Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL: The Complete Reference, Second Edition

Buy
The Most Comprehensive SQL Resource Available

Get in-depth details on all the powerful features and capabilities of SQL inside this one-stop guide. Featuring broad coverage of every aspect of this leading database language, this book provides you with an overview of SQL then shows you how to retrieve and update data, program with SQL, use stored procedures, and much more. Covering emerging standards and new related technologies including XML, Web services, EJB, J2EE, and JDBC, this book will help you gain the knowledge and essential skills you need to effectively work with SQL. Comprehensive, organized, and practical, this is the ultimate guide to understanding and using SQL.

  • Master SQL basics and use simple, multi-table, and summary queries
  • Understand key concepts and the latest developments in relational database technology
  • Set up and manage SQL-based databases and write programs to access them
  • Create and use the sample database to run the SQL query examples in the book
  • Find out about Xpath, Xquery, and other XML-based database query standards
  • Discover how J2EE-based applications relate to data management
  • Use and program SQL databases with application servers to create powerful Web applications
  • Preview the future of SQL--including MySQL and the impact of XML and Web Services
About the Author

McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide Paul N. Weinberg and James R. Groff are the authors of Using SQL, the book on which this guide is based. They were also the cofounders of Network Innovations Corporation, developers of SQL-based network software. Groff speaks and writes on SQL and UNIX topics. Weinberg is currently a developer at Apple Computer Corporation.
(HTML tags aren't allowed.)

Designing for the Social Web
Designing for the Social Web
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the right design strategy you can use this social interaction...
Phase Transformations: Examples from Titanium and Zirconium Alloys (Pergamon Materials Series)
Phase Transformations: Examples from Titanium and Zirconium Alloys (Pergamon Materials Series)
Covers phase transformations and phase reactions with examples from titanium and zirconium based systems

The terms phase transitions and phase transformations are often used in an interchangeable manner in the metallurgical literature.

In this book, transformations driven by pressure changes,
...
Electronic Devices and Amplifier Circuits with MATLAB Computing, Second Edition
Electronic Devices and Amplifier Circuits with MATLAB Computing, Second Edition
This book is an undergraduate level textbook. It is an expanded version of the first edition. The prerequisites for this text are first year calculus and physics, and a two-semester course in circuit analysis including the fundamental theorems and the Laplace transformation. This text begins with is an introduction to the nature of small signals...

Data Mining with Decision Trees: Theroy and Applications (Machine Perception and Artificial Intelligence)
Data Mining with Decision Trees: Theroy and Applications (Machine Perception and Artificial Intelligence)

This is the first comprehensive book dedicated entirely to the field of decision trees in data mining and covers all aspects of this important technique.Decision trees have become one of the most powerful and popular approaches in knowledge discovery and data mining, the science and technology of exploring large and complex bodies of data in...

Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.

This is changing, and quickly. Most records...

Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy