Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
SQL Clearly Explained, Third Edition, provides an in-depth introduction to using SQL (Structured Query Language). Readers will learn not only SQL syntax, but also how SQL works. Although the core of the SQL language remains relatively unchanged, the most recent release of the SQL standard (SQL:2008) includes two sets of extensions: 1) support for object-relational databases and 2) support for XML. As a result, the set of standard SQL commands has been greatly extended and this new edition takes that into account. This new edition includes updated tips and tricks to reflect the current concepts of SQL and XML standards; several new chapters covering object-relational and XML extensions; and an ancillary package that includes case studies, a syllabus, exams and more. This book is intended for working SQL programmers, database administrators, database designers, database analysts, and application system developers as well as those who are developing new features for database management systems who want to know about user needs. This would include anyone working with electronic content in the relational database context but also XML. Web services, etc.
This book brings all of the elements of database design together in
a single volume, saving the reader the time and expense of making
multiple purchases. It consolidates both introductory and advanced
topics, thereby covering the gamut of database design methodology ?
from ER and UML techniques, to conceptual data modeling and table
transformation, to storing XML and querying moving objects
databases.
Relational Database Design and Implementation: Clearly Explained, Fourth Edition, provides the conceptual and practical information necessary to develop a database design and management scheme that ensures data accuracy and user satisfaction while optimizing performance. Database systems underlie the large majority of business information systems. Most of those in use today are based on the relational data model, a way of representing data and data relationships using only two-dimensional tables. This book covers relational database theory as well as providing a solid introduction to SQL, the international standard for the relational database data manipulation language. The book begins by reviewing basic concepts of databases and database design, then turns to creating, populating, and retrieving data using SQL. Topics such as the relational data model, normalization, data entities, and Codd's Rules (and why they are important) are covered clearly and concisely. In addition, the book looks at the impact of big data on relational databases and the option of using NoSQL databases for that purpose.
Technology And Society Illustrates The Impact Of Technological Change, Both Positive And Negative, On Our World. The Author Looks At How Technology Has Brought Many Positive Advancements To Our Society, And Also Discusses The Significant Repercussions That We Need To Consider. Ideal For Use In Numerous Courses Taught Throughout The Computer Science Curriculum, Technology And Society Will Help Students Turn Outward From Their Technical Studies And Look At Technology From A Global Perspective.
In a local area network (LAN) or intranet, there are many pieces of
hardare trying to gain access to the network transmission media at
the same time (i.e., phone lines, coax, wireless, etc.). However, a
network cable or wireless transmission frequency can physically
only allow one node to use it at a given time. Therefore, there
must be some way to regulate which node has control of the medium
(a media access control, or MAC, protocol). Ethernet is a MAC
protocol; it is one way to regulate physical access to network
tranmission media.
"Network Security" is a comprehensive resource written for anyone
who plans or implements network security measures, including
managers and practitioners. It offers a valuable dual perspective
on security: how your network looks to hackers who want to get
inside, and how you need to approach it on the inside to keep them
at bay.
|
You may like...
|