![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > Database software > General
IBM's DB2 Express Edition is one of the most capable of the free database platforms available in today's marketplace. In Beginning DB2, author Grant Allen gets you started using DB2 Express Edition for web sites, desktop applications, and more. The author covers the basics of DB2 for developers and database administrators, shows you how to manage data in both XML and relational form, and includes numerous code examples so that you are never in doubt as to how things work. In this book, you'll find: A friendly introduction to DB2 Express Edition, an industrialstrength, relational database from IBM Dozens of examples so that you are never in doubt as to how things work Coverage of important language interfaces, such as from PHP, Ruby, C#, Python, and more The book is aimed at developers who want a robust database to back their applications. What you'll learn Install and manage DB2 Express Edition on Linux and WindowsManage IML data seamlessly using IBM's pureXML storage engineConnect DB2 databases to web and desktop applications via languages such as PHP, Ruby, C#, Python, and moreProtect your data with a sound backup and restore strategyDesign and manage database schema and security within the databaseKnow when and why to upgrade to more powerful editions of DB2 Who this book is for Application developers, including web application developers, looking for a robust, zero-cost database to back their applications; database administrators looking to get up to speed quickly with DB2.
This book is the first comprehensive survey of the field of constraint databases, written by leading researchers. Constraint databases are a fairly new and active area of database research. The key idea is that constraints, such as linear or polynomial equations, are used to represent large, or even infinite, sets in a compact way. The ability to deal with infinite sets makes constraint databases particularly promising as a technology for integrating spatial and temporal data with standard relational databases. Constraint databases bring techniques from a variety of fields, such as logic and model theory, algebraic and computational geometry, as well as symbolic computation, to the design and analysis of data models and query languages.
The book provides a unified presentation of algorithms for association rule and sequential pattern discovery. For both mining problems, the presentation relies on the lattice structure of the search space. All algorithms are built as processes running on this structure. Proving their properties takes advantage of the mathematical properties of the structure. Mining for association rules and sequential patterns is known to be a problem with large computational complexity. The issue of designing efficient parallel algorithms should be considered as critical. Most algorithms in the book are devised for both sequential and parallel execution. Parallel algorithm design takes advantage of the lattice structure of the search space. Partitioning is performed via lattice recursive bisection. Database partitioning is also used as an additional source of parallelism.Part of the motivation for writing this book was postgraduate teaching. Since the book only assumes elementary mathematical knowledge in the domains of lattices, combinatorial optimization, probability calculus, and statistics, it is fit for use by undergraduate students as well. The algorithms are described in a C-like pseudo programming language. The computations are shown in great detail. This makes the book also fit for use by implementers: computer scientists in many domains as well as industry engineers.
Computersystemsresearch is heavilyinfluencedby changesincomputertechnol- ogy. As technology changes alterthe characteristics ofthe underlying hardware com- ponents of the system, the algorithms used to manage the system need to be re- examinedand newtechniques need to bedeveloped. Technological influencesare par- ticularly evident in the design of storage management systems such as disk storage managers and file systems. The influences have been so pronounced that techniques developed as recently as ten years ago are being made obsolete. The basic problem for disk storage managers is the unbalanced scaling of hard- warecomponenttechnologies. Disk storage managerdesign depends on the technolo- gy for processors, main memory, and magnetic disks. During the 1980s, processors and main memories benefited from the rapid improvements in semiconductortechnol- ogy and improved by several orders ofmagnitude in performance and capacity. This improvement has not been matched by disk technology, which is bounded by the me- chanics ofrotating magnetic media. Magnetic disks ofthe 1980s have improved by a factor of 10in capacity butonly a factor of2 in performance. This unbalanced scaling ofthe hardware components challenges the disk storage manager to compensate for the slower disks and allow performance to scale with the processor and main memory technology. Unless the performance of file systems can be improved over that of the disks, I/O-bound applications will be unable to use the rapid improvements in processor speeds to improve performance for computer users. Disk storage managers must break this bottleneck and decouple application perfor- mance from the disk.
Real Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope with bigger workloads and more users. Many books limit themselves by conceptualizing and theorizing about RAC technology, but this book is the first to portray implementing and administering an Oracle 10"g" RAC system in a Linux environment. This book features basic concepts underlying Linux and Oracle RAC, design strategies, hardware procurement and configuration, and many other topics. The RAC-specific technologies described include configuration of the interconnect, OCFS, ASM, Cluster Ready Services, and Grid Control. The Oracle features RMAN and Data Guard are also discussed, along with available hardware options. The authors include practical examples and configuration information, so that upon reading this book, youll be armed with the information you need to build an Oracle RAC database on Linux, whether it is on a single laptop or a 64-node Itanium cluster.
School library media specialists will find this concepts-based approach to teaching electronic literacy an indispensable basic tool for instructing students and teachers. It provides step-by-step instruction on how to find and evaluate needed information from electronic databases and the Internet, how to formulate successful electronic search strategies and retrieve relevant results, and how to interpret and critically analyze search results. The chapters contain a suggested lesson plan and sample assignments for the school library media specialist to use in teaching electronic literacy skills to students and teachers. Dr. Kathleen W. Craver, a nationally recognized specialist in technology in the library media center, identifies the universal concepts of electronic literacy and provides the library media specialist with the rationales, background, methods, and model assignments to teach students and faculty to become proficient and critical users of electronic information technologies. At the beginning of each chapter, Craver furnishes a rationale for change that school library media specialists can use to justify these essential modifications to their teaching curriculum. Chapters include: The Structure of Electronic Information; The Common Vocabulary and Characteristics of Electronic Resources; Formulating Electronic Search Strategies; The Physical Arrangement of Information; Choosing Appropriate On-Site and Remote Electronic Libraries; Choosing Appropriate Electronic Databases; Internet Search Tools and Techniques; Identifying Electronic Resources; On-Site Electronic Records Access; Using Primary Electronic Resources; and Evaluating Electronic Sources. The Appendix contains a listof principal vendors. A glossary of terms and a bibliography of suggested reading complete the work. This basic teaching guide provides the media specialist with all the tools necessary to help novice users to be successful and avoid the frustration of electronic database searching and retrieval.
This book describes an interactive statistical computing environment called 1 XploRe. As the name suggests, support for exploratory statistical analysis is given by a variety of computational tools. XploRe is a matrix-oriented statistical language with a comprehensive set of basic statistical operations that provides highly interactive graphics, as well as a programming environ ment for user-written macros; it offers hard-wired smoothing procedures for effective high-dimensional data analysis. Its highly dynamic graphic capa bilities make it possible to construct student-level front ends for teaching basic elements of statistics. Hot keys make it an easy-to-use computing environment for statistical analysis. The primary objective of this book is to show how the XploRe system can be used as an effective computing environment for a large number of statistical tasks. The computing tasks we consider range from basic data matrix manipulations to interactive customizing of graphs and dynamic fit ting of high-dimensional statistical models. The XploRe language is similar to other statistical languages and offers an interactive help system that can be extended to user-written algorithms. The language is intuitive and read ers with access to other systems can, without major difficulty, reproduce the examples presented here and use them as a basis for further investigation.
This monograph describes an innovative prototyping framework for data and knowledge intensive systems. The proposed approach will prove especially useful for advanced and research-oriented projects that aim to develop a traditional database perspective into fully-fledged advanced database approaches and knowledge engineering technologies. The book is organised in two parts. The first part, comprising chapters 1 to 4, provides an introduction to the concept of prototyping, to database and knowledge-based technologies, and to the main issues involved in the integration of data and knowledge engineering. The second part, comprising chapters 5 to 12, illustrates the proposed approach in technical detail. Audience: This volume will be of interest to researchers in the field of databases and knowledge engineering in general, and for software designers and knowledge engineers who aim to expand their expertise in data and knowledge intensive systems.
This book provides the foundation and understanding necessary for proper design of databases for today's distributed and multi-database architectures. Introductory chapters help novices understand essential topics such as SQL, relational databases, transaction processing, and deadlock detection, while subsequent sections dealing with homogeneous, distributed databases, heterogeneous multi-databases, and federated databases enable readers to understand the complexities of distributed database design. Packed with over 200 illustrations, 50 equations, and two full chapters of examples.
The use of parallel processing technology in the next generation of
Database Management Systems (DBMSs) makes it possible to meet new
and challenging requirements. Database technology in rapidly
expanding new application areas brings unique challenges such as
increased functionality and efficient handling of very large
heterogeneous databases.
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.
Data engineering has grown rapidly in the past decade, leaving many software engineers, data scientists, and analysts looking for a comprehensive view of this practice. With this practical book, you will learn how to plan and build systems to serve the needs of your organization and customers by evaluating the best technologies available in the framework of the data engineering lifecycle. Authors Joe Reis and Matt Housley walk you through the data engineering lifecycle and show you how to stitch together a variety of cloud technologies to serve the needs of downstream data consumers. You will understand how to apply the concepts of data generation, ingestion, orchestration, transformation, storage, governance, and deployment that are critical in any data environment regardless of the underlying technology. This book will help you: Assess data engineering problems using an end-to-end data framework of best practices Cut through marketing hype when choosing data technologies, architecture, and processes Use the data engineering lifecycle to design and build a robust architecture Incorporate data governance and security across the data engineering lifecycle
Sybase Adaptive Server Enterprise 15 is a high-performance, mission-critical database management system designed to meet the increasing demands of large databases and high-transaction volumes, while providing a cost-effective database management system. "The Official New Features Guide to Sybase ASE 15" focuses on the many enhancements in Sybase ASE 15 including semantic partitions, computed columns, functional indexes, and scrollable cursors.
Maintaining SQL Server 2005 high availability in a global information environment is the database administrators greatest practical challenge. Availability is as much about people and processes as it is about technology. Microsoft SQL Server 2005 High Availability covers the technology, people, processes, and real-world best practices for planning, deploying, administering, and maintaining highly available SQL Server 2005 instances. With years of experience as a database consultant and production DBA, Allan Hirt provides in-depth, detailed advice on what it takes to ensure SQL Server high availability for businesses of any size. This is not an academic text; its not based on lab experiments, but on real-world experience. This book is a dramatic update and revision of the authors previous best-seller on SQL Server 2000. It gives sound guidance to DBAs and system administrators on how to really get the job done.
Database technology and entity-relationship (ER) modeling have meanwhile reached the level of an established technology. This book presents the achievements of research in this field in a comprehensive survey. It deals with the entity-relationship model and its extensions with regard to an integrated development and modeling of database applications and, consequently, the specification of structures, behavior and interaction. Apart from research on the ER model and the syntax, semantics, and pragmatics of database modeling the book also presents techniques for the translation of the ER model into classical database models and languages such as relational, hierarchical, and network models and languages, and also into object-oriented models. The book is of interest for all database theoreticians as well as practitioners who are provided with the relevant foundations of database modeling.
N etwork-based computing domain unifies all best research efforts presented from single computer systems to networked systems to render overwhelming computational power for several modern day applications. Although this power is expected to grow with respect to time due to tech nological advancements, application requirements impose a continuous thrust on network utilization and on the resources to deliver supreme quality of service. Strictly speaking, network-based computing dornain has no confined scope and each element offers considerable challenges. Any modern day networked application strongly thrives on efficient data storage and management system, which is essentially a Database System. There have been nurnber of books-to-date in this domain that discuss fundamental principles of designing a database systern. Research in this dornain is now far matured and rnany researchers are venturing in this dornain continuously due to a wide variety of challenges posed. In this book, our dornain of interest is in exposing the underlying key challenges in designing algorithms to handle unpredictable requests that arrive at a Distributed Database System(DDBS) and evaluating their performance. These requests are otherwise called as on-line requests arriving at a system to process. Transactions in an on-line Banking service, Airline Reservation systern, Video-on-Demand systern, etc, are few examples of on-line requests."
Despite the significant ongoing work in the development of new database systems, many of the basic architectural and performance tradeoffs involved in their design have not previously been explored in a systematic manner. The designers of the various systems have adopted a wide range of strategies in areas such as process structure, client-server interaction, concurrency control, transaction management, and memory management. This monograph investigates several fundamental aspects of the emerging generation of database systems. It describes and investigates implementation techniques to provide high performance and scalability while maintaining the transaction semantics, reliability, and availability associated with more traditional database architectures. The common theme of the techniques developed here is the exploitation of client resources through caching-based data replication. Client Data Caching: A Foundation for High Performance Object Database Systems should be a value to anyone interested in the performance and architecture of distributed information systems in general and Object-based Database Management Systems in particular. It provides useful information for designers of such systems, as well as for practitioners who need to understand the inherent tradeoffs among the architectural alternatives in order to evaluate existing systems. Furthermore, many of the issues addressed in this book are relevant to other systems beyond the ODBMS domain. Such systems include shared-disk parallel database systems, distributed file systems, and distributed virtual memory systems. The presentation is suitable for practitioners and advanced students in all of these areas, although a basic understanding of database transaction semantics and techniques is assumed.
This title includes: Section - I: Setting Up Oracle 9i, Database Concepts, Installation Of Oracle 9i, Post Installation Steps, Setting Up Interactive Sql Plus, Section - Ii: Setting Up The Business Model, A Business Model For Retail Banking, Project Planning For The Retail Banking Model, Section - Iii: Structured Query Language (Sql), Interactive Sql Part-I, Interactive Sql Part - Ii, Interactive Sql Part - Iii, Interactive Sql Part - Iv, Section - Iv: Advance Sql, Sql Performance Tuning, Security Management Using Sql, Oops In Oracle, Advance Features In Sql Plus, Section - V: Pl / Sql, Introduction To Pl/Sql, Pl / Sql Transactions, Pl/Sql Security, and, Pl/Sql Database Objects.
Data analytics is creeping into the lexicon of our daily language. This book gives the reader a perspective as to the overall data analytics skill set, startingwith a primer on statistics, and works toward the application of those methods.There are a variety of formulas and algorithms used in the data analyticsprocess. These formulas can be plugged into whatever software application thereader uses to obtain the answer they need. There are several demonstrations ofthis process to provide straightforward instruction as to how to bring data analytics skills to your critical thinking. This bookpresents a variety of methods and techniques, as well as case studies, toenrich the knowledge of data analytics for project managers, systems engineers,and cybersecurity professionals. It separates the case studies so that eachprofession can practice some straightforward data analytics specific to their fields. The main purpose of this text is to refresh the statistical knowledgenecessary to build models for data analytics. Along with that, this bookencompasses the analytics thinking that is essential to all three professions. FEATURES: Provides straightforward instruction on data analytics methods Includes methods, techniques, and case studies for project managers, systems engineers, and cybersecurity professionals Refreshes the statistical knowledgeneeded to bring data analytics into your skillset and decision-making Focuses on getting readers up to speed quickly and efficiently to be able to see the impact of data analytics and analytical thinking
This volume aims to present recent advances in database technology from the viewpoint of the novel database paradigms proposed in the last decade. It focuses on the theory of the extended relational model, and an example of an extended relational database programming language, Algres, is described. A free copy of Algres complements this work, and is available on the Internet. The work should be of interest to graduate studen ts following advanced database courses, advanced data-oriented applications developers, and researchers in the field of database programming languages and software engineering who need a flexible prototyping platform for the development of software tools.
"SQL Injection Attacks and Defense, First Edition: " Winner of the Best Book Bejtlich Read Award ""SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage."" -Richard Bejtlich, "Tao Security blog " SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. "SQL Injection Attacks and Defense, Second Edition" is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack. "SQL Injection Attacks and Defense, Second Edition" includes all
the currently known information about these attacks and significant
insight from its team of SQL injection experts, who tell you about:
Understanding SQL Injection - Understand what it is and how it
works Find, confirm and automate SQL injection discovery Tips and
tricks for finding SQL injection within code Create exploits for
using SQL injection Design apps to avoid the dangers these attacks
SQL injection on different databases SQL injection on different
technologies SQL injection testing techniques Case Studies
Introduction to Clinical Informatics fills a void in the Computer in Health Care series. With this volume, Patrice Degoulet and Marius Fieschi provide a comprehensive view of medical informatics and carry that concept forward into the realm of clinical informatics. The authors draw upon their experi ences as medical school faculty members in France, where informatics has long been integrated into the curriculum and where the French version of this very book has been used, tested, and revised. In intent and content, this volume stands as the companion volume to Introduction to Nursing Informatics, one of the series' best selling titles. For practitioners and students of medicine, pharmacy, and other health profes sions, Introduction to Clinical Informatics offers an essential understanding how computing can support patient care, clarifying practical uses and critical issues. Today medical schools in the United States are making informatics a part of their curriculum, with required medical informatics blocks at the onset of training serving as the base for problem-based learning throughout the course of study. In an increasingly networked and computerized environ ment, health-care providers are having to alter how they practice. Whether in the office, the clinic, or the hospital, health-care professionals have access to a growing array of capabilities and tools as they deliver care. Learning to use these becomes a top priority, and this volume becomes a valuable resource."
The database industry is a multi-billion, world-wide, all-encompassing part of the software world. Quantifiers in Action: Generalized Quantification in Query, Logical and Natural Languages introduces a query language called GQs-Generalized Quantification in Query. Most query languages are simply versions of First Order Logic (FOL). GQs are an extension of the idea of quantifier in FOL. GQs are a perfect example of a practical theory within databases. This book provides a brief background in logic and introduces the concept of GQs, and then develops a query language based on GQs. Using Query Language with Generalized Quantifiers, the reader explores the efficient implementation of the concept, always a primary consideration in databases. This professional book also includes several extensions for use with documents employing question and answer techniques. Designed for practitioners and researchers within the database management field; also suitable for advanced-level students in computer science.
Your database is the foundation of your application. Many programmers assume it's also the bottleneck of productive software development, but with the right techniques, this doesn't have to be true. SQL Antipatterns illustrates some of the most common misconceptions and pitfalls software developers face using relational databases. This book helps you to use a database to produce the most efficient results, and turn sluggish, inflexible code and thankless late-night hours into high-quality, reliable solutions and a job well done. The SQL database programming language is the core of most software in the world, but if you're like most software developers, you're self-taught in SQL, and you know just enough to get by. As a result, you might design fragile databases that cannot scale as the business grows, write queries that produce incorrect results and not know why, or deploy applications that are vulnerable to hackers. Don't reinvent the wheel to solve problems SQL was designed to solve--this book will teach you new SQL techniques for getting your job done. Whatever platform or programming language you use, whether you're a junior programmer or a Ph.D., SQL Antipatterns will show you how to design and build databases, how to write better database queries, and how to integrate SQL programming with your application like an expert. You'll also learn the best and most current technology for full-text search, how to design code that is resistant to SQL injection attacks, and other techniques for success. |
You may like...
SQL: 1999 - Understanding Relational…
Jim Melton, Alan R. Simon
Paperback
Enterprise Big Data Engineering…
Martin Atzmueller, Samia Oussena, …
Hardcover
R5,155
Discovery Miles 51 550
Index Data Structures in Object-Oriented…
Thomas A. Mueck, Martin L. Polaschek
Hardcover
R4,107
Discovery Miles 41 070
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, …
Paperback
|