talk-data.com talk-data.com

Event

O'Reilly Data Engineering Books

2001-10-19 – 2027-05-25 Oreilly Visit website ↗

Activities tracked

3406

Collection of O'Reilly books on Data Engineering.

Filtering by: data ×

Sessions & talks

Showing 2551–2575 of 3406 · Newest first

Search within this event →
Oracle® 11g For Dummies®

Are you a seasoned system administrator charged with setting up an Oracle database? Or did you suddenly become a DBA by default? If database administration with Oracle is part of your job, you’ll be glad to have Oracle 11g For Dummies in your cubicle. This nuts-and-bolts guide walks you through the mysteries of Oracle and database administration. You’ll learn how to understand Oracle database architecture, set up and manage an Oracle database, and keep it running in tiptop form. Oracle 11g For Dummies covers: The building blocks behind the database engine as well as Oracle’s physical and logical structures Hardware, software, system, and storage requirements for implementation How to recognize and accommodate the differences between Oracle installations on Windows and on Linux/UNIX Daily and intermittent tasks necessary to keep your database running properly How to assess potential threats to your database, configure Oracle Recovery Manager, and set up backup and recovery procedures When to use online, offline, controlfile, and archivelog backups Troubleshooting methodology and how to use Oracle database logs and other diagnostic utilities Different ways to manage your database How to automate jobs with the Oracle Scheduler Using SQL in Oracle, and a great deal more Completely up to date for the newest release of Oracle, Oracle 11g For Dummies will give you both the information and the confidence to set up and maintain an Oracle database for your organization.

Learn FileMaker Pro 10

Learn FileMaker® Pro 10 provides an excellent reference to FileMaker Inc.’s award-winning database program for both beginners and advanced developers. From converting files created with previous versions of FileMaker Pro and sharing data on the web to creating reports and sorting data, this book offers a hands-on approach to getting the most out of your FileMaker Pro databases. Learn how to use the completely redesigned Status area, now known as the Status toolbar; send e-mail right from FileMaker with the SMTP-based Send Mail option; build reports quickly and easily with the Saved Finds feature; automate your database with scripts and activate those scripts with the new script trigger feature; integrate your Bento data into your FileMaker files; work with the enhanced Web viewer.

Beginning Microsoft® SQL Server® 2008 Programming

This comprehensive introduction to SQL Server begins with an overview of database design basics and the SQL query language along with an in-depth look at SQL Server itself Progresses on to a clear explanation of how to implement fundamental concepts with the new 2008 version of SQL Server Discusses creating and changing tables, managing keys, writing scripts, working with stored procedures, programming with XML, using SQL Server Reporting and Integration Services, and more Features updated and new material, including new examples using Microsoft's AdventureWorks sample database

Storage Area Networks For Dummies®

If you’ve been charged with setting up storage area networks for your company, learning how SANs work and managing data storage problems might seem challenging. Storage Area Networks For Dummies, 2 comes to the rescue with just what you need to know. nd Edition Whether you already a bit SAN savvy or you’re a complete novice, here’s the scoop on how SANs save money, how to implement new technologies like data de-duplication, iScsi, and Fibre Channel over Ethernet, how to develop SANs that will aid your company’s disaster recovery plan, and much more. For example, you can: Understand what SANs are, whether you need one, and what you need to build one Learn to use loops, switches, and fabric, and design your SAN for peak performance Create a disaster recovery plan with the appropriate guidelines, remote site, and data copy techniques Discover how to connect or extend SANs and how compression can reduce costs Compare tape and disk backups and network vs. SAN backup to choose the solution you need Find out how data de-duplication makes sense for backup, replication, and retention Follow great troubleshooting tips to help you find and fix a problem Benefit from a glossary of all those pesky acronyms From the basics for beginners to advanced features like snapshot copies, storage virtualization, and heading off problems before they happen, here’s what you need to do the job with confidence!

The Data Model Resource Book, Volume 3: Universal Patterns for Data Modeling

This third volume of the best-selling "Data Model Resource Book" series revolutionizes the data modeling discipline by answering the question "How can you save significant time while improving the quality of any type of data modeling effort?" In contrast to the first two volumes, this new volume focuses on the fundamental, underlying patterns that affect over 50 percent of most data modeling efforts. These patterns can be used to considerably reduce modeling time and cost, to jump-start data modeling efforts, as standards and guidelines to increase data model consistency and quality, and as an objective source against which an enterprise can evaluate data models. Praise for The Data Model Resource Book, Volume 3 "Len and Paul look beneath the superficial issues of data modeling and have produced a work that is a must for every serious designer and manager of an IT project." " The Data Model Resource Book, Volume 3: Universal Patterns for Data Modeling is a great source for reusable patterns you can use to save a tremendous amount of time, effort, and cost on any data modeling effort. Len Silverston and Paul Agnewhave provided an indispensable reference of very high-quality patterns for the most foundational types of datamodel structures. This book represents a revolutionary leap in moving the data modeling profession forward." — Ron Powell, Cofounder and Editorial Director of the Business Intelligence Network "After we model a Customer, Product, or Order, there is still more about each of these that remains to be captured, such as roles they play, classifications in which they belong, or states in which they change. The Data Model Resource Book, Volume 3: Universal Patterns for Data Modeling clearly illustrates these common structures. Len Silverston and Paul Agnew have created a valuable addition to our field, allowing us to improve the consistency and quality of our models by leveraging the many common structures within this text." — Steve Hoberman, Best-Selling Author of Data Modeling Made Simple "The large national health insurance company I work at has actively used these data patterns and the (Universal Data Models) UDM, ahead of this book, through Len Silverston’s UDM Jump Start engagement. The patterns have found their way into the core of our Enterprise Information Model, our data warehouse designs, and progressively into key business function databases. We are getting to reuse the patterns across projects and are reaping benefits in understanding, flexibility, and time-to-market. Thanks so much." — David Chasteen, Enterprise Information Architect "Reusing proven data modeling design patterns means exactly that. Data models become stable, but remain very flexible to accommodate changes. We have had the fortune of having Len and Paul share the patterns that are described in this book via our engagements with Universal Data Models, LLC. These data modeling design patterns have helped us to focus on the essential business issues because we have leveraged these reusable building blocks for many of the standard design problems. These design patterns have also helped us to evaluate the quality of data models for their intended purpose. Many times there are a lot of enhancements required. Too often the very specialized business-oriented data model is also implemented physically. This may have significant drawbacks to flexibility. I’m looking forward to increasing the data modeling design pattern competence within Nokia with the help of this book." — Teemu Mattelmaki, Chief Information Architect, Nokia "Once again, Len Silverston, this time together with Paul Agnew, has made a valuable contribution to the body of knowledge about datamodels, and the act of building sound data models. As a professional data modeler, and teacher of data modeling for almost three decades, I have always been aware that I had developed some familiar mental "patterns" which I acquired very early in my data modeling experience. When teaching data modeling, we use relatively simple workshops, but they are carefully designed so the students will see and acquire a lot of these basic "patterns" — templates that they will recognize and can use to interpret different subject matter into data model form quickly and easily. I’ve always used these patterns in the course of facilitating data modeling sessions; I was able to recognize "Ah, this is just like . . .," and quickly apply a pattern that I’d seen before. But, in all this time, I’ve never sat down and clearly categorized and documented what each of these “patterns’’ actually was in such a way that they could be easily and clearly communicated to others; Len and Paul have done exactly that. As in the other Data Model Resource Books, the thinking and writing is extraordinarily clear and understandable. I personally would have been very proud to have authored this book, and I sincerely applaud Len and Paul for another great contribution to the art and science of data modeling. It will be of great value to any data modeler." — William G. Smith, President, William G. Smith & Associates, www.williamgsmith.com "Len Silverston and Paul Agnew’s book, Universal Patterns for Data Modeling, is essential reading for anyone undertaking commercial datamodeling. With this latest volume that compiles and insightfully describes fundamental, universal data patterns, The Data Model Resource Book series represents the most important contribution to the data modeling discipline in the last decade." — Dr. Graeme Simsion, Author of Data Modeling Essentials and Data Modeling Theory and Practice "Volume 3 of this trilogy is a most welcome addition to Len Silverston’s two previous books in this area. Guidance has existed for some time for those who desire to use pattern-based analysis to jump-start their data modeling efforts. Guidance exists for those who want to use generalized and industry-specific data constructs to leverage their efforts. What has been missing is guidance to those of us needing guidance to complete the roughly one-third of data models that are not generalized or industry-specific. This is where the magic of individual organizational strategies must manifest itself, and Len and Paul have done so clearly and articulately in a manner that complements the first two volumes of The Data Model Resource Book. By adding this book to Volumes 1 and 2 you will be gaining access to some of the most integrated data modeling guidance available on the planet." — Dr. Peter Aiken, Author of XML in Data Management and data management industry leader VCU/Data Blueprint

Excel 2007 VBA Programming with XML and ASP

Excel 2007 Programming by Example with XML and ASP offers a hands-on approach for those looking to extend and customize Excel functionality. From recording a simple macro and writing VBA code to working with XML documents and using ASP to accss and display data, this book takes you on a progrmming journey that will change the way you work with Excel. Learn how to automate spreadsheet tasks with macros; write VBA code to program PivotTables, generate charts, build dialog boxes, and customize the Ribbon; handle errors and debug programs; create hyperlinks and publish HTML files. Retrieve data from the web directly into Excel; develop and manipulate smart tags using XML.

Workload Partition Management in IBM AIX Version 6.1

Workload partition functionality, originally introduced in 2007 with the release of IBM AIX Version 6, is a strategic component of the IBM AIX Operating System. With the release of AIX V6.1 TL2 in November 2008, both the core functionality and features related to managing workload partitions have been improved and expanded. This IBM Redbooks publication provides an updated introduction and “how to” guide for system administrators and architects using workload partitions in AIX V6.1 TL2. It builds on the original concepts and practices described in the first Redbooks publication about this topic, Introduction to Workload Partition Management in IBM AIX Version 6.1, SG24-7431 , published in 2007. In AIX 6.2 TL2, significant enhancements to core workload partition functions and new features have been added. Some of the important feature updates provide more flexibility and support for enhanced mobility, improved isolation, and NIM integration. A new and significantly updated version of IBM Workload Partitions Manager for AIX (WPAR Manager), the Web browser-based graphical user interface for managing and monitoring WPARs, is also available. WPAR Manager is a platform management solution that provides a centralized point of control for managing WPARs across a collection of managed systems running AIX.

Microsoft® SQL Server 2008 Management and Administration

If you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based reference you’ve been searching for. Authored by a world-class expert on SQL Server in the enterprise, this book goes far beyond the basics, taking on the complex tasks that DBAs need to make the most of Microsoft’s flagship database platform. SQL Server MVP, Ross Mistry presents proven techniques for SQL Server 2008 installation, upgrades, backup/restore, data transfer, indexing, high availability, security, and much more. He draws on extensive testing in high-profile production environments to offer step-by-step solutions and powerful tips you won’t find anywhere else. Every chapter begins with a section identifying SQL Server 2008’s most significant new improvements, and concludes with a convenient summary of best practices. Each chapter also outlines the benefits of leveraging Windows Server 2008. Understand how to: Master DBA tips, tricks, and best practices proven in actual enterprise environments Install, upgrade or transition to SQL Server 2008. Harden and Secure an implementation. Encrypt SQL Server from an end-to-end perspective. Implement high availability–and leverage SQL Server 2008’s major improvements to failover clustering and database mirroring Save time with SQL Server 2008’s new policy-based management tools Performance tune and troubleshoot a SQL Server 2008 environment. Optimize application performance and manage workloads with the powerful new Resource Governor Implement Performance Studio, maintenance plans, Transparent Data Encryption and much more… Bonus Content: The book is based on Windows Server 2008 Step by step instructions of how to implement a failover cluster on Windows Server 2008 SQL Server PoweShell Administration Tasks Consolidate and virtualize SQL Server with Hyper-V Step by step instructions on how to install Hyper-V Proactively Monitor SQL Server with Operations Manager Install Windows Server 2008 certificates to encrypt SQL Server data Contributing Writers include: Hilary Cotter — SQL Server MVP John Welch — SQL Server MVP Marco Shaw — PowerShell MVP Maciej Pilecki — SQL Server MVP Shirmattie Seenarine — Technical Writer

Beginning Oracle® Application Express

Oracle Application Express is an easy-to-use application development environment built on the Oracle technology stack. There are two aspects of that previous sentence that you may find jarring—that Oracle, a company widely known for its database technology, has an application development environment, and that Oracle, a company thought of as delivering high-end, enterprise-ready technology, has anything that is easy to use. But, as this book will show, the introductory statement is completely accurate. Oracle Application Express, commonly known as Oracle APEX or simply APEX, does benefit from the long-established enterprise-class robustness that is the hallmark of Oracle technology. The applications you build will be able to support hundreds of users and many terabytes of data, scalability far beyond even the imagination of most other development environments. And Oracle APEX, with its declarative, wizard-driven methodology, is truly easy to use. In the course of the few hundred pages of this book, you will not only learn about how to use APEX, you will create a usable order entry system. The fast learning curve presented in these pages is a consequence of many years of development and refinement of the APEX product, which began life almost a decade ago within Oracle. By the end of this volume, you will know enough to create your own applications, as well as having the knowledge and understanding of Oracle APEX and the world of Oracle technology to explore further refinements on your own. Best of all, you can use APEX with absolutely no cost—either in a hosted environment, as suggested in Chapter 1, or with a free version of the Oracle database. Welcome to the world of Oracle Application Express! This book is aimed at a particular group of users—those who are not familiar with Oracle Application Express. The book assumes that you have a basic knowledge of application development, the type you could get from playing around with a personal database such as Access. In fact, this book was written with an Access developer in mind—an Access developer looking to step up to a more scalable and reliable environment, with reduced maintenance overhead and greater integration between application systems. This book covers the use of Oracle Application Express. Although the book is based on the 3.5 version, you can use the book with older versions as well. However, since the book will use a hosted version of Oracle Application Express, and since both the Oracle database that support the product and the product itself are available as free downloads from http://otn.oracle.com, you should be able to use the latest version easily. This book is structured to give the reader a gradual introduction to the essentials of development with Oracle Application Express. The book contains the following: Welcome to Oracle!—This contains an overview of Oracle Application Express, as well as instructions on how to set up a hosted development environment for performing the exercises used in the book. Jumpstart Oracle Application Express—You will leap into creating applications with Oracle Application Express and finish a simple application by the end of this. Extending Your Oracle APEX Application—This will introduce you to the options in Oracle APEX that let you ensure that your users will enter correct data while using your application. Validation, Calculation, Navigation, and Lists—This continues the exploration of the aspects of APEX that help you to ensure that data used in your application is correct. Additionally, this covers basic navigation options for your application. Reporting and Charting—This covers the powerful and flexible reports you can create with Oracle APEX, and introduces you to the graphical capabilities of APEX reporting. Components Working Together—This extends your work with charts, showing how you can create charts that link to a more detailed view of the data they represent. You will also learn how to create a calendar page with links to the data shown as part of the calendar, and how to add images taken from the underlying database to an Oracle APEX report. Customizing User Interfaces—This explores advanced options for customizing user interfaces, on individual pages as well as across your entire APEX application. PL/SQL—This introduces you to PL/SQL, the underlying language used to implement your APEX application, and demonstrates how to use the power of PL/SQL to extend the logic in your application. Security—This covers how security is implemented for your APEX environment. Deployment and Administration—This covers the options you have for deploying an APEX application to another environment and walks you through one of those options. Additionally, this introduces you to the administrative functionality you can use to monitor and manage your APEX applications. Packaged Applications—This gives an overview of packaged applications available for Oracle Application Express, with a more detailed look at a select few. Migration—This describes how to migrate applications from Microsoft Access to Oracle Application Express.

Professional Microsoft® SQL Server® 2008 Reporting Services

Teaches solution architects, designers, and developers how to use Microsoft's reporting platform to create reporting and business intelligence (BI) solutions Updated with new information about holistic BI solutions, comprehensive OLAP/Analysis Services reporting, and complete production deployment scenarios Includes programming examples focused on specific, scenario-based solutions Explains reporting services architecture and business intelligence, teaches the fundamentals of designing reports through the use of careful planning considerations, and covers advanced report design and filtering techniques

Hibernate Search in Action

Hibernate Search in Action is a practical, example-oriented guide for Java developers with some background in Hibernate Core. As the first book to cover Hibernate Search, it guides you through every step to set up full text search functionality in your Java applications. The book also introduces core search techniques and reviews the relevant parts of Lucene, in particular the query capabilities. Hibernate Search in Action also provides a pragmatic, how-to exploration of more advanced topics such as Search clustering. For anyone using Hibernate or JBoss Seam, this book is the definitive guide on how to add or enhance search features in their applications. About the Technology Good search capability is one of the primary demands of a business application. Engines like Lucene provide a great starting point, but with complex applications it can be tricky to implement. It's tough to keep the index up to date, deal with the mismatch between the index structure and the domain model, handle querying conflicts, and so on. Hibernate Search is an enterprise search tool based on Hibernate Core and Apache Lucene. It provides full text search capabilities for Hibernate-based applications without the infrastructural code required by other search engines. With this free, open-source technology, you can quickly add high-powered search features in an intelligent, maintainable way. About the Book What's Inside About the Reader About the Author Emmanuel Bernard: After graduating from Supelec (French "Grande Ecole"), Emmanuel has spent a few years in the retail industry where he started to be involved in the ORM space and in full text technology. He joined the Hibernate team in 2003 and is now a lead developer at JBoss, a division of Red Hat. Emmanuel is the lead developer of Hibernate Annotations and Hibernate EntityManager, two key projects on top of Hibernate core implementing the Java Persistence(tm) specification. He has also lead the Hibernate Search project from its inception, reconsiling the two fields Emmanuel has been involved in: ORM and Full Text search. He is a regular speaker at various conferences and JUGs, including JavaOne, JBoss World and Javapolis (Javoxx). He is also involved in the Java Community Process as a specification lead for JSR 303 (Bean Validation) and as a expert group member for JSR 317 (Java Persistence 2.0). John Griffin has been in the software and computer industry in one form or another since 1969. He remembers writing his first FORTRAN IV program on his way back from Woodstock. Currently, he is the software engineer/architect for SOS Staffing Services, Inc. He was formerly the lead e-commerce architect for Iomega Corporation, lead SOA architect for Realm Systems and an independent consultant for the Dept of the Interior among many other callings. John has even spent time as an adjunct university professor. He enjoys being a committer to projects because he believes it's time to get involved and give back to the community. John is the author of XML and SQL Server 2000 published by New Riders Press. He is a member of the ACM. Currently, he resides in Layton, Utah with wife, Judy and Australian Shepherds, Clancy and Molly. Quotes A great resource for true database independent full text search. - Aaron Walker, base2Services It has completely changed the way I do complex search. Awesome! - Ayenda Rahien, Author of Building Domain Specific Languages in Boo Love its vast coverage--the definitive source. - Patrick Dennis, Management Dynamics Incs. Covers it all...the only source I need. - Robert Hanson, Author of GWT in Action A superb discussion of a complex topic. - Spencer Stejskal, SOS Staffing Services

Business Modeling

As business modeling becomes mainstream, every year more and more companies and government agencies are creating models of their businesses. But creating good business models is not a simple endeavor. Business modeling requires new skills. Written by two business modeling experts, this book shows you how to make your business modeling efforts successful. It provides in-depth coverage of each of the four distinct business modeling disciplines, helping you master them all and understand how to effectively combine them. It also details best practices for working with subject matter experts. And it shows how to develop models, and then analyze, simulate, and deploy them. This is essential, authoritative information that will put you miles ahead of everyone who continues to approach business modeling haphazardly. Provides in-depth coverage of the four business modeling disciplines: process modeling, motivation modeling, organization modeling, and rules modeling Offers guidance on how to work effectively with subject matter experts and how to run business modeling workshops Details today's best practices for building effective business models, and describes common mistakes that should be avoided Describes standards for each business modeling discipline Explains how to analyze, simulate, and deploy business models Includes examples both from the authors' work with clients and from a single running example that spans the book

SQL Server Forensic Analysis

“What Kevvie Fowler has done here is truly amazing: He has defined, established, and documented SQL server forensic methods and techniques, exposing readers to an entirely new area of forensics along the way. This fantastic book is a much needed and incredible contribution to the incident response and forensic communities.” —Curtis W. Rose, founder of Curtis W. Rose and Associates and coauthor of Real Digital Forensics The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly–a disclosure that is painful for companies and customers alike. There is only one way to avoid this problem: Master the specific skills needed to fully investigate SQL Server intrusions. In author Kevvie Fowler shows how to collect and preserve database artifacts safely and non-disruptively; analyze them to confirm or rule out database intrusions; and retrace the actions of an intruder within a database server. A chapter-length case study reinforces Fowler’s techniques as he guides you through a real-world investigation from start to finish. SQL Server Forensic Analysis, The techniques described in can be used both to identify unauthorized data access and modifications and to gather the information needed to recover from an intrusion by restoring the pre-incident database state. SQL Server Forensic Analysis Coverage includes Determining whether data was actually compromised during a database intrusion and, if so, which data Real-world forensic techniques that can be applied on all SQL Server instances, including those with default logging Identifying, extracting, and analyzing database evidence from both published and unpublished areas of SQL Server Building a complete SQL Server incident response toolkit Detecting and circumventing SQL Server rootkits Identifying and recovering previously deleted database data using native SQL Server commands is the first book of its kind to focus on the unique area of SQL Server incident response and forensics. Whether you’re a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, auditor, or database professional, you’ll find this book an indispensable resource. SQL Server Forensic Analysis

Microsoft® SQL Server™ 2008 Analysis Services Unleashed

As the foundation of the Microsoft Business Intelligence Strategy, Microsoft SQL Server 2008 Analysis Services provides users with faster access to data and even more tools for managing and analyzing data across multidimensional objects (databases, dimensions, cubes). Microsoft SQL Server 2008 Analysis Services Unleashed is the ultimate guide for anyone who is planning to use the latest version of Analysis Services. It gives readers insight into the way Analysis Services functions, and explains practical methods for designing and creating multidimensional objects. It also provides valuable insight into the reasons behind the design decisions taken by the product development team. The authors have been involved with Analysis Services from its earliest days. They have documented in detail the internal features of Analysis Services 2008, explaining server architecture, main data structures, data processing, and query resolution algorithms. Discover the new functionality introduced in Analysis Services 2008 including MDX enhancements and new DMV (dynamic memory views) Work with the Business Intelligence Development Studio, the new Dimension Editor, and Aggregation Designer interfaces Enjoy complete coverage of new Shared Scalable Databases scale-out infrastructure Learn the key concepts of multidimensional modeling Explore the multidimensional object model and its definition language Integrate multidimensional and relational databases Build client applications to access data in Analysis Services Unravel the inner workings of the server architecture, including main data structures, data processing, and query resolution algorithms Learn the main concepts of the MDX language and gain an in-depth understanding of advanced MDX concepts Gain a deeper understanding of the internal and external protocols for data transfer, including the XML/A protocol Discover how Analysis Services manages memory Explore the security model, including role-based security, code-access security, and data security Category: Microsoft SQL Server Covers: Microsoft SQL Server 2008 Analysis Services User Level: Intermediate-Advanced $59.99 USA / $65.99 CAN / £38.99 Net UK±

XML: Visual QuickStart Guide, Second Edition

What is XML? XML, or eXtensible Markup Language, is a specification for storing information. It is also a specification for describing the structure of that information. And while XML is a markup language (just like HTML), XML has no tags of its own. It allows the person writing the XML to create whatever tags they need. The only condition is that these newly created tags adhere to the rules of the XML specification. In the seven years since the first edition of “XML: Visual QuickStart Guide” was published, XML has taken its place next to HTML as a foundational language on the Internet. XML has become a very popular method for storing data and the most popular method for transmitting data between all sorts of systems and applications. The reason being, where HTML was designed to display information, XML was designed to manage it. This book begins by showing you the basics of the XML language. Then, by building on that knowledge, additional and supporting languages and systems will be discussed. To get the most out of this book, you should be somewhat familiar with HTML, although you don’t need to be an expert coder by any stretch. No other previous knowledge is required. “XML: Visual QuickStart Guide, 2nd Edition” is divided into seven parts. Each part contains one or more chapters with step-by-step instructions that explain how to perform XML-related tasks. Wherever possible, examples of the concepts being discussed are displayed, and the parts of the examples on which to focus are highlighted. The order of the book is intentionally designed to be an introduction to the fundamentals of XML, followed by discussions of related XML technologies. • In Part 1 of the book, you will learn how to create an XML document. It’s relatively straightforward, and even more so if you know a little HTML. • Part 2 focuses on XSL, which is a set of languages designed to transform an XML document into something else: an HTML file, a PDF document, or another XML document. Remember, XML is designed to store and transport data, not display it. • Parts 3 and 4 of the book discuss DTD and XML Schema, languages designed to define the structure of an XML document. In conjunction with XML Namespaces (Part 5), you can guarantee that XML documents conform to a pre-defined structure, whether created by you or by someone else. • Part 6, Developments and Trends, details some of the up-and-coming XML-related languages, as well as a few new versions of existing languages. • Finally, Part 7 identifies some well-known uses of XML in the world today; some of which you may be surprised to learn. This beginner’s guide to XML is broken down as follows: • Introduction • Chapter 1: Writing XML • Part 2: XSL • Chapter 2: XSLT • Chapter 3: XPath Patterns and Expressions • Chapter 4: XPath Functions • Chapter 5: XSL-FO • Part 3: DTD • Chapter 6: Creating a DTD • Chapter 7: Entities and Notations in DTDs • Chapter 8: Validation and Using DTDs • Part 4: XML Schema • Chapter 9: XML Schema Basics • Chapter 10: Defining Simple Types • Chapter 11: Defining Complex Types • Part 5: Namespaces • Chapter 12: XML Namespaces • Chapter 13: Using XML Namespaces • Part 6: Recent W3C Recommendations • Chapter 14: XSLT 2.0 • Chapter 15: XPath 2.0 • Chapter 16: XQuery 1.0 • Part 7: XML in Practice • Chapter 17: Ajax, RSS, SOAP and More

Beginning T-SQL with Microsoft® SQL Server® 2005 and 2008

If you have never programmed with T-SQL but have some background programming knowledge and experience, Beginning T-SQL with Microsoft SQL Server 2005 and 2006 will provide you with an overview of SQL Server query operations and tools used with T-SQL, Microsoft's implementation of the SQL database query language. Review basic query language commands and syntax, learn how to design and build applications, and understand how to optimize query performance. Improve your skills with the most up-to-date T-SQL guide, which provides hands-on examples and instructions to guide you through the process.

Deployment Guide Series: IBM Tivoli Identity Manager 5.0

Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014.

Beginning Google Maps Mashups with Mapplets, KML, and GeoRSS: From Novice to Professional

Beginning Google Maps Mashups with Mapplets, KML, and GeoRSS is a beginner's guide to creating web mashups using Google mapping technology. Serves as a single–source primer to displaying data on Google Maps Covers both Mapplets and the Google Maps API Provides everything you need to start participating in the geographic Web What you'll learn "Mash up" GeoWeb services onto a Google map Package your mashup as a mapplet and publish it to maps.google.com Enhance your map with driving directions, local search, map advertising, and more Discover common Google–mapping mistakes to avoid Find out how and when to geocode existing data into mappable coordinates Deliver your own data as GeoXML Who this book is for This book is for web designers and developers who have not worked with Google Maps or geographic data before. A working knowledge of HTML is required, and some programming experience is beneficial.

Pro Sync Framework

The Sync Framework is Microsoft's innovation to address the dilemma of occasionally connected systems. It is a comprehensive synchronization platform that enables collaboration and offline access for applications, services, and devices. In particular, it features technologies and tools that enable device roaming, sharing, and the ability to take networked data offline before synchronizing it back to the networked application at a later time. Pro Sync Framework concludes with a working example that shows how the techniques you've learned can be used to create a versatile application, adaptable to a wide variety of connectivity and synchronization challenges.

SAP Security Configuration and Deployment

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP

Data Mining with Microsoft® SQL Server® 2008

Understand how to use the new features of Microsoft SQL Server 2008 for data mining by using the tools in Data Mining with Microsoft SQL Server 2008, which will show you how to use the SQL Server Data Mining Toolset with Office 2007 to mine and analyze data. Explore each of the major data mining algorithms, including naive bayes, decision trees, time series, clustering, association rules, and neural networks. Learn more about topics like mining OLAP databases, data mining with SQL Server Integration Services 2008, and using Microsoft data mining to solve business analysis problems.

Beginning SQL Server 2008 Express for Developers: From Novice to Professional

Beginning SQL Server 2008 Express for Developers: From Novice to Professional takes a developer, and even a database administrator, from knowing nothing about SQL Server 2008 Express Edition to being ready to design and build a fully functioning system that is secure, reliable, maintainable, and robust. The Express Edition of SQL Server is a free resource commonly used by students, developers of small systems, and those transferring skills from other databases. This book focuses on the features within the Express Edition and therefore will not confuse readers with coverage of features found only in the Development Edition. By the end of the book, readers will be ready to move on to Accelerated SQL Server 2008 as well as other books within the Apress SQL Server lineup such as Pro SQL Server 2008 Reporting Services. Covers using the free Express Edition of SQL Server Describes creating a database from scratch and builds on this Provides an understanding of SQL Server Express 2008, allowing you to build future solutions for you and your business

Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management

Control Intellectual Property, and Avoid Information Overload Glean actionable business information from your "digital landfill" by deploying a flexible, cost-effective content management framework across your entire organization. Transforming Infoglut!: A Pragmatic Strategy for Oracle Enterprise Content Management details, step-by-step, how to rein in the current data explosion and gain the competitive edge. Get tips for building an enterprise content management (ECM) team, centralizing storage, finding and managing information, incorporating legacy systems, and handling unstructured content. You'll also learn how to secure your system, optimize performance, and ensure regulatory compliance. Design and manage a dynamic Oracle ECM infrastructure Consolidate corporate data using Oracle Universal Content Management Implement a flexible, scalable, and extensible middleware layer Centralize storage with Oracle Universal Records Management Suite Encrypt and secure data enterprise-wide using Oracle Information Rights Management Integrate Oracle WebCenter Services and Oracle Secure Enterprise Search Enhance structured enterprise applications with unstructured content Extend ECM functionality using cutting-edge Enterprise 2.0 tools

Microsoft® SQL Server® 2008 Step by Step

Teach yourself SQL Server 2008—one step at a time. Get the practical guidance you need to build database solutions that solve real-world business problems. Learn to integrate SQL Server data in your applications, write queries, develop reports, and employ powerful business intelligence systems. Discover how to: Install and work with core components and tools Create tables and index structures Manipulate and retrieve data Secure, manage, back up, and recover databases Apply tuning plus optimization techniques to generate high-performing database applications Optimize availability through clustering, database mirroring, and log shipping Tap business intelligence tools—Reporting, Analysis, and Integration Services CD features: Practice exercises and code samples Fully searchable eBook For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Intelligent Mentoring: How IBM Creates Value through People, Knowledge, and Relationships

How to Use Mentoring to Drive Maximum Competitive Advantage Techniques and lessons from IBM’s world-class mentoring programs—for every business and HR leader, strategist, Chief Learning Officer, consultant, trainer, and scholar “A crucial part of my job is to help develop and retain the more than 200,000 members of IBM’s global technical community. Over the years, I have found that the true spirit of any organization is its people, and unique, world-class mentoring programs play a crucial role in their success. What I really like about Intelligent Mentoring is that it is not an academic treatise on the theory of mentoring, but a series of practical solutions that can be used by virtually any organization to gain productivity, increase retention, and improve bottom-line results.” — Nick Donofrio, Executive Vice President, Innovation and Technology, IBM Corporation “We have known about the importance of mentoring in developing people for decades. Yet few organizations have successfully leveraged it as part of their HR strategy. IBM is one of those companies. Intelligent Mentoring is about more than the mentoring initiative successfully implemented at IBM. It is a guide for how companies can leverage mentoring in a way that aligns with company strategy and supports organizational and individual development. It is a must-read for any executive considering a mentoring initiative as part of the firm’s HR strategy. IBM’s mentoring effort combined the best of what we know from mentoring research, career development theory, and change management to create a highly successful effort. There is much here for practitioners and scholars to learn.” — David A. Thomas, Ph.D., Naylor Fitzhugh Professor of Business Administration, Harvard Business School “Performance is the ultimate driver of this company. Even back in our earliest days, one of the keys to IBM’s greatness was performance, along with top-notch technology. Since arriving at IBM in 2000, my goal has been to identify, develop, train, reward, and retain high-performing people, and one of the best ways to support these high performers is through mentoring. I believe that Intelligent Mentoring has done a phenomenal job of capturing the innovative and varied mentoring initiatives that IBM has used over the years. The authors really take you inside the company and show how mentoring has helped IBM preserve its corporate culture by passing on knowledge, not only between generations, but in all directions throughout our global community. This book is a must-read for anyone who wants to use the powerful tool of mentoring to its best and most productive advantage, and I recommend it highly.” — Randy MacDonald, Senior Vice President, Human Resources, IBM Corporation For today’s enterprises, few challenges are as daunting as preparing tomorrow’s leaders. Mentoring is one of the most powerful tools at their disposal. But not all mentoring programs are equally effective, and not all companies have learned how to sustain mentoring. One company has: IBM. Intelligent Mentoring reveals how IBM has done it–and offers specific guidance and best practices you can use to achieve equally powerful results. Intelligent Mentoring shows how IBM has fully integrated a diverse portfolio of formal mentoring initiatives into both talent development and innovation promotion. Whether you’re a business leader, strategist, Chief Learning Officer, training specialist, coach, or consultant, this book presents a state-of-the-art framework for making mentoring work. Drawing on IBM’s experience, the authors demonstrate how to build a diverse portfolio of effective mentoring programs...use mentoring to strengthen organizational intelligence...build sustainable communities of mentors and mentees...promote collaboration across differences... and above all, link mentoring to strategy and use it to sustain competitive advantage. • Use mentoring to develop tomorrow’s world-class business leaders Actionable solutions and best practices from IBM’s breakthrough mentoring program • Embrace mentoring as a high-performance work practice Maximizing, capturing, and communicating the value-added impact of mentoring • Set the right goals for mentoring: then achieve them Utilize mentoring to strengthen organizational learning, improve retention, promote innovation, and more • Use mentoring to solve your organization’s most “wicked” problems How mentoring can help you respond to complex, tangled challenges you’ve never faced before