Database and Administration
Featured Items
SQL for Dummies
SQL for Dummies
Paperback      ISBN: 1119527074

Get ready to make SQL easy

Updated for the latest version of SQL, the new edition of this perennial bestseller shows programmers and web developers how to use SQL to build relational databases and get valuable information from them. Covering everything you need to know to make working with SQL easier than ever, topics include how to use SQL to structure a DBMS and implement a database design; secure a database; and retrieve information from a database; and much more.

SQL is the international standard database language used to create, access, manipulate, maintain, and store information in relational database management systems (DBMS) such as Access, Oracle, SQL Server, and MySQL. SQL adds powerful data manipulation and retrieval capabilities to conventional languages--and this book shows you how to harness the core element of relational databases with ease.

  • Server platform that gives you choices of development languages, data types, on-premises or cloud, and operating systems
  • Find great examples on the use of temporal data
  • Jump right in--without previous knowledge of database programming or SQL

As database-driven websites continue to grow in popularity--and complexity--SQL For Dummies is the easy-to-understand, go-to resource you need to use it seamlessly.

Oracle CRM on Demand Deployment Guide
Oracle CRM on Demand Deployment Guide
Paperback      ISBN: 0071717633
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Master Oracle CRM On Demand

Foster long-term customer relationships and accelerate productivity using the proven strategies and best practices in this Oracle Press guide. Oracle CRM On Demand Deployment Guide shows how to set up, customize, and manage a dynamic software-as-a-service solution across your enterprise. Develop implementation plans, maximize user adoption, build applets and portals, integrate Web 2.0 features, and use analytics dashboards. The latest design, tuning, and data security techniques are also covered in this practical resource.

  • Establish business objectives, project requirements, and key success metrics
  • Staff an implementation team and develop effective rollout plans
  • Configure, deploy, and administer Oracle CRM On Demand
  • Manage users and restrict access using roles and privileges
  • Customize sales, marketing, and service processes with the object model
  • Embed external content and URLs using the web services API
  • Distribute real-time BI using dashboards and advanced reporting tools
  • Incorporate web tabs, mashups, Google services, and RSS feeds
  • Use workflow to automate business process management
Practical Forensic Imaging: Securing Digital Evidence With Linux Tools
Practical Forensic Imaging
Securing Digital Evidence With Linux Tools
Paperback      ISBN: 1593277938

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.

You'll learn how to:
-Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
-Protect attached evidence media from accidental modification
-Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
-Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
-Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
-Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
-Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media

With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.
Blockchain for Dummies
Blockchain for Dummies
2nd Edition    Paperback      ISBN: 1119555019

Unravel the mysteries of blockchains

Blockchain technologies are disrupting some of the world's biggest industries. Blockchain For Dummies provides a fast way to catch up with the essentials of this quickly evolving tech. Written by an author involved in founding and analyzing blockchain solutions, this book serves to help those who need to understand what a blockchain can do (and can't do).

This revised edition walks you through how a blockchainsecurely records data across independent networks. It offers a tour of some of the world's best-known blockchains, including those that power Bitcoin and other cryptocurrencies. It also provides a glance at how blockchain solutions are affecting the worlds of finance, supply chain management, insurance, and governments.

  • Get a clear picture of what a blockchain can do
  • Learn how blockchains rule cryptocurrency and smart contracts
  • Discover current blockchains and how each of them work
  • Test blockchain apps

Blockchain has become the critical buzzword in the world of financial technology and transaction security -- and now you can make sense of it with the help of this essential guide.

Super Crunchers: Why Thinking-By-Numbers Is the New Way to Be Smart
Super Crunchers
Why Thinking-By-Numbers Is the New Way to Be Smart
Paperback      ISBN: 0553384732
NEW YORK TIMES BESTSELLER - With new information on crunching your own numbers to get the edge the experts have

An international sensation--and still the talk of the relevant blogosphere--this Wall Street Journal and New York Times business bestseller examines the "power" in numbers. Today more than ever, number crunching affects your life in ways you might not even imagine. Intuition and experience are no longer enough to make the grade. In order to succeed--even survive--in our data-based world, you need to become statistically literate.

Cutting-edge organizations are already crunching increasingly larger databases to find the unseen connections among seemingly unconnected things to predict human behavior with staggeringly accurate results. From Internet sites like Google and Amazon that use filters to keep track of your tastes and your purchasing history, to insurance companies and government agencies that every day make decisions affecting your life, the brave new world of the super crunchers is happening right now. No one who wants to stay ahead of the curve should make another keystroke without reading Ian Ayres's engrossing and enlightening book.
Test Driven Development: By Example
Test Driven Development
By Example
Paperback      ISBN: 0321146530

Quite simply, test-driven development is meant to eliminate fear in application development. While some fear is healthy (often viewed as a conscience that tells programmers to "be careful "), the author believes that byproducts of fear include tentative, grumpy, and uncommunicative programmers who are unable to absorb constructive criticism. When programming teams buy into TDD, they immediately see positive results. They eliminate the fear involved in their jobs, and are better equipped to tackle the difficult challenges that face them. TDD eliminates tentative traits, it teaches programmers to communicate, and it encourages team members to seek out criticism However, even the author admits that grumpiness must be worked out individually In short, the premise behind TDD is that code should be continually tested and refactored. Kent Beck teaches programmers by example, so they can painlessly and dramatically increase the quality of their work.

Introduction to Data Mining
Introduction to Data Mining
Hardcover      ISBN: 0321321367

Introduction to Data Mining presents fundamental concepts and algorithms for those learning data mining for the first time. Each major topic is organized into two chapters, beginning with basic concepts that provide necessary background for understanding each data mining technique, followed by more advanced concepts and algorithms.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring
Understanding Incident Detection and Response
Paperback      ISBN: 1593275099

Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.

You'll learn how to:
-Determine where to deploy NSM platforms, and size them for the monitored networks
-Deploy stand-alone or distributed NSM installations
-Use command line and graphical packet analysis tools, and NSM consoles
-Interpret network evidence from server-side and client-side intrusions
-Integrate threat intelligence into NSM software to identify sophisticated adversaries

There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.