talk-data.com talk-data.com

Event

O'Reilly Data Engineering Books

2001-10-19 – 2027-05-25 Oreilly Visit website ↗

Activities tracked

3406

Collection of O'Reilly books on Data Engineering.

Filtering by: data ×

Sessions & talks

Showing 3051–3075 of 3406 · Newest first

Search within this event →
SQL in a Nutshell, 2nd Edition

SQL in a Nutshell applies the eminently useful "Nutshell" format to Structured Query Language (SQL), the elegant--but complex--descriptive language that is used to create and manipulate large stores of data. For SQL programmers, analysts, and database administrators, the new second edition of SQL in a Nutshell is the essential date language reference for the world's top SQL database products. SQL in a Nutshell is a lean, focused, and thoroughly comprehensive reference for those who live in a deadline-driven world.This invaluable desktop quick reference drills down and documents every SQL command and how to use it in both commercial (Oracle, DB2, and Microsoft SQL Server) and open source implementations (PostgreSQL, and MySQL). It describes every command and reference and includes the command syntax (by vendor, if the syntax differs across implementations), a clear description, and practical examples that illustrate important concepts and uses. And it also explains how the leading commercial and open sources database product implement SQL. This wealth of information is packed into a succinct, comprehensive, and extraordinarily easy-to-use format that covers the SQL syntax of no less than 4 different databases.When you need fast, accurate, detailed, and up-to-date SQL information, SQL in a Nutshell, Second Edition will be the quick reference you'll reach for every time. SQL in a Nutshell is small enough to keep by your keyboard, and concise (as well as clearly organized) enough that you can look up the syntax you need quickly without having to wade through a lot of useless fluff. You won't want to work on a project involving SQL without it.

XML in a Nutshell, 3rd Edition

If you're a developer working with XML, you know there's a lot to know about XML, and the XML space is evolving almost moment by moment. But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell.With XML in a Nutshell beside your keyboard, you'll be able to: This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.

End-to-End Scheduling with IBM Tivoli Workload Scheduler Version 8.2

The beginning of the new century sees the data center with a mix of work, hardware, and operating systems previously undreamed of. Today’s challenge is to manage disparate systems with minimal effort and maximum reliability. People experienced in scheduling traditional host-based batch work must now manage distributed systems, and those working in the distributed environment must take responsibility for work running on the corporate OS/390 system. This IBM Redbooks publication considers how best to provide end-to-end scheduling using IBM Tivoli Workload Scheduler Version 8.2, both distributed (previously known as Maestro) and mainframe (previously known as OPC) components. In this book, we provide the information for installing the necessary Tivoli Workload Scheduler 8.2 software components and configuring them to communicate with each other. In addition to technical information, we consider various scenarios that may be encountered in the enterprise and suggest practical solutions. We describe how to manage work and dependencies across both environments using a single point of control. We believe that this book will be a valuable reference for IT specialists who implement end-to-end scheduling with Tivoli Workload Scheduler 8.2.

Privacy What Developers and IT Professionals Should Know

Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." —Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." —Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." —Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." —Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." —Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." —Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." —Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-enhancing and potentially privacy-invading technologies, J.C.'s analysis is thorough and well-balanced. J.C. also explains many of the legal implications of electronic privacy policies and technologies, providing an invaluable domestic and international view." —Steve Riley, Product Manager, Security Business and Technology Unit, Windows Division, Microsoft "Privacy concerns are pervasive in today's high-tech existence. The issues covered by this book should be among the foremost concerns of developers and technology management alike." —Len Sassaman, Security Architect, Anonymizer, Inc. You're responsible for your customers' private information. If you betray their trust, it can destroy your business. Privacy policies are no longer enough. You must make sure your systems truly protect privacy—and it isn't easy. That's where this book comes in. J.C. Cannon, Microsoft's top privacy technology strategist, covers every facet of protecting customer privacy, both technical and organizational. You'll learn how to systematically build privacy safeguards into any application, Web site, or enterprise system, in any environment, on any platform. You'll discover the best practices for building business infrastructure and processes that protect customer privacy. You'll even learn how to help your customers work with you in protecting their own privacy. Coverage includes How privacy and security relate—and why security isn't enough Understanding your legal obligations to protect privacy Contemporary privacy policies, privacy-invasive technologies, and privacy-enhancing solutions Auditing existing systems to identify privacy problem areas Protecting your organization against privacy intrusions Integrating privacy throughout the development process Developing privacy-aware applications: a complete sample application Building a team to promote customer privacy: staffing, training, evangelization, and quick-response Protecting data and databases via role-based access control Using Digital Rights Management to restrict customer information Privacy from the customer's standpoint: spam avoidance, P3P, and other tools and resources Whether you're a manager, IT professional, developer, or security specialist, this book delivers all the information you need to protect your customers—and your organization. The accompanying CD-ROM provides sample privacy-enabling source code and additional privacy resources for developers and managers. J. C. CANNON, privacy strategist at Microsoft's Corporate Privacy Group, specializes in implementing application technologies that maximize consumer control over privacy and enable developers to create privacy-aware applications. He works closely with Microsoft product groups and external developers to help them build privacy into applications. He also contributed the chapter on privacy to Michael Howard's Writing Secure Code (Microsoft Press 2003). Cannon has spent nearly twenty-five years in software development. © Copyright Pearson Education. All rights reserved.

Patterns: Information Aggregation and Data Integration with DB2 Information Integrator

This IBM Redbooks publication documents and prototypes the role of DB2 Information Integrator technologies and architecture in IBM's Patterns for e-business using a typical customer insight e-business scenario. It is aimed at an audience of IT architects and data integration professionals responsible for developing e-business solutions that integrate processes and data from multiple distributed heterogeneous systems. This publication provides an overview of IBM’s Patterns for e-business, and the DB2 Information Integration architecture. It also describes the various application and runtime patterns identified to date for Information Aggregation and Data Integration, as defined in "Patterns for e-business". Using a typical customer insight e-business scenario, this publication documents the step-by-step patterns approach to implementing the e-business solution. At each level in the hierarchy, each available pattern is evaluated and chosen before drilling down to the next lower layer where the pattern evaluation and selection process is repeated. The final drill down leads to product selection and implementation information.

Business solutions Automating Microsoft® Access with VBA

If you use Microsoft Access in your every day business life but haven't learned to fully exploit the program, now's your chance. Automating Microsoft Access with VBA is a thorough introduction to programming Microsoft Accessing using Visual Basic for Applications (VBA). With this book, you will gain a working knowledge of VBA and be able to customize your Microsoft Access databases. You will cover topics that include: Operators and functions Debugging and error handling Menu commands Forms and reports Jet databases DAO object model Save money by learning to use VBA to customize your databases instead of paying someone else to do it for you!

Exploring Storage Management Efficiencies and Provisioning - Understanding IBM TotalStorage Productivity Center and IBM TotalStorage Productivity Center with Advanced Provisioning

This IBM Redbooks publication provides an overview of the solution offerings — IBM TotalStorage Productivity Center and IBM TotalStorage Productivity Center with Advanced Provisioning. It presents an overview of the product components and functions, explaining the architecture and showing the use of storage provisioning workflows. This book is intended for those who want to learn more about IBM TotalStorage Productivity Center, IBM TotalStorage Productivity Center with Advanced Provisioning, and IBM TotalStorage Provisioning Manager. This easy-to-follow guide describes on demand provisioning for managing resources and information, as well as enhancing automation by explaining how these innovative offerings may improve client business. The book explains how to take storage management concepts to the next level, describing the architecture, components, and component interaction, explaining storage automation, and showing how to create high and low level workflows by using examples along with common storage management tasks. Narrated screen recordings in QuickTime format: IBM TotalStorage Productivity Center LaunchPad demonstration (26MB) IBM Tivoli TotalStorage Provisioning Manager Overview (62MB) IBM TotalStorage Productivity Center with Advanced Provisioning Workflow Case Study (66MB) Please note that the additional material referenced in the text is not available from IBM.

Oracle Initialization Parameters Pocket Reference

Oracle designed its database products to be flexible and configurable so they would operate on a variety of hardware platforms, and they succeeded--Oracle software runs on more than seventy computer platforms, from mainframes to PC networks to handheld PDAs. The secret to this flexibility lies in the software's initialization parameters, whose numerous settings can be configured for top performance in countless environments. On the downside, however, improper settings can slow a system down; even grind it to a halt. And with so many parameters--which change from version to version of Oracle software--it's challenging for Oracle administrators to keep in mind the characteristics and optimal settings for each parameter.The Oracle Initialization Parameters Pocket Reference provides the crucial information you need to make key adjustments to your Oracle database. This concise guide is a mix of invaluable performance tips and a quick reference to Oracle's initialization parameters. The book describes each initialization parameter, indicates what category it's in--from auditing to multi-threaded server MTS--and whether it can be modified dynamically via the ALTER SESSION or ALTER SYSTEM command.In addition to the details about parameter characteristics and settings, you'll find performance tips, such as how the various parameters interact, and what the most advantageous settings are for different configurations. No other reference focuses exclusively on these initialization parameters--an absolute must for anyone working with an Oracle database.Presented in a handy, easy-to-use format, the Oracle Initialization Parameters Pocket Reference is a welcome alternative for anyone who's struggled to memorize the best configuration settings or gone back and forth to online resources, trying to figure out what works. O'Reilly's Pocket References put the information you need close at hand where you need it most. This guide will keep your Oracle databases operating at peak performance.

Microsoft® Access 2003 Forms, Reports and Queries

When it comes to job-productivity, we all want to be able to perform well, especially when it comes to challenging assignments. Anyone who works with Microsoft Access on a regular basis knows that this program can prove to be one of the most challenging. If you are looking for a way to get the most you can out of the primary Access tasks, Microsoft Access 2003 Forms, Reports and Queries is the learning tool that you need. Focusing only on the forms, reports and queries functions, this book provides you with practical know-how, real-world examples and techniques that you can put to use immediately. Learn to condense mountains of information into manageable molehills of useful knowledge, so that you can perform at your best!

Transition from PSSP to Cluster Systems Management (CSM)

This IBM Redbooks publication covers the process of converting a PSSP cluster to a CSM cluster. It examines the different tools, utilities, documentation and other resources available to help the system administrator move a system from PSSP to CSM. This book also makes recommendations about which procedures are most suitable for different types of customer environments (high performance technical computing, server consolidation, business intelligence, etc.) and points out the relative advantages and disadvantages of the different procedures, tools, and methods. Customers will use the working knowledge presented in this book to plan and accomplish the transition of their own clustered systems from PSSP to CSM. Are you using GPFS? This transition book covers a number of GPFS transition methods, each with its own recommendations, GPFS cluster types, advantages versus disadvantages, and step-by-step scenarios. It also shows a method of moving GPFS storage between two clusters, which could be used during hardware transition or upgrades.

Web Search Garage

Best-selling author and research expert Tara Calishain offers her insider tips and tricks for web searching in this title from Prentice Hall PTR's Garage Series. The book begins with an in-depth look at search engines and other online tools such as browsers. It describes several principles of web searching to help you leverage the scope of the Internet to discover information. The book also covers specific topic areas of Internet searching, both domestically and internationally. Finally, includes a special technical support section to teach you how to find the support solutions you need on the Internet. Web Search Garage Specific topics covered include Search engines Browsers The principles of web searching Searching for news, jobs, and local information Finding images and audio on the web Searching for people Genealogy research Consumer help Drugs and medical information Kid-safe searching Whether you're a newbie or an Internet search guru, is a valuable resource for using the Internet wisely to find the information you're looking for. Calishain's thorough explanations and examples, combined with her entertaining wit will help you fine-tune your skills and search the Internet to find convenient solutions. Web Search Garage

Microsoft Office Access 2003 in a Snap

Microsoft Access is a database development and maintenance program, but it can be confusing when trying to learn how to complete the tasks required to create an application. Microsoft Access 2003 In a Snap can quickly show you how to complete a specific task in an easy-to-follow format complete with illustrated steps. Sections of the book are organized into task categories such as Table Creation, Queries and Form Design. Intended to keep you focused and on-target, this book does not spend time explaining database architecture or application design. If you are the casual Access user or if you use it in your day-to-day work life, this book is a great reference tool!

IBM eServer zSeries 990 (z990) Cryptography Implementation

The IBM z990 includes both standard cryptographic hardware and optional cryptographic features, to give flexibility and growth capability. IBM has a long history of providing hardware cryptographic solutions, from the development of Data Encryption Standard (DES) in the 1970s to delivering the only integrated cryptographic hardware in a server to achieve the US Government's highest FIPS 140-2 Level 4 rating for secure cryptographic hardware.

Linux on IBM eServer zSeries and S/390: Performance Toolkit for VM

This IBM Redbooks publication discusses Performance Toolkit for VM, a performance monitoring and analysis tool for z/VM. Derived from the earlier FCON/ESA product, Performance Toolkit for VM enables system administrators to collect and analyze VM performance data. Both real-time and history data can be processed by Performance Toolkit for VM, and it provides most of the functions that are available in Real Time Monitor (RTM) and Performance Reporting Facility (PRF). In this book, we present an overview of the functions and features of Performance Toolkit for VM. We show how to navigate through its major monitoring screens and configure it. We also describe configuration for monitoring remote z/VM systems. Using examples, we illustrate how to monitor your z/VM system to identify potential performance problems. Major performance factors for running Linux guests under z/VM are discussed.

XML Hacks

Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.

MySQL® Administrator's Guide

If you are not already one of the 4 million plus users of the MySQL database, you will want to become one after reading this book. MySQL Administrator's Guide is the official guide to installing, administering and working with MySQL 5.0 and MySQL databases. Starting with the basics, you will learn to store, manage and retrieve data in a MySQL database and to eventually manipulate the code behind MySQL 5.0 to customize your database. With the clear examples and tips provided in this comprehensive learning guide, you can become a MySQL expert in no time.

Oracle Database 10g XML & SQL: Design, Build, & Manage XML Applications in Java, C, C++, & PL/SQL

Written by members of the Oracle XML group, this is a must-have reference for all IT managers, DBAs, and developers who want to learn the best practices for using XML with Oracle’s XML-enabled products. Includes real-world case studies based on the authors’ experience managing Oracle’s XML Discussion Forum--a community of 20,000+ XML component users.

Enterprise Integration: The Essential Guide to Integration Solutions

“The book’s use of real-world case study vignettes really does go to the heart of the subject matter. This stuff is real, it has real applicability to real problems, and, as with most things in life, it shows how it all comes down to real money in the final analysis. This book shows you what your peers are doing to drive costs out of integration projects and to build new applications without re-inventing the entire wheel—just a few new spokes and off you go. This is a good book. Read it.” — Peter Rhys Jenkins, Complex Systems Architect, Candle Corporation “When you get two long-term, acknowledged experts on integration and interoperability together to lay out the current state of the IT universe you expect an immediate return on investment—and this book delivers. It’s common knowledge that 90% of total software lifecycle cost is in maintenance and integration, and that needs to drive IT decision-making. With comprehensive coverage of the integration technology landscape, and clear case studies presented at every turn, this book belongs on every IT manager’s, every system architect’s, and every software developer’s bookshelf.” — Richard Mark Soley, chairman and CEO, Object Management Group “Today’s myriad of integration technologies and alternatives can be daunting. This book presents a framework and process for the evaluation, design, and selection of the appropriate integration technologies to meet your strategic business needs. You will find the templates a particularly useful mechanism to jump-start documentation and drive your decision-making process.” — Ron Zahavi, CIO, Global Business Transformation, Unisys Global Transformation Team; author of Enterprise Application Integration with CORBA “It is refreshing to read a book that presents a good business approach to the integration challenge facing most business leaders today, while at the same time educating them about the major components of the required technologies and management practices changes required. The narrative, examples, and templates establish a common reference point between the business and the technology organizations. A must-read for senior business leaders challenged with the complexities of business integration, as well as Senior IT Leaders challenged with shrinking budgets and lower tolerances for failures.” — Chuck Papageorgiou, managing partner, Ideasphere “Integration has, and will continue to be, one of the success indicators of any enterprise project. Failing to understand the nuances of integration is a critical mistake managers cannot afford to make.” — Marcia Robinson, author of Services Blueprint: Roadmap for Execution “A much-needed book; it ties together the business and technology aspects of information system implementation, emphasizing best practices for really getting things done. I believe that both the technical and business communities will benefit from the in-depth material provided in this book.” — Dr. Barry Horowitz, professor of systems and information engineering, University of Virginia (former CEO, Mitre Corporation) Integration of applications, information, and business process has become today’s #1 IT investment priority. Most enterprise integration books simply explain the technology. This one shows exactly how to apply it. It’s a step-by-step roadmap for your entire project—from the earliest exploratory stages through analysis, design, architecture, and implementation. Renowned enterprise integration experts Beth Gold-Bernstein and William Ruh present best practices and case studies that bring their methodology to life. They address every stage from the decision-maker’s and implementer’s point of view—showing how to align business requirements to specific solutions, systematically reduce risk, and maximize ROI throughout the entire lifecycle. Coverage includes: Supporting strategies, tactics, and business planning: enterprise integration from the business perspective Defining realistic project success indicators and metrics Establishing integration architectures: supporting near-term needs while building reusable infrastructure services for the long-term Adopting metadata architecture and standards Implementing four essential implementation patterns: application, information, composite, and process integration Understanding service integration and implementing service-oriented architectures Providing organizational structure and governance to support effective integration The authors provide detailed plans and specification templates for application integration projects—both in the book and on the CD-ROM. These projects include identifying business drivers and requirements; establishing strategy; and integrating services, information, process, and applications. was written for every member of the integration team: business and IT leaders, strategists, architects, project managers, and technical staff. Regardless of your role, you’ll discover Enterprise Integration where you fit, what to do, and how to drive maximum business value from your next integration project.

Oracle Wait Interface: A Practical Guide to Performance Diagnostics & Tuning

Troubleshoot, tune, and optimize your Oracle database efficiently and successfully every time. This book explains how to take full advantage of the revolutionary Oracle Wait Interface to quickly pinpoint--and solve--core problems and bottlenecks, and increase productivity exponentially.

XML for DB2 Information Integration

In many organizations, relational databases are the backbone for data storage and retrieval. Over the last couple of years, XML has become the de facto standard to exchange information between organizations, as well as between departments or applications within the same organization. Since data tends to live in databases, it needs to be converted from a relational format into an XML format when involved in those data exchanges, as well as converted (back) from XML into a relational format for storage, or for handling by other applications. How can we achieve this? This IBM Redbooks publication describes how to design the mapping between XML and relational data, and vice versa, to enable a flexible exchange of information. IBM provides a number of products to help you bridge the gap between XML and its relational database, DB2. The DB2 engine itself provides support to generate XML fragments from relational data through the use of SQL/XML built-in functions. DB2 also provides the DB2 XML Extender. It allows you to perform XML composition, like SQL/XML, but also provides functionality to decompose XML documents and store XML documents intact inside the database. XML Extender also provides a set of transformation and validation functions. Another option to work with XML is to use the XML wrapper, a part of the set of non-relational wrappers of DB2 Information Integrator. This book also looks at the IBM tools available to assist you when dealing with XML, specifically WebSphere Application Developer and DB2 Control Center. Please note that the additional material referenced in the text is not available from IBM.

Special Edition Using® Crystal Reports® 10

Special Edition Using Crystal Reports 10 is a reference guide designed to provide hands-on experience with the latest release of the product suite. The latest version of the Crystal Reporting Suite, delivers vast enhancements that drive upgrades from licensees who'll seek a reference to help them migrate. As Crystal Decisions insiders, the authors bring unique and valuable real-world perspectives on implementations and use of the Crystal Reports product. The book includes content, tutorials and samples for reporting within the Microsoft Visual Studio.NET environment and on the SAP Business Information Warehouse. New content on report distribution, and integration into the secured managed reporting solution known as Crystal Enterprise, is also now included in this definitive user guide.

IBM TotalStorage Enterprise Storage Server Implementing ESS Copy Services with IBM eServer zSeries

This IBM Redbooks publication describes the copy functions available with the IBM TotalStorage Enterprise Storage Server (ESS). The powerful ESS Copy Services functions are explained in detail, and their characteristics are thoroughly covered. This book also provides information on how to manage the various ESS Copy Services functions, and discusses their implementation. This book applies to the ESS Models when used in the IBM eServer zSeries environments. Because this book provides a broad understanding of the ESS Copy Services functions, as well as presenting details about the management interfaces and the implementation considerations, it is a recommended manual for IT professionals who are planning the implementation of any of the ESS Copy Services functions in a zSeries environment, as well as for those who will manage these environments. This fifth edition of the book has been updated with the latest ESS Copy Services announcements: Asynchronous PPRC can be used for a two site Disaster Recovery solution, a FlashCopy target can now be a PPRC primary, and there are several other updates associated with ESS LIC 2.4.0. These include the ESS Model 750 overview, minor additions for ESS API support, Multiple Device Manager Replication Manager, Asynchronous PPRC Utilities for Open System Environment, and Asynchronous PPRC Utilities for ICKDSF User.

A First Look at Solution Installation for Autonomic Computing

This IBM Redbooks publication provides a first look at the Solution Installation capability that is a key component of the IBM Autonomic Computing initiative. Autonomic computing technologies enable complex computing systems to be self-configuring, self-healing, self-optimizing, and self-protecting. One aspect of this is the ability to automate the change management processes associated with deploying and managing software required for business solutions. The Solution Installation technologies that are described are evolving and will be enhanced over time. This publication provides the reader with an opportunity to understand the underlying concepts and facilities. This publication is based on Version 1.2 of the Solution Installation toolkit and describes both architectural concepts as well as specific examples that apply to the current version. We attempt to make clear when a key architectural concept is not fully implemented at this time. Readers of this book will gain an understanding of the basic concepts, and how the architecture described will provide business value as it becomes fully implemented and utilized by IBM and other software vendors. Please note that the additional material referenced in the text is not available from IBM.

Effective Oracle Database 10g Security by Design

Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. “In my experience in the security world, including 32 years at the Central Intelligence Agency, I’ve not found anyone with more experience in the theory and practice of protecting your data than David Knox.” --Dave Carey, former Executive Director of the CIA