Home | Amazing | Today | Tags | Publishers | Years | Search 
Transact-SQL Programming: Covers Microsoft SQL Server 6.5 /7.0 and Sybase Adaptive Server 11.5
Transact-SQL Programming: Covers Microsoft SQL Server 6.5 /7.0 and Sybase Adaptive Server 11.5

Transact-SQL is a procedural language used on both Microsoft SQL Server and Sybase SQL Server systems. It is a full-featured programming language that dramatically extends the power of SQL (Structured Query Language).The language provides programmers with a broad range of features, including:

  • A rich set of...
Sams Teach Yourself ADO.NET in 24 Hours
Sams Teach Yourself ADO.NET in 24 Hours

ADO.NET is the data access model built into the .NET Framework. It replaces the old (and largely successful) ADO used in almost all Visual Basic and ASP applications built over the last few years. ADO.NET enables an application to communicate with any OLE database source (including Oracle, Sybase, Microsoft Access, and even text files). This...

SQL In A Nutshell, 2nd Edition
SQL In A Nutshell, 2nd Edition
This essential desktop reference drills down and documents every SQL command and how to use it in both commercial (Oracle, DB2, and Microsoft SQL Server) and open source implementations (PostgreSQL, and MySQL). It includes the command syntax (by vendor, if the syntax differs across implementations), a description, and practical examples. And...
SQL Functions Programmer's Reference (Programmer to Programmer)
SQL Functions Programmer's Reference (Programmer to Programmer)
SQL functions are special commands for manipulating data. The international SQL standard defines many functions implemented by all major RDBMS vendors. This comprehensive SQL functions reference enables you to quickly master SQL function data manipulation in any database.

First, the book presents the basics you need to use standard SQL...

UNIX Backup and Recovery
UNIX Backup and Recovery
Unix Backup & Recovery provides a complete overview of all facets of Unix backup and recovery, and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. The book begins with detailed explanations of the native backup utilities available to the Unix...
Sams Teach Yourself J2EE in 21 Days
Sams Teach Yourself J2EE in 21 Days

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

Building PDA Databases for Wireless and Mobile Development
Building PDA Databases for Wireless and Mobile Development
Learn how to build databases on personal digital devices to be used with PDA applications

Several years ago, the business community accepted the Internet as a viable solution to extending the corporate environment. Today, there is another movement towards enhancing this methodology–– empowering mobile wireless business users with...

The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to...

The Official New Features Guide to Sybase ASE 15
The Official New Features Guide to Sybase ASE 15
This book focuses on the many enhancements in Sybase ASE 15 including system administration enhancements, function-based indexes, computed columns, scrollable cursors, galaxy optimizer, query plan, galaxy partitions, multiple tempdb, MDA tables, andn Plan Viewer.

We’ve read the newsgroups. We’ve seen the blogs. We know
...
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Pro SQL Server 2008 Replication
Pro SQL Server 2008 Replication
Pro SQL Server 2008 Replication is for MS database developers and administrators who want to learn about the different types of replication and those best suited to SQL Server 2008. This book will also cover advanced topics like replication with heterogeneous databases, backup and recovery of replicated databases, database mirroring with...
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy