Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL Antipatterns: Avoiding the Pitfalls of Database Programming
SQL Antipatterns: Avoiding the Pitfalls of Database Programming

Each chapter in this book helps you identify, explain, and correct a unique and dangerous antipattern. The four parts of the book group the anti?patterns in terms of logical database design, physical database design, queries, and application development.

The chances are good that your application's database
...

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

Dynamic SQL: Applications, Performance, and Security
Dynamic SQL: Applications, Performance, and Security

This book is an introduction and deep-dive into the many uses of dynamic SQL in Microsoft SQL Server. Dynamic SQL is key to large-scale searching based upon user-entered criteria. It’s also useful in generating value-lists, in dynamic pivoting of data for business intelligence reporting, and for customizing database objects and querying...

The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)

The “Bible” for Rails Development: Fully Updated for Rails 5

 

“When I read The Rails Way for the first time, I felt like I truly understood Rails for the first time.”

...
PostgreSQL High Performance Cookbook
PostgreSQL High Performance Cookbook

Get to know effective ways to improve PostgreSQL's performance and master query optimization, and database monitoring.

About This Book

  • Perform essential database tasks such as benchmarking the database and optimizing the server's memory usage
  • Learn ways to improve query...
Just Spring Data Access: Covers JDBC, Hibernate, JPA and JDO
Just Spring Data Access: Covers JDBC, Hibernate, JPA and JDO

JDBC has simplified database access in Java applications, but a few nagging wrinkles remain—namely, persisting Java objects to relational databases. With this book, you’ll learn how the Spring Framework makes that job incredibly easy with dependency injection, template classes, and object-relational-mapping (ORM).

...
Spring in Action
Spring in Action
Spring in Action 2E is an expanded, completely updated second edition of the best selling Spring in Action. Written by Craig Walls, one of Manning's best writers, this book covers the exciting new features of Spring 2.0, which was released in October 2006.

Spring is a lightweight container framework that represents an...

You Can Do It!: A Beginners Introduction to Computer Programming
You Can Do It!: A Beginners Introduction to Computer Programming
You’ll be Programming with C++ within the hour

Find out just how easy it is to write computer programs!

Want to start programming but don't know where to start? Don't worry! With a radically different approach to programming, author Francis Glassborow demystifies programming concepts, and...

Crooked House (G K Hall's Agatha Christie Series)
Crooked House (G K Hall's Agatha Christie Series)

A wealthy Greek businessman is found dead at his London home! The Leonides were one big happy family living in a sprawling, ramshackle mansion. That was until the head of the household, Aristide, was murdered with a fatal barbiturate injection. Suspicion naturally falls on the old man's young widow, fifty years his junior. But the...

Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...

Java EE 7 with GlassFish 4 Application Server
Java EE 7 with GlassFish 4 Application Server

A practical guide to install and configure the GlassFish 4 application server and develop Java EE 7 applications to be deployed to this server

About This Book

  • Install and configure GlassFish 4
  • Covers all major Java EE 7 APIs and includes new additions such as JSON Processing
  • ...
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy