of your application. Many programmers assume it's also the bottleneck of productive software development, but with the right techniques, this doesn't have to be true. SQL Antipatterns illustrates some of the most common misconceptions and pitfalls software developers face using relational databases. This book helps you to use a database to produce the most efficient results, and turn sluggish, inflexible code and thankless late-night hours into high-quality, reliable solutions and a job well done. The SQL database programming language is the core of most software in the world, but if you're like most software developers, you're self-taught in SQL, and you know just enough to get by. As a result, you might design fragile databases that cannot scale as the business grows, write queries that produce incorrect results and not know why, or deploy applications that are vulnerable to hackers. Don't reinvent the wheel to solve problems SQL was designed to solve--this book will teach you new SQL techniques for getting your job done. Whatever platform or programming language you use, whether you're a junior programmer or a Ph.D., SQL Antipatterns will show you how to design and build databases, how to write better database queries, and how to integrate SQL programming with your application like an expert. You'll also learn the best and most current technology for full-text search, how to design code that is resistant to SQL injection attacks, and other techniques for success.
SQL Server 2008 is the latest update to Microsoft's flagship
database management system. This is the largest update since SQL
Server 2005. SQL Server 2008 is a much more significant update than
SQL Server 2005, because it brings increased ability to deliver
data across more platforms, and thus many different types of
devices. New functionality also allows for easy storage and
retrieval of digitized images and video. These attributes address
the recent explosion in the popularity of web-based video and
server and desktop virtualization.
Databases are now an integral part of the internet and many web sites use databases in the background to control their content. MySQL is one of the most commonly used open source database management systems. Due to it’s bundling with PHP, MySQL has proved a popular choice for many sites as it enables a database driven, content managed website to be set up with little or no software costs. This book will show you how to design and use databases for the web using MySQL as a tool to learn SQL. Key Topics Installing and testing MySQL SQL basics, and using SQL to communicate with databases Database design techniques and concepts Using MySQL with PHP, Apache and Perl How to make other products communicate with MySQL Features and Benefits. Gives an insight into how databases work in relation to the web. Introduces general SQL techniques by means of MySQL. Explains the concepts behind a structured query language and how it can be used to communicate with databases. Provides an introduction to database design and how an efficiently designed database can improve the performance of MySQL.
The PACE System: An Expert Consulting System for Nursing provides a case study of the research, design, implementation, and commercial distribution of this decision support system. Beginning with a summary of PACE's twenty year development and its start as a university-based system, the author contrasts the original system with its current version to give a concrete understanding of its evolution. Further chapters discuss issues in the initial development of the knowledge base; the specific activities and efforts needed to acquire, maintain, and manage the knowledge base; how the network is maintained. The implementation, distribution, and subsequent validation of the entire clinical system is reviewed. Principles and lessons from the development of PACE are analyzed with the hope that today's researchers and developers will glean useful information from these earlier efforts.
This book examines how cloud-based services challenge the current application of antitrust and privacy laws in the EU and the US. The author looks at the elements of data centers, the way information is organized, and how antitrust, competition and privacy laws in the US and the EU regulate cloud-based services and their market practices. She discusses how platform interoperability can be a driver of incremental innovation and the consequences of not promoting radical innovation. She evaluates applications of predictive analysis based on big data as well as deriving privacy-invasive conduct. She looks at the way antitrust and privacy laws approach consumer protection and how lawmakers can reach more balanced outcomes by understanding the technical background of cloud-based services. |
You may like...
Insider Attack and Cyber Security…
Salvatore J Stolfo, Steven M. Bellovin, …
Hardcover
R2,667
Discovery Miles 26 670
|