Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MySQL in a Nutshell

Buy
MySQL in a Nutshell, 9780596007898 (0596007892), O'Reilly, 2005

MySQL is the world's most popular open source database. MySQL is designed for speed, power, and flexibility in mission-critical, heavy-use environments and modest applications as well. It's also surprisingly rich in features. If you're a database administrator or programmer you probably love the myriad of things MySQL can do, but sometimes wish there wasn't such a myriad of things to remember. With MySQL in a Nutshell by your keyboard, you can drill down into the full depth of MySQL's capabilities quickly and easily.

MySQL in a Nutshell is the indispensable desktop reference to all MySQL functions. Programming language APIs for PHP, Perl, and C are covered, as well as all the popular MySQL utilities.

This invaluable resource clearly documents the details that experienced users need to take full advantage of this powerful database management system. Better yet, this wealth of information is packed into the concise, comprehensive, and extraordinarily easy-to-use format for which the in a Nutshell guides are renowned.

In addition to providing a thorough reference to MySQL statements and functions, the administrative utilities, and the most popular APIs, MySQL in a Nutshell includes several tutorial chapters to help newcomers get started. Moreover, each chapter covering an API begins with a brief tutorial so that, regardless of your level of experience in any given area, you will be able to understand and master unfamiliar territory.

MySQL in a Nutshell distills all the vital MySQL details you need on a daily basis into one convenient, well-organized book. It will save you hundreds of hours of tedious research or trial and error and put the facts you need to truly tap MySQL's capabilities at your fingertips.

(HTML tags aren't allowed.)

Manager's Guide to Compliance
Manager's Guide to Compliance
"Wide perspectives and best practices combined deliver a punch that will knock your 'SOX' off! The author has blended together a critical mix necessary for effectively handling the requirements of SOX."
—Rob Nance, Publisher, AccountingWEB, Inc.

"Robust compliance and corporate governance is an absolute necessity...

The Effectiveness of Promotion Agencies at Attracting Foreign Investment
The Effectiveness of Promotion Agencies at Attracting Foreign Investment
With many millions of dollars being spent annually by governments on promotion to attract foreign investors to various countries, a perplexing question has become increasingly important: Does investment promotion really work? Jacques Morisset and Kelly Andrews-Johnson have made a major step in providing a convincing answer to this and associated...
Graph Algorithms, Third Edition (Algorithms in Java, Part 5)
Graph Algorithms, Third Edition (Algorithms in Java, Part 5)

Graphs and Graph algorithms are pervasive in modern computing applications. This book describes the most important known methods for solving the graph-processing problems that arise in practice. Its primary aim is to make these methods and the basic principles behind them accessible to the growing number of people in need of...


The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Data Networks, IP and the Internet: Protocols, Design and Operation
Data Networks, IP and the Internet: Protocols, Design and Operation
Modern data networks are all based on the Internet or on IP (Internet Protocol). But many people remain confused by multiprotocol networks. How do all the protocols fit together? How do I build a network? What do all the components do? What sort of problems should I expect?

Data Networks, IP and the Internet is intended not only for...

Quantum Approach to Informatics
Quantum Approach to Informatics
An essential overview of quantum information

Information, whether inscribed as a mark on a stone tablet or encoded as a magnetic domain on a hard drive, must be stored in a physical object and thus made subject to the laws of physics. Traditionally, information processing such as computation occurred in a framework governed by laws of classical...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy