Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL Tips and Techniques
SQL Tips and Techniques

Beginning with tips for the person who is programming with SQL for the first time, SQL Tips and Techniques grows with your skills. You can start with Tip 1, "Understanding the Definition of a Database," and by the last Tip, "Displaying Image Data Stored Within a SQL Table," you will have covered all aspects of...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Apache Flume: Distributed Log Collection for Hadoop - Second Edition
Apache Flume: Distributed Log Collection for Hadoop - Second Edition

Design and implement a series of Flume agents to send streamed data into Hadoop

About This Book

  • Construct a series of Flume agents using the Apache Flume service to efficiently collect, aggregate, and move large amounts of event data
  • Configure failover paths and load balancing to remove...
Troubleshooting SQL Server - A Guide for the Accidental DBA
Troubleshooting SQL Server - A Guide for the Accidental DBA
I've spent much of the last six years of my working life trying to help people solve SQL Server-related performance problems, either hands-on, at client sites in my capacity as a consultant, or on various online community forums, answering people's questions.

Over that time I've been exposed to a few weird
...
Microsoft(R) Operations Manager 2005 Unleashed (MOM): With A Preview of Operations Manager 2007
Microsoft(R) Operations Manager 2005 Unleashed (MOM): With A Preview of Operations Manager 2007
With the licensing of NetIQ’s Operation Manager technology in 2000, Microsoft sent a message that it was serious about server monitoring and management. This message was well received; those production environments running Windows servers and using a Microsoft infrastructure require tools to help them be proactive in managing those servers...
Google AdSense For Dummies (Computer/Tech)
Google AdSense For Dummies (Computer/Tech)
You can get paid for online ad placement with Google AdSense! If you’ve ever considered using AdSense to improve revenue for your Web site, Google AdSense For Dummies will get you started. It’s loaded with tips to help you implement a successful AdSense program.

AdSense lets you generate income with ad...

Mastering Oracle Scheduler in Oracle 11g Databases
Mastering Oracle Scheduler in Oracle 11g Databases

Scheduler (DBMS_SCHEDULER) is included in Oracle Database and is a tool for the automation, management, and control of jobs. It enables users to schedule jobs running inside the database such as PL/SQL procedures or PL/SQL blocks, as well as jobs running outside the database like shell scripts. Scheduler ensures that jobs are run on time,...

Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

Developing Time-Oriented Database Applications in SQL
Developing Time-Oriented Database Applications in SQL
What is everywhere but occupies no space; can be measured but not seen or touched; can be spent, wasted, or killed, but not destroyed or changed? The simple answer is time, and the relationship between the fourth dimension and data is the foundation for Developing Time-Oriented Database Applications in SQL, a fascinating book by Richard T....
SystemVerilog Assertions and Functional Coverage: Guide to Language, Methodology and Applications
SystemVerilog Assertions and Functional Coverage: Guide to Language, Methodology and Applications

This book provides a hands-on, application-oriented guide to the language and methodology of both SystemVerilog Assertions and SytemVerilog Functional Coverage.  Readers will benefit from the step-by-step approach to functional hardware verification, which will enable them to uncover hidden and hard to find bugs, point directly to the...

IBM Cognos BI v10.2 Administration Essentials
IBM Cognos BI v10.2 Administration Essentials

Explore the power and scalability of IBM Cognos BI to achieve effective performance management

Overview

  • Apply drill-through definition feature to different areas of Cognos BI
  • Manage User profiles and User Interface Profiles
  • Full of step-by-step explanations on all the routine...
Solaris Security
Solaris Security
At last, a security book just for Solaris and UNIX(r) system administrators. Learn
the specifics for making your system secure, whether it's an organization-wide
network or a standalone workstation. Expert author Peter Gregory has managed
security for everything from top-secret corporate research facilities to casinos.
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy