Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2000-2004  (77)
  • Safari Tech Books Online  (76)
  • Kreines, David C  (3)
  • Hotka, Dan  (2)
  • Computer security  (39)
  • Oracle (Computer file)  (38)
Datasource
Material
Language
Years
Year
  • 1
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Inside Java™ 2 Platform Security , the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java experts at Sun Microsystems, provides a detailed look into the central workings of the Java security architecture and describes tools and techniques for successful implementation on even the most demanding network computing environment. While Java has always provided a stronger security model than other platforms, this book reviews all the methods and practices required to improve security without sacrificing functionality. With tips on how to customize, extend, and refine the Java security architecture, users will have everything they need to protect their information assets from both external and internal threats. This book's in-depth coverage encompasses security architecture, deployment, customization, new developments, and much more. Security fundamentals Secure class loading Specifying fine-grained security policy Enforcing security policy with AccessController, SecurityManager, and more Digital certificates, certification paths, signed code, JAAS, and other authentication measures Java-based cryptography with code examples JSSE, Java GSS-API, and RMI for network security Previews of other platforms for security, including Java Card, J2ME and Jini Designed for both the system administrator and software practitioner, this book delivers vital knowledge for building and maintaining a secure system using the Java 2 platform. With detailed code and usage examples throughout, Inside Java™ 2 Platform Security, Second Edition , is an indispensable resource for all platform security needs. The Java™ Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The books in this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java™ 2 platform.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 581 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
    Note: Includes bibliographical references (p. 563) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 647 p. , ill. ; , 23 cm
    Series Statement: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xvii, 262 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Application software ; Development ; Client/server computing ; Computer software ; Development ; Database management ; Computer programs ; Relational databases ; Web servers ; Electronic books ; local
    Abstract: The new Oracle Application Server offers a wide range of functionality, including Java runtime and development tools, portal development tools, business intelligence, single sign-on identify management, and much more. It's so powerful and complex, in fact, that many people who use the product (or are considering using it) are familiar with only a portion of the entire range of its capabilities. The choices can be overwhelming. Few people grasp how the larger issues--such as the interplay between components or the various architectural choices in the product--play out in the Oracle Application Server. This new guide provides the perfect introduction to the Oracle Application Server for users of any level. Regardless of which of the server's capabilities you use, you'll benefit from this tightly focused, all-in-one technical overview. It's written for anyone who is concerned with using and managing web servers, doing Java development and deployment, using Oracle's own tools--like Forms and Reports, using or developing for Oracle Portal, or those who use and administer business intelligence, mobile or integration software. Divided into three concise sections, the book covers server basics, core components, and server functionality. The book leads with the history of Oracle Application Server, its architecture, management, standards, and third-party support for languages and tools such as Java, Perl, and HTTP. The next section covers Oracle's web server, containers for Java web caching, and the server's security features. And finally, the book discusses HTML development, Java development, and Oracle development. Although the book refers mainly to Oracle Application Server 10g, the authors also describe features in earlier product releases where necessary, particularly Oracle9i Application Server. More comprehensible than a large reference and more detailed than a primer, the book provides a foundation for understanding and using Oracle Application Server effectively and efficiently. Readers concentrate on the most important issues and components of the server, focusing primarily on principles rather than syntax. Designed to be the ideal first OracleAS book, Oracle Application Server 10g Essentials offers Oracle application developers and administrators everything they need to know about this powerful server.
    Note: "Architecture and components"--Cover. - Includes bibliographical references (p. 233-240) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 426 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: JavaBeans ; Computer security ; Java (Computer program language) ; Servlets ; Web services ; Electronic books ; local
    Abstract: J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place, at the right time, and in the right way. Kumar covers every significant J2SE and J2EE security mechanism, presenting practical implementation techniques for the entire J2EE project lifecycle: analysis, design, development, deployment and operations. The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server.
    Note: Includes bibliographical references (p. 413-414) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xvi, 411 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Computer software ; Development ; Relational databases ; Electronic books ; local
    Abstract: Complete tutorial for database developers! Thorough coverage of PL/SQL Practical "cookbook" techniques Effectively create and manage complex databases with Oracle! Systems and database expert Kevin Owens explores PL/SQL, Oracle's answer to the Structured Query Language (SQL), and teaches you what you need to know to build robust and complex databases for your business. Using easy-to-follow instructions and examples, this book presents techniques to take advantage of Oracle features such as triggers and stored procedures-features that allow your databases to incorporate business rules which are easy to manage and modify as the business evolves. Topics covered include: Viewing constraints in the data dictionary Complex rule enforcement PL/SQL program units and language features Data types and composite structure Error handling and exceptions Inter-process communications Declarative constraints, including primary key, unique, foreign key, check, and much more Programming Oracle Triggers and Stored Procedures, Third Edition, is an invaluable resource for database developers, designers, and project leaders looking to build and maintain truly intelligent, complex databases
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Language: English
    Pages: xvii, 374 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: An enormous system comprising myriad technologies, options, and releases, Oracle's complexities have spawned numerous areas of specialization. For each area of specialization there are equally specialized how-to books and manuals. O'Reilly's Oracle Essentials claims a unique place among these books. Rather than focusing on one area, the book explains the foundational concepts of the Oracle technology and the core technical and business aspects of using it.The new edition of this classic book, Oracle Essentials, 3rd Edition: Oracle Database 10 g, distills a vast amount of knowledge into an easy-to-read volume covering every aspect of the Oracle database. Readers of all levels will learn about Oracle's features and technologies, including the product line, architecture, data structures, networking, concurrency, tuning, and much more.Featuring focused text, abundant illustrations, and helpful hints, the new edition offers a valuable overview of Oracle's Database 10 g --the industry's first database to support grid computing. Recent releases such as Oracle 9 i and 8 i are also covered. The book contains chapters on: Oracle products, options, and overall architecture for Oracle 10 g and prior recent releases Installing and running Oracle: how to configure, start up, and shut down the database, and various networking issues Oracle data structures, datatypes, and ways of extending datatypes, with an introduction to Oracle objects (e.g., tables, views, indexes) Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle performance: characteristics of disk, memory, and CPU tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Network deployment: using Oracle as an Internet computing platform and for grid computing What's new in Oracle 10 g : a summary of the database changes described in the book Oracle Essentials, 3rd Edition: Oracle Database 10 g was written for anyone whose job involves managing or building systems using Oracle DBMS technology or working with staff that uses Oracle technology. This book is the perfect all-in-one source for understanding the complexities and capabilities of Oracle.
    Note: "What you need to know about oracle database architecture and features"--Cover. - Includes bibliographical references (p. 347-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 472 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The vast majority of Oracle SQL books discuss some syntax, provide the barest rudiments of using Oracle SQL, and perhaps include a few simple examples. It might be enough to pass a survey course, or give you some buzz words to drop in conversation with real Oracle DBAs. But if you use Oracle SQL on a regular basis, you want much more. You want to access the full power of SQL to write queries in an Oracle environment. You want a solid understanding of what's possible with Oracle SQL, creative techniques for writing effective and accurate queries, and the practical, hands-on information that leads to true mastery of the language. Simply put, you want useful, expert best practices that can be put to work immediately, not just non-vendor specific overview or theory.Updated to cover the latest version of Oracle, Oracle 10g, this edition of the highly regarded Mastering Oracle SQL has a stronger focus on technique and on Oracle's implementation of SQL than any other book on the market. It covers Oracle s vast library of built-in functions, the full range of Oracle SQL query-writing features, regular expression support, new aggregate and analytic functions, subqueries in the SELECT and WITH clauses, multiset union operators, enhanced support for hierarchical queries: leaf and loop detection, and the CONNECT_BY_ROOT operator, new partitioning methods (some introduced in Oracle9i Release 2), and the native XML datatype, XMLType. Mastering Oracle SQL , 2nd Edition fills the gap between the sometimes spotty vendor documentation, and other books on SQL that just don't explore the full depth of what is possible with Oracle-specific SQL. For those who want to harness the untapped (and often overlooked) power of Oracle SQL, this essential guide for putting Oracle SQL to work will prove invaluable.
    Note: "Covers Oracle database 10g"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xvii, 291 p. , ill. ; , 23 cm
    DDC: 005.75/6
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: Fast, easy automation for every Oracle 9 i and 10 g DBA! Quick access to real-world examples Installation, database creation, management, monitoring, tuning, and backup/recovery Oracle Universal Installer (OUI), Oracle Net Configuration Assistant (NetCA), and Oracle Database Configuration Assistant (DBCA) The fast, practical Oracle 9 i /10 g automation reference for every DBA! Automate Oracle-and save your time for more important tasks! This is the Oracle automation reference every working Oracle DBA needs... concise, straightforward, and incredibly easy to use . Discover proven solutions for automating installation, database creation, management, monitoring, tuning, backup/recovery, and more. Keep this book by your desk, near your server...wherever you need fast, reliable automation solutions right now ! Master scripting for both Oracle 9 i and Oracle 10 g ! Use Oracle Universal Installer to create response files for automating any installation Use Oracle Network Configuration Assistant (NetCA) to configure network components during installation Use Oracle Database Configuration Assistant (DBCA) to create and clone databases, and to reverse engineer them into templates and scripts Manage files and tablespaces, tune memory, perform backup/recovery, schedule automated administration tasks, and more Extend and customize any script to your own needs Includes concise reference to Perl DBI and its Oracle-specific components-with real-world examples and syntax
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 492 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Web sites ; Security measures ; Electronic books ; local
    Abstract: "Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..." --From the Foreword by William C. Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." --Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed ), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense. Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java™ application servers; how to harden your Java™ Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxv, 762 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: C (Computer program language) ; C++ (Computer program language) ; Computer security ; Computer software ; Development ; Electronic books ; local
    Abstract: Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book's more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix® (including Linux®) and Windows® environments. Readers will learn: How to avoid common programming errors, such as buffer overflows, race conditions, and format string problems How to properly SSL-enable applications How to create secure channels for client-server communication without SSL How to integrate Public Key Infrastructure (PKI) into applications Best practices for using cryptography properly Techniques and strategies for properly validating input to programs How to launch programs securely How to use file access mechanisms properly Techniques for protecting applications from reverse engineering The book's web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers. Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer's library, a code companion developers will turn to again and again as they seek to protect their systems from attackers and reduce the risks they face in today's dangerous world.
    Note: "Covers Unix and Windows"--Cover. - "Recipes for cryptography, authentication, networking, input validation & more"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxv, 388 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: Oracle system performance inefficiencies often go undetected for months or even years--even under intense scrutiny--because traditional Oracle performance analysis methods and tools are fundamentally flawed. They're unreliable and inefficient.Oracle DBAs and developers are all too familiar with the outlay of time and resources, blown budgets, missed deadlines, and marginally effective performance fiddling that is commonplace with traditional methods of Oracle performance tuning. In this crucial book, Cary Millsap, former VP of Oracle's System Performance Group, clearly and concisely explains how to use Oracle's response time statistics to diagnose and repair performance problems. Cary also shows how "queueing theory" can be applied to response time statistics to predict the impact of upgrades and other system changes. Optimizing Oracle Performance eliminates the time-consuming, trial-and-error guesswork inherent in most conventional approaches to tuning. You can determine exactly where a system's performance problem is, and with equal importance, where it is not, in just a few minutes--even if the problem is several years old. Optimizing Oracle Performance cuts a path through the complexity of current tuning methods, and streamlines an approach that focuses on optimization techniques that any DBA can use quickly and successfully to make noticeable--even dramatic--improvements.For example, the one thing database users care most about is response time. Naturally, DBAs focus much of their time and effort towards improving response time. But it is entirely too easy to spend hundreds of hours to improve important system metrics such as hit ratios, average latencies, and wait times, only to find users are unable to perceive the difference. And an expensive hardware upgrade may not help either.It doesn't have to be that way. Technological advances have added impact, efficiency, measurability, predictive capacity, reliability, speed, and practicality to the science of Oracle performance optimization. Optimizing Oracle Performance shows you how to slash the frustration and expense associated with unraveling the true root cause of any type of performance problem, and reliably predict future performance.The price of this essential book will be paid back in hours saved the first time its methods are used.
    Note: "A practitioner's guide to optimizing response time"--Cover. - Includes bibliographical references (p. 374-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Language: English
    Pages: vi, 121 p. ; , 18 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: Like most PL/SQL programmers, you've found Oracle PL/SQL Programming to be a reference book you can't do without. Packed with examples and recommendations, it's a book that has helped everyone, from Oracle Forms developers to database administrators, make the most of PL/SQL. But you can't always carry it with you, and even at your desk there are times when you just need a reminder, a quick answer to a problem you're up against. For times like those, PL/SQL experts Stephen Feuerstein, Bill Pribyl, and Chip Dawes have written a new edition of Oracle PL/SQL Language Pocket Reference . Updated for Oracle9i, this little book is easy to take with you and use anywhere for quick problem solving. The second edition of the Oracle PL/SQL Language Pocket Reference boils down the most vital information from Oracle PL/SQL Programming into a convenient quick reference to PL/SQL basics. This compact book will be indispensable for new and seasoned Oracle database developers alike. It summarizes features available in Oracle9i and provides essential information on PL/SQL block structure, fundamental language elements, control statements, and use of procedures, functions, packages, triggers, Oracle objects, external procedures, and methods of calling Java classes from PL/SQL. O'Reilly's Pocket References have become a favorite among developers and database administrators everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new edition of Oracle PL/SQL Language Pocket Reference is the book you'll want to have.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Beijing, [China] ; : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xvii, 906 p. , ill. ; , 23 cm
    Keywords: Oracle (Computer file) ; Relational databases ; Computer programs ; Electronic books ; local
    Abstract: Introduced a quarter-century ago, the Oracle database remains the leading enterprise relational database management system (RDBMS) in the world. Oracle is a complex system, offering a myriad of products, languages, and tools. Frequent updates, releases, and editions complicate the ability of Oracle users to keep up with the huge amounts of frequently changing information about the database and its capabilities.The goal of Oracle in a Nutshell is to pull together the most essential information on Oracle architecture, syntax, and user interfaces. The content and format of this book, an admirable addition to O'Reilly's respected In-a-Nutshell line, combine to boil down vital Oracle commands, language constructs, parameters, and file formats in a succinct and highly accessible desktop reference. Oracle in a Nutshell covers the information that database administrators PL/SQL and Java developers, and system, network, and security administrators need as they manage Oracle databases and write code for these databases. It includes: Oracle Foundations--Overview of the Oracle architecture (memory structures and fundamental concepts), Oracle's various editions and packaging options, summary of the initialization file parameters and data dictionary views, and fundamentals of Oracle's concurrency scheme, security mechanisms (privileges, profiles, roles), and networking files (TNSNAMES.ORA, SQLNET.ORA, LISTENER.ORA, DAP.ORA, NAMES.ORA, CMAN.ORA) and options. Oracle Languages--Syntax summary for SQL language statements, SQL function calls PL/SQL language statements and characteristics, PL/SQL built-in package headers, and Java (JDBC and SQLJ) interfaces to the Oracle database. Oracle Tools--Commands provided with SQL Plus, SQL Loader, Import and Export, Oracle Recovery Manager (RMAN) and other backup/recovery methods, Oracle Enterprise Manager, and various performance tuning tools (Explain Plan, TKPROF, AUTOTRACE, UTLBSTAT, UTLESTAT, Statspack). Appendixes--Summary of Oracle datatypes, operators, expressions, conditions, numeric and date formats, and resources for additional reading.
    Note: Includes bibliographical references (p. 853-855) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Language: English
    Pages: xxix, 954 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: UNIX (Computer file) ; Computer security ; Internet ; Congresses ; Operating systems (Computers) ; Electronic books ; local
    Abstract: When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
    Note: Includes bibliographical references (p. 873-895) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Boston, MA : ProQuest Information and Learning Company | Boston, MA :Safari,
    Language: English
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Cryptography ; Microsoft .NET ; Electronic books ; local
    Abstract: Learn how to make your .NET applications secure! Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. NET Security and Cryptography is a practical and comprehensive guide to implementing both the security and the cryptography features found in the .NET platform. The authors provide numerous clear and focused examples in both C# and Visual Basic .NET, as well as detailed commentary on how the code works. They cover topics in a logical sequence and context, where they are most relevant and most easily understood. All of the sample code is available online at . This book will allow developers to: Develop a solid basis in the theory of cryptography, so they can understand how the security tools in the .NET Framework function Learn to use symmetric algorithms, asymmetric algorithms, and digital signatures Master both traditional encryption programming as well as the new techniques of XML encryption and XML signatures Learn how these tools apply to ASP.NET and Web Services security
    Note: ELECTRONIC BOOK. - From: ProQuest--Title screen. - Title from title screen. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 662 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: Build Oracle PL/SQL applications-now. Fully updated for Oracle 9i No Oracle PL/SQL experience necessary. Real-life labs and "Test Your Thinking" Q&As Start developing applications with Oracle PL/SQL-fast. This integrated book-and-Web learning solution teaches all the Oracle PL/SQL skills you need, hands on, through real-world labs, exercises, projects, and a complete Web-based training site. Completely updated for Oracle 9i, it covers all the fundamentals-and a whole lot more. Master PL/SQL syntax, iterative and conditional control, scoping, anchored datatypes, cursors, triggers, security, tables, and packaging-plus powerful new techniques for working with exceptions, cursors, collections, and records. Your free Web-based training module includes a Virtual Study Lounge where you can interact with other learners, work on new projects, and get updates. Totally integrated with a FREE, state-of-the-art Oracle 9i learning Web site. Every Prentice Hall Oracle Interactive Workbook is fully integrated with its own exclusive Web site, giving you all this and more: "Test Your Thinking" project solutions and detailed explanations Additional self-review exercises with instant feedback and explanations An exclusive Virtual Study Lounge where you can interact with other students. Just the facts. No endless, boring discussions here. You'll learn hands on through practical exercises, self-review questions, and real-world answers. Exclusive "Test Your Thinking" projects guarantee you'll go beyond rote knowledge to really master the subject. It's an integrated learning system that's proven to work. Dozens of exercises cover the real-world tasks that matter most. Hundreds of self-review questions and answers make sure you understand.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xli, 1084 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "This is an excellent text that should be read by every computer security professional and student." -Dick Kemmerer, University of California, Santa Barbara. "This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!" -Marvin Schaefer, Former Chief Scientist, National Computer Security Center, NSA This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively demonstrates that computer security is an art as well as a science. Computer Security: Art and Science includes detailed discussions on: The nature and challenges of computer security The relationship between policy and security The role and application of cryptography The mechanisms used to implement policies Methodologies and technologies for assurance Vulnerability analysis and intrusion detection Computer Security discusses different policy models, and presents mechanisms that can be used to enforce these policies. It concludes with examples that show how to apply the principles discussed in earlier sections, beginning with networks and moving on to systems, users, and programs. This important work is essential for anyone who needs to understand, implement, or maintain a secure network or computer system. 0201440997B10252002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xiv, 529 p. , ill. ; , 23 cm
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Database management ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The Oracle SQL every DBA needs-fast and easy! Covers all the core day-to-day tasks DBAs are responsible for Quick access to SQL commands, operators, functions, data dictionary views, and more Includes dozens of easy-to-understand syntax diagrams The fast, practical Oracle SQL reference for every Oracle DBA! If you're a working Oracle DBA, here's the Oracle SQL reference you've been searching for-simple, straightforward, and incredibly easy to use! There's no faster way to discover the exact syntax you need...refresh your memory about that option you haven't used lately...find the name of that view you know exists...start using that new Oracle 9 i feature you haven't tried yet. Keep it by your desk, near your server...wherever you need fast, reliable answers right this minute! Covers Oracle SQL through Oracle9 i Release 2 Clear, well-organized tables of operators, functions, format models, privileges, and reserved words Complete command reference: syntax and options for every Oracle SQL command Standard "railroad" syntax diagrams make it easy to write correct syntax Handy listings of data dictionary views and dynamic performance tables
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xx, 745 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Oracle (Computer file) ; Application software ; Development ; Internet programming ; PL/SQL (Computer program language) ; Electronic books ; local
    Abstract: The hands-on, rapid-mastery guide to Oracle PL/SQL Web development. Start building Oracle 9i PL/SQL Web applications-hands on Covers the entire development lifecycle, from design to deployment Provides instruction for PL/SQL Server Pages, the PL/SQL Web Toolkit, and the Oracle 9i Application Server Introduces Web basics-HTML, JavaScript, basic UNIX and FTP, and image handling Reviews PL/SQL and SQL concepts Includes practical tips and troubleshooting help Leverage your SQL and PL/SQL experience to build powerful data-driven Web and e-business applications-starting right now! In this book, a team of Columbia University PL/SQL instructors cover the core pieces of what you need to know, from preliminary configuration to deployment of dynamic, data-driven applications. You'll find practical examples, hands-on exercises, and dozens of practical tips and solutions designed to save you time, effort, and frustration. One step at a time, discover how to: Configure Oracle's Internet Application Server Control Web applications and servers remotely Build Oracle Web applications with PL/SQL Create dynamic, data-driven pages Test, debug, troubleshoot, and deploy your applications Maintain and optimize running Web applications Whether you've been writing simple queries or complex PL/SQL code, this book takes your database development skills onto the Web-and into the future!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xx, 385 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Mac OS ; Computer networks ; Security measures ; Computer security ; Macintosh (Computer) ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
    Note: Includes bibliographical references (p. 361-369) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 945 p. , ill. ; , 23 cm. +
    Edition: 4th ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
    Note: Includes bibliographical references (p. [731]-759) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 202 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and military computers --at an alarming rate. Despite their myriad manifestations and different targets, nearly all attacks have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding , by Mark G. Graff and Ken vanWyk, looks at the problem of bad code in a new way. Packed with advice based on the authors' decades of experience in the computer security field, this concise and highly readable book explains why so much code today is filled with vulnerabilities, and tells readers what they must do to avoid writing code that can be exploited by attackers. Writing secure code isn't easy, and there are no quick fixes to bad code. To build code that repels attack, readers need to be vigilant through each stage of the entire code lifecycle: Architecture: during this stage, applying security principles such as "least privilege" will help limit even the impact of successful attempts to subvert software. Design: during this stage, designers must determine how programs will behave when confronted with fatally flawed input data. The book also offers advice about performing security retrofitting when you don't have the source code -- ways of protecting software from being exploited even if bugs can't be fixed. Implementation: during this stage, programmers must sanitize all program input (the character streams representing a programs' entire interface with its environment -- not just the command lines and environment variables that are the focus of most security analysis). Testing: during this stage, programs must be checked using both static code checkers and runtime testing methods -- for example, the fault injection systems now available to check for the presence of such flaws as buffer overflow. Operations: during this stage, patch updates must be installed in a timely fashion. In early 2003, sites that had diligently applied Microsoft SQL Server updates were spared the impact of the Slammer worm that did serious damage to thousands of systems. Beyond the technical, Secure Coding sheds new light on the economic, psychological, and sheer practical reasons why...
    Note: Includes bibliographical references (p. 185-194) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxi, 309 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "This is a really good book ... it spells out the motherhood and apple pie of information security in a highly readable way." -Warwick Ford, CTO, VeriSign, Inc. "An excellent security read! Breaks down a complex concept into a simple and easy-to-understand concept." -Vivek Shivananda, President Redefine your organization's information security Learn to think and act like a top security guru! Understand the founding principles of security itself and make better decisions Make your security solutions more effective, easily manageable, and less costly! Make smarter, more informed security decisions for your company Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice-that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem-they invariably wind up with expensive, but deeply flawed, solutions. The only way out of this trap is to change one's way of thinking about security: to grasp the reasoning, philosophy, and logic that underlie all successful security efforts. In Inside the Security Mind: Making the Tough Decisions , security expert Kevin Day teaches you how to approach information security the way the top gurus do-as an art, rather than a collection of technologies. By applying this discipline, your solutions will be more secure and less burdensome in time, expense, and effort. The first part of the book explains the practice of breaking security decisions down into a set of simple rules. These rules may then be applied to make solid security decisions in almost any environment. In the second part, Day uses a series of practical examples to illustrate exactly how the discipline works in practice. Additional material covers: Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security Ongoing security measures-recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks This book is essential reading for anyone working to keep information secure. Technical and non-technical IT professionals alike can apply Day's concepts and strategies to become security gurus, while seasoned practitioners will benefit from th...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvi, 420 p. ; , 24 cm
    DDC: 005.1
    Keywords: Oracle (Computer file) ; Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: The hands-on tutorial for Java developers who want to integrate their applications with the industy leading Oracle 8i and 9i databases. Provides an introduction to database design, including the essentials of SQL, to get Java programmers started with Oracle comfortably, confidently and quickly! Covers important Java database technologies, such as JDBC and JDO-step-by-step, with examples. Covers both Oracle 8i and 9I-including new 9i features, such as object-relational features, all highlighted with examples.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly
    Language: English
    Pages: 1 online resource (iv, 140 p.) , ill.
    Edition: 1st ed.
    Parallel Title: Erscheint auch als
    Keywords: Oracle (Computer file) ; Database management ; Electronic books ; Electronic books ; local
    Abstract: If you work with Oracle, then you don't need to be told that the data dictionary is large and complex, and grows larger with each new Oracle release. It's one of the basic elements of the Oracle database you interact with regularly, but the sheer number of tables and views makes it difficult to remember which view you need, much less the name of the specific column. Want to make it simpler? The Oracle Data Dictionary Pocket Reference puts all the information you need right at your fingertips. Its handy and compact format lets you locate the table and view you need effortlessly without stopping to interrupt your work Oracle Data Dictionary Pocket Reference gives DBAs and developers at any level quick and easy access to the data dictionary in Oracle's latest database, Oracle9i. This pocket-sized book provides a complete list of the most commonly used tables and views in the Oracle9i data dictionary, intelligently arranged for quick reference. It also includes column names and descriptions for each of the tables and views, as well as helpful tips, warnings, and usage examples.O'Reilly's Pocket References have become a favorite among developers and database administrators everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and want to check your facts quickly, the Oracle Data Dictionary Pocket Reference is the book to have close by.
    Note: "Views, columns & tips"--Cover. - Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xx, 340 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: This resource provides best practices, step-by-step code walk-throughs, and concise explanations of key security terms, issues, and jargon to help developers create and run secure code with Visual Basic.
    Note: Includes index. - Includes link to companion web site. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 768 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer security ; Data encryption (Computer science) ; Electronic books ; local
    Abstract: Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process-from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors-two battle-scarred veterans who have solved some of the industry's toughest security problems-provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers, testers, and program managers.
    Note: Includes bibliographical references (p. 741-745) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: vii, 297 p. , ill. ; , 23 cm
    DDC: 005.7585
    Keywords: Oracle (Computer file) ; Application software ; Database design ; Electronic books ; local
    Abstract: TOAD Handbook is a guide for developing Oracle applications and administering Oracle databases with TOAD. Starting with installation and configuration, the book covers the TOAD SQL editors in depth, including dozens of helpful, undocumented features. Later chapters discuss reporting and exporting data and using several add-on tools designed to enhance TOAD development. Along the way, the authors provide critical insights into the workings of TOAD and how developers can use it to make the most of their applications. Includes a foreword by Jim McDaniel, the inventor of TOAD.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxix, 746 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Privacy, Right of ; Electronic books ; local
    Abstract: The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them. Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows-with symptoms and cures Clear, accessible introduction to cryptography-without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
    Note: Includes bibliographical references (p. 691-725) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 208 p. , ill. ; , 24 cm
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Data warehousing ; Electronic books ; local
    Abstract: The definitive, real-world guide to Oracle data warehousing Maximizing performance, flexibility, and manageability in production environments Hardware/software architectures, star schema design, partitioning, and more Industrial strength data loading and query optimization techniques By the world-renowned architect of 7-Eleven's multi-terabyte datawarehouse Maximize Oracle data warehouse performance, flexibility, and manageability Oracle DBAs finally have a definitive guide to every aspect of designing, constructing, tuning, and maintaining star schema data warehouses with Oracle 8i and 9i. Bert Scalzo, one of the world's leading Oracle data warehousing experts, offers practical, hard-won lessons and breakthrough techniques for maximizing performance, flexibility, and manageability in any production environment. Coverage includes: Data warehousing fundamentals for DBAs--including what a data warehouse isn't Planning software architecture: business intelligence, user interfaces, Oracle versions, OS platforms, and more Planning hardware architecture: CPUs, memory, disk space, and configuration Radically different star schema design for radically improved performance Tuning ad-hoc queries for lightning speed Industrial-strength data loading techniques Aggregate tables: maximizing performance benefits, minimizing complexity tradeoffs Improving manageability: The right ways to partition Data warehouse administration: Backup/recovery, space and extent management, updates, patches, and more
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 452 p. ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Computer hackers ; Computer security ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: "The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute "One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action." --From the Foreword by Marcus J. Ranum "From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today." --Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal. Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets. Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots. With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable. 0321108957B08282002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [United States] : IBM International Technical Support Organization | Boston, MA :Safari,
    Language: English
    Pages: xvi, 540 p. " , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: WebSphere ; Computer security ; Electronic books ; local
    Abstract: This IBM Redbook provides IT Architects, IT Specialists, application designers, application developers, application assemblers, application deployers and consultants with information necessary to design, develop and deploy secure e-business applications using WebSphere Application Server V5. Part 1, WebSphere security provides a detailed overview of WebSphere Application Server V5 Security. It starts with J2EE security, then goes into details about the modules and components of a J2EE enterprise application; it also covers programmatic security techniques. The last chapter in this part shows all the security-related administrative items in WebSphere Application Server V5. Part 2, End-to-end security offers details about end-to-end security solutions where WebSphere Application Server V5 is part of an enterprise solution. You will find an introduction to Patterns for e-business, in which security is in focus. A very important chapter in this part will discuss the integration between WebSphere Application Server V5 and Tivoli Access Manager. Finally, the Appendixes provide additional information related to chapters in the previous two parts and also describe the sample application available with the book.
    Note: "December 2002.". - Includes bibliographical references (p. 525-527) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vi, 113 p. ; , 18 cm
    Edition: 2nd ed.
    Keywords: Oracle (Computer file) ; Database management ; Query languages (Computer science) ; Relational databases ; SQL*PLUS (Computer program language) ; Electronic books ; local
    Abstract: SQL*Plus is available at every Oracle site--from the largest data warehouse to the smallest single-user system--and it's a critical tool for virtually every Oracle user. Despite its wide use, few developers and DBAs know how powerful a tool SQL*Plus can be. This pocket reference provides quick reference information that will help you use SQL*Plus, Oracle's interactive query tool. It summarizes all of the SQL*Plus syntax, including the syntax for the Oracle9i release. This book boils down the most vital information from Gennick's best-selling book, "Oracle SQL8Plus: The Definitive Guide", into an accessible summary and works as a vital companion to the larger book. It concisely describes interacting with SQL*Plus, selecting data, formatting reports with SQL*Plus, and tuning SQL queries. It also contains quick references to the SQL*Plus commands and format elements. The new 2nd edition of our Oracle SQL*Plus Pocket Reference includes many new features for Oracle9i (e.g., COALESCE function, searched CASE expressions, new table join syntax, partition operations, MERGE statement, and syntax changes in existing SQL*Plus statements such as ACCEPT, DESRIBE, HELP, and SET) It also adds sections on basic SQL (a much-requested feature): INSERT, DELETE, UPDATE, SELECT, and transaction management. The pocket reference size is especially appropriate for this particular subject, since Oracle SQL*Plus is used on every possible platform, it's particularly convenient to be able to carry a small book around from office computer to home computer to laptop.
    Note: "A guide to SQL*Plus syntax"--Cover. - "Covers Oracle9i"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 989 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.7585
    Keywords: Oracle (Computer file) ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: Nearly a quarter-million PL/SQL programmers--novices and experienced developers alike--have found the first and second editions of Oracle PL/SQL Programming to be indispensable references to this powerful language. Packed with examples and recommendations, this book has helped everyone, from Oracle Forms developers to database administrators, make the most of PL/SQL. This new edition is a comprehensive update of the original book, covering all versions of PL/SQL through Oracle9i Release 2. It adds much-requested new chapters on how to create and run PL/SQL programs, call Java methods from within PL/SQL, and define and use database triggers. An extensive new chapter--designed especially for experienced PL/SQL developers--describes PL/SQL's runtime architecture and how to use knowledge of Oracle internals to get the best performance from PL/SQL. The book contains information about the latest Oracle9i PL/SQL features, including: Record-based DML: You can now use records in INSERT and DELETE statements. Table functions: These are functions that return a result set (in the form of a PL/SQL collection). Such functions existed in Oracle8i but they are now much expanded. New and improved datatypes: Oracle now offers dramatically improved support for timestamps, time zone management, and interval calculations. In addition, the XMLType datatype has now been implemented. Inheritance for object types: You can now define a hierarchy of object types (which were first introduced in Oracle8). Enhancements to PL/SQL collections. PL/SQL now supports multiple-level collections (nesting collections within collections), as well as associative arrays (previously called index-by tables), which allow you to index by PLS_INTEGER and VARCHAR2. Native compilation of PL/SQL code: PL/SQL source code can now optionally be compiled into native object code that is linked into Oracle. Part I, Programming in PL/SQL Part II, PL/SQL Program Structure Part III, PL/SQL Program Data Part IV, SQL in PL/SQL Part V, PL/SQL Application Construction Part VI, Advanced PL/SQL Topics The book is divided into six parts: Even if you've been a PL/SQL developer for years, you'll find an enormous amount of new and revised information in this third edition and on its companion web site. If you're new to PL/SQL, you'll find Oracle PL/SQL Programming an invaluable companion on the road to mastery.
    Note: Previous ed.: 1997. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 477 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: JDBC is the key Java technology for relational database access. Oracle is arguably the most widely used relational database platform in the world. In this book, Donald Bales brings these two technologies together, and shows you how to leverage the full power of Oracle's implementation of JDBC. You begin by learning the all-important mysteries of establishing database connections. This can be one of the most frustrating areas for programmers new to JDBC, and Donald covers it well with detailed information and examples showing how to make database connections from applications, applets, Servlets, and even from Java programs running within the database itself. Next comes thorough coverage of JDBC's relational SQL features. You'll learn how to issue SQL statements and get results back from the database, how to read and write data from large, streaming data types such as BLOBs, CLOBs, and BFILEs, and you'll learn how to interface with Oracle's other built-in programming language, PL/SQL. If you're taking advantage of the Oracle's relatively new ability to create object tables and column objects based on user-defined datatypes, you'll be pleased with Don's thorough treatment of this subject. Don shows you how to use JPublisher and JDBC to work seamlessly with Oracle database objects from within Java programs. You'll also learn how to access nested tables and arrays using JDBC. Donald concludes the book with a discussion of transaction management, locking, concurrency, and performance--topics that every professional JDBC programmer must be familiar with. If you write Java programs to run against an Oracle database, this book is a must-have.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 602 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Oracle (Computer file) ; Perl (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: Perl is a very powerful tool for Oracle database administrators, but too few DBAs realize how helpful Perl can be in managing, monitoring, and tuning Oracle databases. Whether you're responsible for Oracle9i, Oracle8i, or earlier databases, you'll find Perl an invaluable addition to your database administration arsenal.You don't need to be a Perl expert to use the excellent applications and scripts described in Perl for Oracle DBAs. The book explains what you need to know about Perl, provides a wealth of ready-to-use scripts developed especially for Oracle DBAs, and suggests many resources for further exploration. The book covers: The Perl language -- an introduction to Perl, its rich history and culture, and its extensive text processing and data transformation capabilities. The Perl/Oracle architecture -- Detailed information about Perl DBI, DBD::Oracle, the Oracle Call Interface (OCI), Oracle::OCI, extproc_perl, and mod_perl, the modules that allow Perl programs to communicate with Oracle databases. Perl applications for Oracle DBAs -- Profiles of the best Perl open source applications available for use and customization by Oracle DBAs: Perl/Tk, OraExplain, StatsView, Orac, DDL::Oracle, SchemaDiff, Senora, DBD::Chart, SchemaView-Plus, Oracletool, Karma, Embperl, and Mason. The Perl Database Administration (PDBA) Toolkit -- a comprehensive suite of specialized, ready-to-use scripts designed to help Oracle DBAs perform both routine and special-purpose administrative tasks: monitoring the Oracle alert log and databases, creating and managing Oracle user accounts, maintaining indexes and extents, extracting DDL and data, troubleshooting and tuning database problems, and much more. The book also explains how Oracle DBAs and developers can extend the toolkit and solve their own database administration problems using Perl.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Language: English
    Pages: xiv, 699 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical information. The book offers clear discussion of privacy issues as they affect everyday users of digital devices, covering all current and near-future devices and technologies that pose privacy risks to users.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: vi, 102 p. , ill. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: One of the most important challenges faced by Oracle database administrators and Oracle developers is the need to tune SQL statements so that they execute efficiently. Poorly tuned SQL statements are one of the leading causes of substandard database performance and poor response time. SQL statements that perform poorly result in frustration for users, and can even prevent a company from serving its customers in a timely manner. In this book, Mark Gurry shares his in-depth knowledge of Oracle's SQL statement optimizers. Mark's knowledge is the result of many hard-fought tuning battles during his many years of providing Oracle tuning services to clients. Mark provides insights into the workings of the rule-based optimizer that go well beyond what the rules tell you. Mark also provides solutions to many common problems that occur with both the rule-based and cost-based optimizers. In addition to the specific problem/solution scenarios for the optimizers, Mark provides a number of handy SQL tuning tips. He discusses the various optimizer hints, telling you when they can be used to good effect. Finally, Mark discusses the use of the DBMS_STATS package to manage database statistics, and the use of outlines to specify execution plans for SQL statements in third-party applications that you can't otherwise modify.
    Note: "Covers Oracle9i"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Language: English
    Pages: xxiv, 512 p. , ill. ; , 24 cm. + 1 CD-ROM (4 3/4 in.)
    DDC: 005.8
    Keywords: Computer security ; Computers ; Access control ; Testing ; Electronic books ; local
    Abstract: "This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previously unknown black art." --From the Foreword by Simple Nomad, Senior Security Analyst, BindView RAZOR Team Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from compromising systems and exploiting proprietary information. Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the roles and responsibilities of a penetration testing professional, the motivation and strategies of the underground hacking community, and potential system vulnerabilities, along with corresponding avenues of attack. Most importantly, the book provides a framework for performing penetration testing and offers step-by-step descriptions of each stage in the process. The latest information on the necessary hardware for performing penetration testing, as well as an extensive reference on the available security tools, is included. Comprehensive in scope Hack I.T. provides in one convenient resource the background, strategies, techniques, and tools you need to test and protect your system--before the real hackers attack. Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Boston : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xv, 274 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Solaris (Computer file) ; Computer security ; Electronic books ; local
    Abstract: Solaris 8 Security covers all the concepts and issues Solaris 8 administrators need to know in order to make and keep their Solaris 8 systems secure. This includes not only Solaris 8 security tools and features, but such subjects as cryptography and defenses against known attacks and vulnerabilities. Readers learn practical, command-level defenses, such as: How to configure a secure DNS server What to do with /etc/inet/inetd.conf How to make IPsec work Why DES fails How to identify and prevent system compromises How not to configure sendmail How to automate security checkups The book provides a proactive approach to security. Coverage includes intrusion detection systems, network-level filtering, firewalls and other network-level systems.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvii, 490 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 793 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer security ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: In 1997, Microsoft embarked on a "bet the company" strategy that was to reinvent the way the company did business. Even before its release, .NET made major strides in reinventing the way that software developers viewed the software they wrote. Now that it is released, .NET and the .NET Framework will change the software development process for good. .NET Framework Security provides the ultimate high-end comprehensive reference to all of the new security features available in .NET. Through extensive code samples and step-by-step walkthroughs of configuration techniques, the reader is taken deep into the world of secure applications. Demonstrations of creating custom procedures and a full explanation of each aspect separate this book from many other "lecture books." Many of the concepts expressed in this book are not only viable in .NET, but on the Internet in general. These factors combined make this the one reference that every developer and system administrator should have. .NET Framework Security provides An extensive introduction to explanation of Code Access Security, the powerful new security system shipping in the .NET Framework Information on how to write and test safe applications using the .NET Framework Extensive coverage on how to effectively administer .NET Framework security In-depth introduction to the cryptography library shipping in the .NET Framework, including an introduction to XML digital signatures An overview of all of the new security features available in .NET Code samples that can be used to implement security on your own Web site or application Step-by-step guidelines for modifying the various configuration files associated with .NET, and an explanation of the elements involved Instructions for all of the aspects of security in the CLR and what it means How to use ASP.NET to create a secure application Explanations for using the CryptoAPI libraries to create your own custom functionality Guidelines on how to create secure network applications as well as applications that exist on the Internet Detailed examples of how to establish security parameters in IIS that relate to ASP.NET Instructions for administering .NET applications hosted in IE 067232184XB04232002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: viii, 111 p. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Data recovery (Computer science) ; Electronic data processing ; Backup processing alternatives ; Relational databases ; Electronic books ; local
    Abstract: Oracle RMAN Pocket Reference is a handy guide for DBAs who intend to use Oracle Recovery Manager for database backup and recovery. Because Recovery Manager (RMAN) is a relatively new tool, many DBAs are just becoming familiar with it. They will welcome a timely book that explains clearly and concisely how to use RMAN for common backup and recovery tasks that are infrequent, yet extremely vital. The first portion of the book is primarily task-oriented. After a short section on RMAN architecture, the book shows (in checklist style) how to perform common backup and recovery tasks such as: Implementing a recovery catalog Creating and running RMAN scripts Configuring input/output channels Taking a full database backup Backing up tablespaces and datafiles Taking incremental backups Recovering lost datafiles The second portion of the book consists of a handy syntax reference to the many RMAN commands. Having a quick reference to RMAN commands is a great convenience to DBAs who otherwise, often under the pressure of a recovery situation, would have to wade through Oracle's online documentation.
    Note: "Covers Oracle9i"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 401 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; PL/SQL (Computer program language) ; Electronic books ; local
    Abstract: PL/SQL, Oracle's programming language for stored procedures, delivers a world of possibilities for your database programs. PL/SQL supplements the standard relational database language, SQL, with a wide range of procedural features, including loops, IF-THEN statements, advanced data structures, and rich transactional control--all closely integrated with the Oracle database server. Knowing where to start with Oracle's procedural language is not always obvious to a newcomer, especially considering the language's feature set and the sheer size of the official documentation (not to mention Oracle's ever-increasing number of pre-built PL/SQL programs). But Learning Oracle PL/SQL offers the signposts and guidance you need to come up to speed on the language, delivered in a manageable number of pages while covering all the essentials. Topics include: PL/SQL--what is it, and why use it? Why use PL/SQL instead of Java? Syntax and examples of all core language constructs Creating, using, and reusing stored procedures, functions, and packages Building web-based applications using PL/SQL features available "out of the box" (such as PL/SQL Server Pages) Securing PL/SQL programs against attack Benefits of third-party developer tools and integrated development environments Connecting PL/SQL to email, Java, and the Internet Meticulously crafted with all-new examples downloadable from examples.oreilly.com/learnoracle , the book addresses language features available in all versions of Oracle, from Oracle7 to Oracle8i to Oracle9i. Learning Oracle PL/SQL was written by PL/SQL experts Bill Pribyl and Steven Feuerstein, whose easy-to-read style and attention to detail has made other O'Reilly books (such as the bestselling Oracle PL/SQL Programming ) very popular among Oracle developers worldwide. Learning Oracle PL/SQL is meant for a wide range of target audiences, including both beginning programmers and those already experienced with other programming languages. Whether you are a new developer, a crossover programmer from another database system, or a new database administrator who needs to learn PL/SQL, this book will get you well on your way. It is the perfect introduction to Oracle PL/SQL Programming , also by Pribyl and Feuerstein.
    Note: "Covers Oracle9i"--Cover. - "Oracle development languages"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xviii, 620 p. , ill. ; , 23 cm
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Computer software ; Development ; Relational databases ; Electronic books ; local
    Abstract: Learn the ins and outs of the Oracle9i development environment from product installation to advanced management configuration. Oracle 9i Development by Example provides coverage of everything from building, monitoring, and tuning an Oracle9i database to building forms and reports using developer 6i to understanding newer tools such as Log Miner in an easy to learn format.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 778 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer hackers ; Computer security ; Electronic books ; local
    Abstract: Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 488 p. ; , 19 cm. +
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; PL/SQL (Computer program language) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: Concise and practical, this indispensable volume brings the world's most popular Relational Database Management System (RDBMS), its query language SQL, and its programming language PL/SQL into clear focus for today's busy database professional or business analyst. Covering the most commonly used Oracle features, Oracle SQL and PL/SQL Handbook is ideal for the developer or business user challenged with implementing, maintaining, and retrieving mission-critical data within the Oracle database environment. Broadly designed as both a basic reference and how-to, this book offers extensive coverage of Oracle's SQL language and database concepts, providing an excellent review for the Oracle certification exams. The initial chapters offer a complete introduction to the relational database environment, including a discussion of how to use the logical data model to understand the database. Oracle database objects are explored, along with uses of the Data Definition Language (DDL), the Data Control Language (DCL), and the Data Manipulation Language (DML). Later chapters offer complete coverage of the Select command used to retrieve information from the database. Also included are coverage of Oracle's new analytic functions, a chapter on performance-tuning techniqes needed for complex SQL, and a detailed overview of Oracle's PL/SQL language. In addition, many chapters provide practice questions designed to reinforce newly introduced concepts, as well as numerous examples of SQL techniques. The broad-based and comprehensive coverage also includes: Understanding the database using entity relationship diagrams and database schema diagrams Applying the Data Definition, Data Control, and Data Manipulation languages to create and maintain the database Using the SQL language to retrieve information from the database Creating special business information using Oracle's new analytic functions Making your SQL perform better with common troubleshooting techniques Producing business information with business objects Using Java with PL/SQL Authoritative and practical, Oracle SQL and PL/SQL Handbook provides today's administrator and business analyst alike with the most comprehensive sourcebook of solutions and techniques for improving their use of Oracle. 0201752948B07152002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 532 p. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Data encryption (Computer science) ; XML (Document markup language) ; Electronic books ; local
    Abstract: Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical techniques for enabling the secure transmission of data across the Web. Broad-based and comprehensive, Secure XML fully documents every feature and issue involved with XML security. Opening with a complete introduction to XML, the book then provides detailed coverage of authentication, canonicalization, keying, encryption, algorithms, and more. Notes, background information, guidelines, and "soapbox," or heretical comments, expand on the book's practical focus throughout. In all, this book features the most comprehensive roadmap to digital security and XML encryption available. Topics covered in-depth include: XML basics-documents, namespaces, structures, DTDs and schemas, and stylesheets XPath, XPointer, and SOAP Digital cryptography basics--secret and public key ciphers, asymmetric keys, digital signatures, and certificates XML canonicalization, signatures, and authentication XML encryption Key management and combining encryption with signatures Cryptographic algorithms and noncryptographic algorithms Detailed and practical, this book provides reliable solutions for securing XML and for safeguarding information flow across today's sophisticated Web. 0201756056B06262002
    Note: Includes bibliographical references (p.495-506) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 251 p. , ill. ; , 24 cm
    Keywords: Oracle (Computer file) ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: SQL Loader is a ubiquitous tool in the Oracle world. It has been shipped with Oracle since at least Version 6 and continues to be supported and enhanced with each new version of Oracle, including Oracle8 and Oracle8 i. The job of SQL Loader is to load data from flat files into an Oracle database. It's optimized for loading large volumes of data, and is flexible enough to handle virtually any input format.Almost every Oracle user has to use SQL Loader at one time or another, and DBAs are frequently called upon to load data for the users in their organization. Despite SQL Loader's wide availability and usage, few DBAs and developers know how to get the most out of it. Oracle SQL Loader: The Definitive Guide has everything you need to know to put SQLLoader to its best use: an introduction to SQL Loader, a reference to all of its syntax options, and most importantly, step-by-step instructions for all the SQL Loader tasks you'd want to perform--and maybe some you didn't realize you COULD perform.You'll learn how to construct the necessary control files and load from different types of files containing different types of data (e.g., fixed-width data, delimited data, and data of various datatypes). You'll also learn how to validate data, load it selectively, transform it as it is loaded, and recover after failure. This book explains how to optimize SQL Loader performance by adjusting the transaction size and using the new direct path option. It also covers the newest SQL Loader features--the loading of large object (LOB) columns and the new object types (nested tables, varying arrays, and object tables). Oracle SQL Loader: The Definitive Guide is an indispensable resource for anyone who is new to SQLLoader; a task-oriented learning tool for those who are already using it; and a quick reference for every user. If you want to take best advantage of an essential Oracle tool, you need this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Language: English
    Pages: xvii, 364 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: The second edition of O'Reilly's bestselling Oracle Essentials has been updated to include the latest Oracle release, Oracle9 i. Oracle Essentials distills an enormous amount of information about Oracle's myriad technologies and releases into a compact, easy-to-read volume filled with focused text, illustrations, and helpful hints. Oracle9 i promises to be an even more significant upgrade than Oracle8 i, offering such major features as Real Application Clusters, flashback queries, Oracle personalization, clickstream intelligence, and Oracle Database Cache and Web Cache; it also promises significant improvements in Oracle's business intelligence, XML integration, high availability, and management capabilities. The book includes overviews of these features, as well as the new Oracle9 I Application Server (Oracle9 i AS) and Oracle9 i Portal. The book contains chapters on: Oracle products, options, and overall architecture for Oracle9 i and other recent releases Installing and running Oracle: creating databases, configuring Net8 (known as Oracle Net in Oracle9 i ), starting up and shutting down Oracle Oracle data structures, datatypes, and ways of extending datatypes Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle networking, monitoring, and tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Oracle9 i , Oracle8 i , and the Web, including the latest Java, web, and XML technologies, interMedia, Oracle9 i Application Server, and Oracle9 i Portal For new Oracle users, DBAs, developers, and managers, Oracle Essentials is an all-in-one introduction to the full range of Oracle features and technologies, including the just-released Oracle9 i features. But even if you already have a library full of Oracle documentation, this compact book is the one you'll turn to, again and again, as your one-stop, truly essential reference.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xviii, 522 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8/4
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers: The current state of the malicious code writing and cracker community How malicious code works, what types there are, and what it can and cannot do Common anti-virus defenses, including anti-virus software How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it Macro viruses affecting MS Word, MS Excel, and VBScript Java applets and ActiveX controls Enterprise-wide malicious code protection Hoaxes The future of malicious mobile code and how to combat such code These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 861 p. ; , 23 cm. +
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. In one book, security managers and others interested in computer and network security can learn everything the hackers already know, and then take steps to protect their systems.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 381 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Oracle (Computer file) ; Java (Computer program language) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: If you're a Java programmer working in an Oracle environment, you're probably familiar with JDBC as a means of accessing data within an Oracle database. SQLJ takes you further, allowing you to access a database using embedded SQL statements. Java Programming with Oracle SQLJ shows you how to get the most out of SQLJ. Layered on top of JDBC, SQLJ greatly simplifies database programming. Rather than make several calls to the JDBC API just to execute a simple SQL statement, SQLJ executes that statement simply by embedding it within the Java code. In this book, Jason Price explains SQLJ programming from a task-oriented point of view. You'll learn how to: Embed queries and other SQL statements within Java programs Deploy SQLJ code not only on client machines, but also to JServer--Oracle's Java engine built into the database Use advanced techniques for working with collections, streams, large objects, and database objects, all without leaving the comfort of the SQLJ environment Tune SQLJ programs for maximum performance Throughout the book, the exposition of SQLJ and SQLJ programming techniques reflects the author's many years of professional experience as a programmer and consultant. Examples are first-rate, enabling you to learn SQLJ in no time. If you're writing Java code to access an Oracle database, you can't afford not to know about SQLJ.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 599 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Series Statement: The Java series
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need. Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: v, 104 p. ; , 18 cm
    Edition: 1st ed.
    Keywords: Oracle (Computer file) ; UNIX (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: The Unix for Oracle DBAs Pocket Reference puts within easyreach the commands that Oracle database administrators need mostwhen operating in a Unix environment. If you are an Oracle DBAmoving to Unix from another environment such as Windows NT or IBMMainframe, you know that these commands are far different fromthose covered in most beginning Unix books. To jump start yourlearning process, Don Burleson has gathered together in thissuccinct book the Unix commands he most often uses when managingOracle databases. You'll be able to reach into your pocket for theanswer when you need to know how to: Display all Unix components related to Oracle,identify the top CPU consumers on your server, and even killprocesses when necessary Stack Unix commands into powerful scripts that canperform vital DBA functions Monitor Unix filesystems, and automatically manageyour trace files, dump files, and archived redo log files Use essential server monitoring commands such astop, sar, and vmstat And there's much more between these covers. If you need to get upto speed with Oracle on Unix, and quickly, this book is for you.
    Note: "Command syntax and scripts"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 406 p. , ill. ; , 24 cm
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Database management ; Open source software ; Electronic books ; local
    Abstract: Oracle & Open Source is the first book to tie together the commercial world of Oracle and the free-wheeling world of open source software. As this book reveals, these two worlds are not as far apart as they may seem. Today, there are many excellent and freely available software tools that Oracle developers and database administrators can use, at no cost, to improve their own coding productivity and their system's performance. Moreover, many of the finest Oracle developers are now making their source code freely available so their peers can build upon this code base. Oracle Corporation is even porting its RDBMS to Linux and starting to incorporate a growing number of open source tools in the company's own software. Oracle & Open Source describes close to 100 open source tools you can use for Oracle development and database administration, from large and widely known open source systems (like Linux, Perl, Apache, TCL/Tk and Python) to more Oracle-specific tools (like Orasoft, Orac, OracleTool, and OraSnap). You'll learn how to obtain the software and how to adapt it to best advantage. The book abounds with code examples, download and installation instructions, and helpful usage hints. Not only does it tell you how to find and use existing open source code; Oracle & Open Source gives you the details and the motivation to build your own open source contributions and release them to the Oracle community. You'll learn all about tools like the Oracle Call Interface (OCI) and Perl-DBI (Database Interface), which provide the glue allowing new open source tools to link into commercial Oracle software. With Oracle & Open Source as a guide, you'll discover an enormous number of highly effective open source tools, while getting involved with the thriving community of open source development.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Sebastapol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 387 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Database management ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Net8 is the fundamental Oracle technology that allows Oracle services and clients to communicate with each other over a network. Net8 is most often used to connect client software to Oracle database servers. It may also be used to connect database servers to one another, allowing communication between distributed databases. This practical guide provides the information that readers, especially database administrators, need to know in order to install configure, tune, and troubleshoot Net8. It discusses how Oracle's network architecture, products, and name resolution methods work, and it provides the details of client and server configuration using a variety of Oracle protocols and networking products, including: The Oracle Internet Directory (OID), Oracle's implementation of the standard Lightweight Directory Access Protocol (LDAP). This directory can be used to maintain a central repository of net service names that can be referenced by all clients. Oracle Names, a networking component used mainly in earlier versions of Oracle, that allows net service names to be defined centrally. Multi-Threaded Server (MTS), an environment in which the client connections share access to a pool of shared server processes. Oracle Connection Manager, a Net8 component that acts much like a router and provides protocol conversion, connection concentration, and access control. The book also describes the utilities Oracle provides to help manage a Net8 environment; these include the Listener Control Utility (lsnrctl), the Oracle Names Control Utility (namesctl), the Oracle Connection Manager Control Utility (cmctl), tnsping, and Net8 Assistant. In addition, it provides a variety of networking troubleshooting techniques and commonly encountered Net8 configuration problems, and provides complete syntax for all networking files and commands.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Sebastopol, CA] : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 182 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Database management ; Computer programs ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: In this book, Steven Feuerstein, widely recognized as one of the world's experts on the Oracle PL/SQL language, distills his many years of programming, writing, and teaching about PL/SQL into a set of PL/SQL language "best practices"--rules for writing code that is readable, maintainable, and efficient. Too often, developers focus on simply writing programs that run without errors--and ignore the impact of poorly written code upon both system performance and their ability (and their colleagues' ability) to maintain that code over time. Oracle PL/SQL Best Practices is a concise, easy-to-use reference to Feuerstein's recommendations for excellent PL/SQL coding. It answers the kinds of questions PL/SQL developers most frequently ask about their code: How should I format my code? What naming conventions, if any, should I use? How can I write my packages so they can be more easily maintained? What is the most efficient way to query information from the database? How can I get all the developers on my team to handle errors the same way? The book contains 120 best practices, divided by topic area. It's full of advice on the program development process, coding style, writing SQL in PL/SQL, data structures, control structures, exception handling, program and package construction, and built-in packages. It also contains a handy, pull-out quick reference card. As a helpful supplement to the text, code examples demonstrating each of the best practices are available on the O'Reilly web site. Oracle PL/SQL Best Practices is intended as a companion to O'Reilly's larger Oracle PL/SQL books. It's a compact, readable reference that you'll turn to again and again--a book that no serious developer can afford to be without.
    Note: "Optimizing Oracle code"--Cover. - Cover title. - Includes bibliographical references (p. xvi-xvii)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: iv, 90 p. ; , 18 cm
    Edition: 1st ed.
    Keywords: Oracle (Computer file) ; Query languages (Computer science) ; Relational databases ; SQL*Plus (Computer program language) ; Electronic books ; local
    Abstract: This pocket reference provides quick reference information that will help you use SQL*Plus, Oracle's interactive query tool. It summarizes all of the SQL*Plus syntax, including the syntax for new Oracle8 i release 8.1.6 features. SQL*Plus is available at every Oracle site--from the largest data warehouse to the smallest single-user system--and it's a critical tool for virtually every Oracle user. Despite its wide use, few developers and DBAs know how powerful a tool SQL*Plus can be. This book boils down the most vital information from Gennick's best-selling book, Oracle SQL*Plus: The Definitive Guide , into an accessible summary. It concisely describes interacting with SQL*Plus, selecting data, formatting reports with SQL*Plus, and tuning SQL queries. It also contains quick references to the SQL*Plus commands and format elements. This book is an indispensable companion to O'Reilly bestselling book, Oracle SQL*Plus: The Definitive Guide , but it does not replace it; the larger book is truly the definitive guide, suitable for readers at all levels of expertise. The definitive guide describes the many tasks that SQL*Plus can perform, and provides a tutorial on many SQL*Plus topics. But this quick reference is an excellent, portable resource for readers who want a pocket-sized summary of SQL*Plus capabilities and a reminder of how to issue specific commands and formatting options for SQL*Plus. Table of Contents: Interacting with SQL*Plus Selecting Data Formatting Reports Tuning SQL SQL*Plus Format Elements SQL*Plus Command Reference
    Note: "Covers Oracle8i"--cover. - "Guide to SQL*Plus syntax"--cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Cambridge, Mass. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 792 p. , ill. ; , 23 cm. +
    DDC: 005.7/2
    Keywords: Oracle (Computer file) ; Application software ; Development ; XML (Document markup language) ; Electronic books ; local
    Abstract: This rich and detailed look at the many Oracle tools that support XML development shows Java and PL/SQL developers how to combine the power of XML and XSLT with the speed, functionality, and reliability of the Oracle database. The nearly 800 pages of entertaining text, helpful and time-saving hints, and extensive examples can be put to use immediately to build custom XML applications. Includes a CD-ROM with JDeveloper 3.1, an integrated development environment for Java developers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: ix, 384 p. , ill. ; , 23 cm
    Keywords: Oracle (Computer file) ; Electronic commerce ; Java (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: In Building e-Commerce Database Applications Using Oracle8i and Java from scratch, Meghraj Thakkar takes novice web programmers through the process of creating a web-enabled database application. You will look at the requirements, analysis, design, implementation, testing and deployment of an "Online Coffee Shop" from scratch. You will also learn to create database objects (tables and indexes), populate the database, and use SQL, PL/SQL and Java to manipulate the data. Additional topics include using Oracle tools such as SQL*Loader and Export/Import to populate Oracle databases, use of JDBC to connect and interact with the database, how to process the results coming back from the database, use of SQLJ to write efficient Java code, JDBC error messages & exceptional handling in the project, how to store Java code in the database using Java Stored Procedures, techniques for debugging & stress testing your applications, and more.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 268 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Abstract: Parallel processing is becoming increasingly important to database computing. Databases often grow to enormous sizes and are accessed by huge numbers of users. This growth strains the ability of single-processor and single-computer systems to handle the load. More and more, organizations are turning to parallel processing technologies to give them the performance, scalability, and reliability they need. Anyone managing a large database, a database with a large number of concurrent users, or a database with high availability requirements--such as a heavily trafficked e-commerce site--needs to know how to get the most out of Oracle's parallel processing technologies. Oracle Parallel Processing is the first book to describe the full range of parallel processing capabilities in the Oracle environment, including those new to Oracle8 i. It covers: What is parallel processing--features, benefits, and pitfalls. Who needs it and who doesn't? What features does Oracle provide, and what are their requirements and overhead implications? The book answers these questions and presents the various parallel architectures (SMP, or Symmetric Multiprocessing; MPP, or Massively Parallel Processing; clustered systems; and NUMA, or Non Uniform Memory Access). Oracle parallel execution--Oracle supports a variety of parallel execution features in the database. The book covers the use, administration, and tuning of these features: parallel query, parallel data loading, parallel DML (Data Manipulation Language), parallel object creation (through DDL, or Data Definition Language), and parallel replication propagation. Oracle Parallel Server--Oracle also provides the OPS option, which work to be spread over both multiple CPUs and multiple nodes. This book covers OPS architecture, requirements, administration, tuning, storage management, recovery, and application failover issues. Oracle Parallel Processing also contains several case studies showing how to use Oracle's parallel features in a variety of real-world situations.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Cambridge, Mass. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 382 p. ; 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: SQL (Structured Query Language) is the heart of a relational database management system. It's the language used to query the database, to create new tables in the database, to update and delete database fields, and to set privileges in the database. Oracle SQL: The Essential Reference is for everyone who needs to access an Oracle database using SQL--developers, DBAs, designers, and managers. SQL is based on research dating back to the late 1960s, but its first commercial release was in the RDBMS announced by the fledgling Oracle Corporation in 1979. Since that time, every other database vendor has adopted SQL, and ANSI and the ISO have made it a standard. Although vendors diverge in their extensions to SQL, the core language is standard across vendor boundaries. Despite SQL's long history and relative simplicity, few developers and database administrators are truly masters of SQL. The constant stream of vendor enhancements, the hard-won experience in tuning SQL for best performance, and the requirements of particular operational environments mean that there is always more to learn about SQL. Oracle SQL: The Essential Reference delivers all the information needed to keep ahead of the learning curve on standard SQL and Oracle's extensions to it. This single, concise reference volume will hold its own against a stack of Oracle manuals and even yield insights and examples not available in those manuals. There are chapters on basic SQL elements (naming requirements, column types, pseudo-types, data conversion rules, operators); Data Definition Language (DDL) and Data Manipulation Language (DML); common language elements (constraints, storage clause, predicates); SQL functions; PL/SQL (including procedures, functions, and packages); SQL*Plus, and Oracle SQL optimization and tuning. The book covers Oracle 8 i, release 8.1.6.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: 722 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Electronic books ; local
    Abstract: Windows 2000 Security Handbook covers NTFS fault tolerance, Kerberos authentication, Windows 2000 intruder detection and writing secure applications for Windows 2000.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 743 p. , ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Linux ; Computer security ; Electronic books ; local
    Abstract: Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone who knows which systems are vulnerable and how crackers get into them--this unique guide to Linux security identifies existing and potential security holes and faults, and then describes how to go about fixing them.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Indianapolis, IN : SAMS Publishing | Boston, MA :Safari,
    Language: English
    Pages: xiv, 534 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: This book is a comprehensive guide to Java security issues. It assumes you are an experienced Java programmer, but have little experience with creating secure applications. This book covers formulating and enacting a network security policy to protect end-users, building e-commerce and database applications that can safely exchange secure information over networks and the Internet, cryptography, digital signatures, key management, and distributed computing: CORBA, RMI, and servlets.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 321 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: If you write programs to run against an Oracle database, you spend a lot of time and mental energy writing queries to return the data your programs need. Knowledge of SQL, and particularly of Oracle's implementation of SQL, is the key to writing good queries in a timely manner. In this book, the authors share their knowledge of Oracle SQL, and show you many creative techniques that you can use to advantage in your own applications. This book shows you how to: Leverage Oracle's vast library of built-in SQL functions Query time-based data, and write joins involving date and time ranges Use Oracle SQL's hierarchical query features to deal with data best represented in a tree format Use DECODE and CASE to implement conditional logic in your queries Use Oracle's new, analytic SQL features to write ranking queries, lag and lead queries, windowing queries, and more Join data from two or more tables using the newly supported SQL92 join syntax In addition, you'll see how SQL can best be integrated with PL/SQL. You'll also learn various best practices to help you write SQL queries that perform efficiently. Precious few books on the market today go beyond discussing syntax and the barest rudiments of using Oracle SQL. This book changes that, showing you how to creatively leverage the full power of SQL to write queries in an Oracle environment.
    Note: Covers Oracle 9i--Cover. - ELECTRONIC BOOK. - Electronic reproduction. Boston, MA : Safari Technical Books Online, 2003. Available via World Wide Web;Access limited to Bucks County Community College campuses. Remote access restricted to BCCC faculty, staff, & students. - Includes index. - Putting Oracle SQL to work--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xii, 248 p. , ill. ; , 23 cm
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; Application software ; Development ; Relational databases ; Electronic books ; local
    Abstract: Oracle Developer Forms Techniques describes the concepts and techniques needed to build Web-enabled applications with Forms. The book covers advanced topics in great detail, including understanding and overcoming error handling limitations in Forms, such as errors which cannot be tracked through normal FORM_SUCCESS or FORM_FAILURE, ordering by items based on FK look-ups, obtaining Query Count without actually executing a query, and performing an exclusive server-side commit from Forms. The book also covers object-oriented methods in Forms, and Intelligence in Forms. Code segments are provided to help developers implement these techniques, thus easing application development time and effort.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...