Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (2)
  • Upper Saddle River, N.J. : Prentice Hall  (2)
  • Computer security  (1)
  • Object-oriented programming (Computer science)
  • Oracle (Computer file)
Datasource
Material
Language
Years
Author, Corporation
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xx, 745 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Oracle (Computer file) ; Application software ; Development ; Internet programming ; PL/SQL (Computer program language) ; Electronic books ; local
    Abstract: The hands-on, rapid-mastery guide to Oracle PL/SQL Web development. Start building Oracle 9i PL/SQL Web applications-hands on Covers the entire development lifecycle, from design to deployment Provides instruction for PL/SQL Server Pages, the PL/SQL Web Toolkit, and the Oracle 9i Application Server Introduces Web basics-HTML, JavaScript, basic UNIX and FTP, and image handling Reviews PL/SQL and SQL concepts Includes practical tips and troubleshooting help Leverage your SQL and PL/SQL experience to build powerful data-driven Web and e-business applications-starting right now! In this book, a team of Columbia University PL/SQL instructors cover the core pieces of what you need to know, from preliminary configuration to deployment of dynamic, data-driven applications. You'll find practical examples, hands-on exercises, and dozens of practical tips and solutions designed to save you time, effort, and frustration. One step at a time, discover how to: Configure Oracle's Internet Application Server Control Web applications and servers remotely Build Oracle Web applications with PL/SQL Create dynamic, data-driven pages Test, debug, troubleshoot, and deploy your applications Maintain and optimize running Web applications Whether you've been writing simple queries or complex PL/SQL code, this book takes your database development skills onto the Web-and into the future!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxi, 309 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "This is a really good book ... it spells out the motherhood and apple pie of information security in a highly readable way." -Warwick Ford, CTO, VeriSign, Inc. "An excellent security read! Breaks down a complex concept into a simple and easy-to-understand concept." -Vivek Shivananda, President Redefine your organization's information security Learn to think and act like a top security guru! Understand the founding principles of security itself and make better decisions Make your security solutions more effective, easily manageable, and less costly! Make smarter, more informed security decisions for your company Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice-that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem-they invariably wind up with expensive, but deeply flawed, solutions. The only way out of this trap is to change one's way of thinking about security: to grasp the reasoning, philosophy, and logic that underlie all successful security efforts. In Inside the Security Mind: Making the Tough Decisions , security expert Kevin Day teaches you how to approach information security the way the top gurus do-as an art, rather than a collection of technologies. By applying this discipline, your solutions will be more secure and less burdensome in time, expense, and effort. The first part of the book explains the practice of breaking security decisions down into a set of simple rules. These rules may then be applied to make solid security decisions in almost any environment. In the second part, Day uses a series of practical examples to illustrate exactly how the discipline works in practice. Additional material covers: Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security Ongoing security measures-recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks This book is essential reading for anyone working to keep information secure. Technical and non-technical IT professionals alike can apply Day's concepts and strategies to become security gurus, while seasoned practitioners will benefit from th...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...