Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Gennick, Jonathan  (8)
  • Garfinkel, Simson  (6)
  • American Society for Training and Development
  • Boston, MA :Safari,  (16)
  • Electronic books ; local  (16)
  • Zeitschriften zur Ethnologie
Datasource
Material
Language
Years
  • 1
    Language: English
    Pages: xviii, 714 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 554 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; Database management ; Electronic books ; local
    Abstract: Despite its wide availability and usage, few developers and DBAs have mastered the true power of Oracle SQL Plus. This bestselling book--now updated for Oracle 10g--is the only in-depth guide to this interactive query tool for writing SQL scripts. It's an essential resource for any Oracle user.The new second edition of Oracle SQL Plus: The Definitive Guide clearly describes how to perform, step-by-step, all of the tasks that Oracle developers and DBAs want to perform with SQL Plus--and maybe some you didn't realize you could perform.With Oracle SQL Plus: The Definitive Guide, you'll expertly: write and execute script files generate ad hoc reports extract data from the database query the data dictionary tables customize an SQL Plus environment and much more It also includes a handy quick reference to all of its syntax options and an often-requested chapter on SQL itself, along with a clear, concise, and complete introduction.This book is truly the definitive guide to SQLPlus. It's an indispensable resource for those who are new to SQL*Plus, a task-oriented learning tool for those who are already using it, and an immediately useful quick reference for every user. If you want to leverage the full power and flexibility of this popular Oracle tool, you'll need this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Alexandria, VA : ASTD Press | Boston, MA :Safari,
    Language: English
    Pages: x, 195 p. , ill. ; , 28 cm. +
    Keywords: Communication in organizations ; Problems, exercises, etc ; Conflict management ; Problems, exercises, etc ; Interpersonal communication ; Problems, exercises, etc ; Electronic books ; local
    Abstract: Communication Skills Training offers all the resources and tools needed to design effective communication skills training. Use this complete guide to design presentation, negotiation, conflict resolution, or assertiveness skills for group or work teams or design interpersonal communication training for an entire organization. The book includes a fully developed set of PowerPoint slides, handouts, learning activities, and facilitators guide for one-half, full, and two-day training programs.
    Note: CD-Rom includes 3 types of files: Adobe .pdf documents, Microsoft PowerPoint presentations, Microsoft PowerPoint files of overhead transparency masters. - Includes bibliographical references (p. 193-194)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: iv, 60 p. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Handbooks, manuals, etc ; Electronic data processing ; Handbooks, manuals, etc ; Text processing (Computer science) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Support for regular expressions in SQL and PL/SQL is one of the most exciting features of Oracle Database 10G. Oracle has long supported the ANSI-standard LIKE predicate for rudimentary pattern matching, but regular expressions take pattern matching to a new level. They provide a powerful way to select data that matches a pattern, as well as to manipulate, rearrange, and change that data.This concise pocket guide is part tutorial and part quick-reference. It's suitable for those who have never used regular expressions before, as well as those who have experience with Perl and other languages supporting regular expressions. The book describes Oracle Database 10G's support for regular expressions, including globalization support and differences between Perl's syntax and the POSIX syntax supported by Oracle 10G. It also provides a comprehensive reference, including examples, to all supported regular expression operators, functions, and error messages.O'Reilly's Pocket References have become a favorite among developers and database administrators everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. Whether you're using regular expressions for the first time or applying your skills from other languages to the latest version of Oracle, the Oracle Regular Expressions Pocket Reference is the book to have close by.
    Note: "New in Oracle database 10g"--Cover. - "Tutorial & quick reference"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    Pages: xxix, 954 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: UNIX (Computer file) ; Computer security ; Internet ; Congresses ; Operating systems (Computers) ; Electronic books ; local
    Abstract: When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
    Note: Includes bibliographical references (p. 873-895) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Alexandria, VA : ASTD | Boston, MA :Safari,
    Language: English
    Pages: xi, 132 p. , ill. ; , 25 cm
    Keywords: Employee training personnel ; Employees ; Training of ; Electronic books ; local
    Abstract: Subject matter experts (SMEs) and occasional trainers are increasingly sharing the training burden in organizations. Yet these "instant trainers" often are not familiar with even the basic terminology or practices of the training profession. Trainer Basics is written specifically to answer three key questions these new trainers ask: What does a trainer do and why? How can I develop must-have skills quickly? How do I apply training knowledge today? New trainers will appreciate the informative quick learning "hits" hroughout the book, including helpful reminders called Think About This, cut-to-the-chase rules called Basic Rules, and additional key concept points called Noted. Every chapter ends with quick learning exercises called Getting It Done to reinforce key chapter information. Written in direct and understandable language by a veteran trainer, this book also offers professional trainers a much-needed tool to help train these new ranks of trainers. Just hand Training Basics to a new trainer and within a few hours the job of explaining the basics of instructional design, adult learning, needs analysis, evaluation, and presentation and facilitation skills is done.
    Note: Includes bibliographical references (p. 123-129)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vi, 113 p. ; , 18 cm
    Edition: 2nd ed.
    Keywords: Oracle (Computer file) ; Database management ; Query languages (Computer science) ; Relational databases ; SQL*PLUS (Computer program language) ; Electronic books ; local
    Abstract: SQL*Plus is available at every Oracle site--from the largest data warehouse to the smallest single-user system--and it's a critical tool for virtually every Oracle user. Despite its wide use, few developers and DBAs know how powerful a tool SQL*Plus can be. This pocket reference provides quick reference information that will help you use SQL*Plus, Oracle's interactive query tool. It summarizes all of the SQL*Plus syntax, including the syntax for the Oracle9i release. This book boils down the most vital information from Gennick's best-selling book, "Oracle SQL8Plus: The Definitive Guide", into an accessible summary and works as a vital companion to the larger book. It concisely describes interacting with SQL*Plus, selecting data, formatting reports with SQL*Plus, and tuning SQL queries. It also contains quick references to the SQL*Plus commands and format elements. The new 2nd edition of our Oracle SQL*Plus Pocket Reference includes many new features for Oracle9i (e.g., COALESCE function, searched CASE expressions, new table join syntax, partition operations, MERGE statement, and syntax changes in existing SQL*Plus statements such as ACCEPT, DESRIBE, HELP, and SET) It also adds sections on basic SQL (a much-requested feature): INSERT, DELETE, UPDATE, SELECT, and transaction management. The pocket reference size is especially appropriate for this particular subject, since Oracle SQL*Plus is used on every possible platform, it's particularly convenient to be able to carry a small book around from office computer to home computer to laptop.
    Note: "A guide to SQL*Plus syntax"--Cover. - "Covers Oracle9i"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 282 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.756
    Keywords: Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: This unique cookbook contains a wealth of solutions to problems that SQL programmers face all the time. The recipes inside range from how to perform simple tasks, like importing external data, to ways of handling issues that are more complicated, like set algebra. Authors Ales Spetic and Jonathan Gennick, two authorities with extensive database and SQL programming experience, include a discussion with each recipe to explain the logic and concepts underlying the solution.SQL (Structured Query Language) is the closest thing to a standard query language that currently exists, and Transact-SQL -- a full-featured programming language that dramatically extends the power of SQL -- is the procedural language of choice for both Microsoft SQL Server and Sybase SQL Server systems. The Transact-SQL Cookbook is designed so you can use the recipes directly, as a source of ideas, or as a way to learn a little more about SQL and what you can do with it. Topics covered include: Audit logging. In addition to recipes for implementing an audit log, this chapter also includes recipes for: improving performance where large log tables are involved; supporting multiple-languages; and simulating server push. Hierarchies. Recipes show you how to manipulate hierarchical data using Transact-SQL. Importing data. This chapter introduces concepts like normalization and recipes useful for working with imported data tables. Sets. Recipes demonstrate different operations, such as how to find common elements, summarize the data in a set, and find the element in a set that represents an extreme. Statistics. This chapter?s recipes show you how to effectively use SQL for common statistical operations from means and standard deviations to weighted moving averages. Temporal data. Recipes demonstrate how to construct queries against time-based data. Data Structures. This chapter shows how to manipulate data structures like stacks, queues, matrices, and arrays. With an abundance of recipes to help you get your job done more efficiently, the Transact-SQL Cookbook is sure to become an essential part of your library.
    Note: "Help for database programmers"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxv, 620 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Mac OS ; Cocoa (Application development environment) ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Cocoa is an object-oriented development environment available in Apple's Mac OS X environment. Mac OS X, a unified operating system and graphical operating environment, is the fastest growing Unix variant on the market today. Hard-core Unix programmers, developers who cut their teeth on classic Mac operating systems, and developers who cherished NeXTSTEP, the decade-old system on which today's Cocoa is based -- all are flocking to Cocoa, and they need a lot more practical information than is currently available from Apple. There is a lot to learn. Building Cocoa Applications is an ideal book for serious developers who want to write programs for the Mac OS X using Cocoa. It's a no-nonsense, hands-on text that's filled with examples -- not only simple and self-contained examples of individual Cocoa features, but extended examples of complete applications with enough sophistication and complexity that readers can put them to immediate use in their own environments. Building Cocoa Applications takes a step-by-step approach to teaching developers how to build real graphics applications using Cocoa. By showing the basics of an application in one chapter and then layering additional functionality onto that application in subsequent chapters, the book keeps readers interested and motivated. Readers will see immediate results, and then go on to build onto what they've already achieved. The book is divided into four major parts: Part I introduces the Mac OS X graphical user interface (Aqua) from a developer's point of view, Cocoa developer tools (such as the Interface Builder, Project Builder, and gdb debugger), object-oriented concepts, the Objective-C language in which Cocoa is written, and the basics of Cocoa programming itself. Part II focuses on building the first complete application, Calculator, a simple four-function calculator. The chapters in this part of the book extend the application, piece by piece, by introducing such features as nibs, icons, delegation, resizing, events, and responders. Part III focuses on building an application called MathPaper, which is similar to a word processor but which instead solves mathematical expressions the user supplies. The chapters in this part of the book extend MathPaper by developing both the front and back ends using a variety of Cocoa classes and methods. They introduce Cocoa'sdocument-based architecture, tasks, pipes, Rich Text format, handling document files, and using Quartz to draw in windows. Pa...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cambridge, Mass. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 756 p. , ill. ; , 24 cm
    Edition: 2nd ed. expanded & updated.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Web sites ; Security measures ; World Wide Web ; Security measures ; Electronic books ; local
    Abstract: Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Explorer and Netscape Navigator, and a wide range of current programs and products. In vast detail, the book covers: Web technology--The technological underpinnings of the modern Internet and the cryptographic foundations of e-commerce are discussed, along with SSL (the Secure Sockets Layer), the significance of the PKI (Public Key Infrastructure), and digital identification, including passwords, digital signatures, and biometrics. Web privacy and security for users--Learn the real risks to user privacy, including cookies, log files, identity theft, spam, web logs, and web bugs, and the most common risk, users' own willingness to provide e-commerce sites with personal information. Hostile mobile code in plug-ins, ActiveX controls, Java applets, and JavaScript, Flash, and Shockwave programs are also covered. Web server security--Administrators and service providers discover how to secure their systems and web services. Topics include CGI, PHP, SSL certificates, law enforcement issues, and more. Web content security--Zero in on web publishing issues for content providers, including intellectual property, copyright and trademark issues, P3P and privacy policies, digital payments, client-side digital signatures, code signing, pornography filtering and PICS, and other controls on web content. Nearly double the size of the first edition, this completely updated volume is destined to be the definitive reference on Web security risks and the techniques and technologies you can use to protect your privacy, your organization, your system, and your network.
    Note: Rev. ed. of: Web security & commerce. 1997. - Includes bibliographical references (p. 716-734) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 251 p. , ill. ; , 24 cm
    Keywords: Oracle (Computer file) ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: SQL Loader is a ubiquitous tool in the Oracle world. It has been shipped with Oracle since at least Version 6 and continues to be supported and enhanced with each new version of Oracle, including Oracle8 and Oracle8 i. The job of SQL Loader is to load data from flat files into an Oracle database. It's optimized for loading large volumes of data, and is flexible enough to handle virtually any input format.Almost every Oracle user has to use SQL Loader at one time or another, and DBAs are frequently called upon to load data for the users in their organization. Despite SQL Loader's wide availability and usage, few DBAs and developers know how to get the most out of it. Oracle SQL Loader: The Definitive Guide has everything you need to know to put SQLLoader to its best use: an introduction to SQL Loader, a reference to all of its syntax options, and most importantly, step-by-step instructions for all the SQL Loader tasks you'd want to perform--and maybe some you didn't realize you COULD perform.You'll learn how to construct the necessary control files and load from different types of files containing different types of data (e.g., fixed-width data, delimited data, and data of various datatypes). You'll also learn how to validate data, load it selectively, transform it as it is loaded, and recover after failure. This book explains how to optimize SQL Loader performance by adjusting the transaction size and using the new direct path option. It also covers the newest SQL Loader features--the loading of large object (LOB) columns and the new object types (nested tables, varying arrays, and object tables). Oracle SQL Loader: The Definitive Guide is an indispensable resource for anyone who is new to SQLLoader; a task-oriented learning tool for those who are already using it; and a quick reference for every user. If you want to take best advantage of an essential Oracle tool, you need this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Sebastapol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 387 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Database management ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Net8 is the fundamental Oracle technology that allows Oracle services and clients to communicate with each other over a network. Net8 is most often used to connect client software to Oracle database servers. It may also be used to connect database servers to one another, allowing communication between distributed databases. This practical guide provides the information that readers, especially database administrators, need to know in order to install configure, tune, and troubleshoot Net8. It discusses how Oracle's network architecture, products, and name resolution methods work, and it provides the details of client and server configuration using a variety of Oracle protocols and networking products, including: The Oracle Internet Directory (OID), Oracle's implementation of the standard Lightweight Directory Access Protocol (LDAP). This directory can be used to maintain a central repository of net service names that can be referenced by all clients. Oracle Names, a networking component used mainly in earlier versions of Oracle, that allows net service names to be defined centrally. Multi-Threaded Server (MTS), an environment in which the client connections share access to a pool of shared server processes. Oracle Connection Manager, a Net8 component that acts much like a router and provides protocol conversion, connection concentration, and access control. The book also describes the utilities Oracle provides to help manage a Net8 environment; these include the Listener Control Utility (lsnrctl), the Oracle Names Control Utility (namesctl), the Oracle Connection Manager Control Utility (cmctl), tnsping, and Net8 Assistant. In addition, it provides a variety of networking troubleshooting techniques and commonly encountered Net8 configuration problems, and provides complete syntax for all networking files and commands.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vii, 312 p. , ill. ; , 24 cm
    DDC: 323.44/8/0973
    Keywords: Computer security ; United States ; Privacy, Right of ; United States ; Electronic books ; local
    Abstract: Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours. Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril. Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before? Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: iv, 90 p. ; , 18 cm
    Edition: 1st ed.
    Keywords: Oracle (Computer file) ; Query languages (Computer science) ; Relational databases ; SQL*Plus (Computer program language) ; Electronic books ; local
    Abstract: This pocket reference provides quick reference information that will help you use SQL*Plus, Oracle's interactive query tool. It summarizes all of the SQL*Plus syntax, including the syntax for new Oracle8 i release 8.1.6 features. SQL*Plus is available at every Oracle site--from the largest data warehouse to the smallest single-user system--and it's a critical tool for virtually every Oracle user. Despite its wide use, few developers and DBAs know how powerful a tool SQL*Plus can be. This book boils down the most vital information from Gennick's best-selling book, Oracle SQL*Plus: The Definitive Guide , into an accessible summary. It concisely describes interacting with SQL*Plus, selecting data, formatting reports with SQL*Plus, and tuning SQL queries. It also contains quick references to the SQL*Plus commands and format elements. This book is an indispensable companion to O'Reilly bestselling book, Oracle SQL*Plus: The Definitive Guide , but it does not replace it; the larger book is truly the definitive guide, suitable for readers at all levels of expertise. The definitive guide describes the many tasks that SQL*Plus can perform, and provides a tutorial on many SQL*Plus topics. But this quick reference is an excellent, portable resource for readers who want a pocket-sized summary of SQL*Plus capabilities and a reminder of how to issue specific commands and formatting options for SQL*Plus. Table of Contents: Interacting with SQL*Plus Selecting Data Formatting Reports Tuning SQL SQL*Plus Format Elements SQL*Plus Command Reference
    Note: "Covers Oracle8i"--cover. - "Guide to SQL*Plus syntax"--cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 502 p. , ill. ; , 24 cm
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; Database management ; SQL*PLUS (Computer program language) ; Electronic books ; local
    Abstract: This book is the definitive guide to SQL*Plus. If you want to take best advantage of the power and flexibility of this popular Oracle tool, you need this book. SQL*Plus is an interactive query tool that is ubiquitous in the Oracle world. It is present in every Oracle installation and is available to almost every Oracle developer and database administrator. SQL*Plus has been shipped with Oracle since at least version 6. It continues to be supported and enhanced with each new version of Oracle, including Oracle8 and Oracle8i. It is still the only widely available tool for writing SQL scripts. Despite this wide availability and usage, few developers and DBAs know how powerful SQL*Plus really is. This book introduces SQL*Plus, includes a quick reference to all of its syntax options, and, most important, provides chapters that describe, in step-by-step fashion, how to perform all of the tasks that Oracle developers and DBAs want to perform with SQL*Plus -- and maybe some they didn't realize they COULD perform with SQL*Plus. You will learn how to write and execute script files, generate ad hoc reports, extract data from the database, query the data dictionary tables, customize your SQL*Plus environment, and use the SQL*Plus administrative features (new in Oracle8i). This book is an indispensable resource for readers who are new to SQL*Plus, a task-oriented learning tool for those who are already using it, and a quick reference for every user. A table of contents follows: Preface Introduction to SQL*Plus Interacting with SQL*Plus Generating Reports with SQL*Plus Writing SQL*Plus Scripts Extracting Data with SQL*Plus Exploring Your Database with SQL*Plus Advanced Scripting Tuning and Timing The Product User Profile Administration with SQL*Plus Customizing Your SQL*Plus Environment A. SQL*Plus Command Reference B. Connect Strings and the SQL*Plus Command Appendices
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Sebastopol : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 483 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic commerce ; Security measures ; Web sites ; Security measures ; World Wide Web ; Security measures ; Electronic books ; local
    Abstract: Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers--is this what the World Wide Web is really all about? Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks are and explains how you can minimize them. Whether you're a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tell you what you need to know. Entertaining as well as illuminating, it looks behind the headlines at the technologies, risks, and benefits of the Web. Whatever browser or server you are using, you and your system will benefit from this book. Topics include: User safety--browser vulnerabilities (with an emphasis on Netscape Navigator and Microsoft Internet Explorer), privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins. Digital certificates--what they are, how they assure identity in a networked environment, how certification authorities and server certificates work, and what code signing all about. Cryptography--an overview of how encryption works on the Internet and how different algorithms and programs are being used today. Web server security--detailed technical information about SSL (Secure Socket Layer), TLS (Transport Layer Security), host security, server access methods, and secure CGI/API programming. Commerce and society--how digital payments work, what blocking software and censorship technology (e.g., PICS and RSACi) is about, and what civil and criminal issues you need to understand.
    Note: On cover: Risks, technologies, and strategies. - Includes bibliographical references (p. 450-470) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...