Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Definitive Guide to MySQL, Second Edition

Buy

Provides a thorough introduction to the installation, configuration, implementation, and administration of MySQL.

The Definitive Guide to MySQL, Second Edition, is the perfect all-in-one guide to MySQL. Whether you’re new to Web application development or you’re already an experienced database analyst, this book describes all of the facets of MySQL configuration, administration, and database application development. Greatly expanded from its widely-praised first edition, this updated revision provides additional information about MySQL tools such as MySQL Control Center and phpMyAdmin, database APIs from several popular programming languages available with Linux and Windows and the latest features found in MySQL 4.1.

(HTML tags aren't allowed.)

Algorithms in Java: Parts 1-4, Third Edition
Algorithms in Java: Parts 1-4, Third Edition

Sedgewick has a real gift for explaining concepts in a way that makes them easy to understand. The use of real programs in page-size (or less) chunks that can be easily understood is a real plus. The figures, programs, and tables are a significant contribution to the learning experience of the reader; they make this book...

Cisco CallManager Best Practices
Cisco CallManager Best Practices

Delivers the proven solutions that make a difference in your Cisco IP Telephony deployment

  • Learn dial plan best practices that help you configure features such as intercom, group speed dials, music on hold, extension mobility, and more

  • ...
Patterns of Enterprise Application Architecture
Patterns of Enterprise Application Architecture

The practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented....


Security in Computing, Third Edition
Security in Computing, Third Edition

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer...

Learning the bash Shell, 3rd Edition
Learning the bash Shell, 3rd Edition
This refreshed edition serves as the most valuable guide yet to the bash shell. It's full of practical examples of shell commands and programs guaranteed to make everyday use of Linux that much easier. Includes information on key bindings, command line editing and processing, integrated programming features, signal handling, and much more!
...
Imperfect C++ Practical Solutions for Real-Life Programming
Imperfect C++ Practical Solutions for Real-Life Programming

C++, although a marvelous language, isn't perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn't just tell you what's wrong with C++, but offers practical techniques and tools for writing code that's...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy