talk-data.com talk-data.com

Event

O'Reilly Data Engineering Books

2001-10-19 – 2027-05-25 Oreilly Visit website ↗

Activities tracked

615

Collection of O'Reilly books on Data Engineering.

Filtering by: Cyber Security ×

Sessions & talks

Showing 451–475 of 615 · Newest first

Search within this event →
Oracle Database 11g Building Oracle XML DB Applications

Master the XML Programming Features in Oracle Database 11 g Develop, debug, and administer data-backed XML applications using the expert instruction and best practices in this Oracle Press guide. Oracle Database 11g: Building Oracle XML DB Applications discusses the latest development tools, technologies, and components. Find out how to set up Oracle XML Database (Oracle XML DB), build XML applications in Oracle JDeveloper 11 g, work with XSLT stylesheets, and incorporate full-text search. Troubleshooting, performance tuning, and security are also covered in this comprehensive resource. Create, store, and query XML types using Oracle XML DB Load XML documents into relational tables and define SQL views Parse and validate schema with Oracle XDK for Java and PL/SQL packages Merge documents, generate reports, and transform data using XSLT Construct applications from Oracle XML DB Web services Use Oracle JDeveloper 11 g to design and deploy XML applications Integrate Oracle Text and Oracle Secure Enterprise Search features Streamline the development process using Oracle Application Express

IBM Tivoli Directory Server for z/OS

This IBM® Redbooks® publication examines the IBM Tivoli® Directory Server for z/OS®. IBM Tivoli Directory Server is a powerful Lightweight Directory Access Protocol (LDAP) infrastructure that provides a foundation for deploying comprehensive identity management applications and advanced software architectures. This publication provides an introduction to the IBM Tivoli Directory Server for z/OS that provides a brief summary of its features and a examination of the possible deployment topologies. It discusses planning a deployment of IBM Tivoli Directory Server for z/OS, which includes prerequisites, planning considerations, and data stores, and provides a brief overview of the configuration process. Additional chapters provide a detailed discussion of the IBM Tivoli Directory Server for z/OS architecture that examines the supported back ends, discusses in what scenarios they are best used, and provides usage examples for each back end. The discussion of schemas breaks down the schema and provides guidance on extending it. A broad discussion of authentication, authorization, and security examines the various access protections, bind mechanisms, and transport security available with IBM Tivoli Directory Server for z/OS. This chapter also provides an examination of the new Password Policy feature. Basic and advanced replication topologies are also covered. A discussion on plug-ins provides details on the various types of plug-ins, the plug-in architecture, and creating a plug-in, and provides an example plug-in. Integration of IBM Tivoli Directory Server for z/OS into the IBM Workload Manager environment is also covered. This publication also provides detailed information about the configuration of IBM Tivoli Directory Server for z/OS. It discusses deploying IBM Tivoli Directory Server for z/OS on a single system, with examples of configuring the available back ends. Configuration examples are also provided for deploying the server in a Sysplex, and for both basic and advanced replication topologies. Finally it provides guidance on monitoring and debugging IBM Tivoli Directory Server for z/OS.

Oracle Application Express 4 Recipes

Oracle Application Express 4 Recipes provides an example-based approach to learning Application Express—the ground-breaking, rapid application development platform included with every Oracle Database license. The recipes format is ideal for the quick-study who just wants a good example or two to kick start their thinking and get pointed in the right direction. The recipes cover the gamut of Application Express development. Author and Application Express expert Edmund Zehoo shows how to create data entry screens, visualize data in the form of reports and charts, implement validation and back-end logic, and much more. Solutions are presented in an easy, problem/solution format from which you can copy and adapt for your own use. Detailed discussion for each solution deepens your understanding and aids in customizing the solutions to fit your particular development challenges. Teaches Application Express via an example-based format Takes you from beginner to intermediate level Shows how to build a fully-functional web store in just one hour What you'll learn Create web application forms and tables Customize application look and feel Visualize data via reports, calendars, maps, and charts Globalize applications in support of language and regional differences Implement complex business logic Optimize the performance of Application Express Protect applications from security threats Who this book is for Oracle Application Express 4 Recipes is aimed at web application developers, PL/SQL developers, and database administrators wishing to learn and use Oracle's groundbreaking tool for rapid development—Application Express. The book is a quick-study and is perfect for the reader who wants only a good example to work from, customize, and adapt.

Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation

This book, "Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation," serves as a comprehensive guide for understanding PeopleSoft Financials applications. It delves into core concepts, configurations, and business processes, providing practical, real-world scenarios to bridge theory and application. By mastering the content, readers will be prepared to successfully implement PeopleSoft Financials in complex organizational environments. What this Book will help me do Grasp the core principles of financial ERP systems and PeopleSoft's approach to effective financial application management. Learn to configure security settings to control access to system features, ensuring proper user management. Understand and implement crucial financial modules such as Billing, Accounts Payable, Accounts Receivable, and Asset Management. Develop strategies for budgeting and expense management through Commitment Control and the Expenses module. Gain hands-on experience with PeopleSoft's Setup Manager to navigate and complete implementation tasks efficiently. Author(s) Ranjeet Yadav brings extensive experience in implementing and working with PeopleSoft Financials across various industries. With an in-depth understanding of both the technical and functional aspects of PeopleSoft systems, he has crafted this book to be both accessible and informative for practitioners. Ranjeet's teaching approach focuses on practical knowledge, equipping his readers to tackle real-world challenges confidently. Who is it for? This book is well-suited for functional implementation analysts, business analysts, and business users starting with PeopleSoft applications. It is ideal for individuals aiming to enhance their PeopleSoft Financials skills and gain a comprehensive understanding of its implementation. If you're looking to build a strong foundation in PeopleSoft systems and improve your organization's financial operations, this book is tailored to your needs.

Oracle Fusion Middleware 11g Architecture and Management

Master All Aspects of Oracle Fusion Middleware Management Govern a unified platform for agile, intelligent business applications using the detailed information contained in this Oracle Press book. Oracle Fusion Middleware 11g Architecture and Management explains the entire suite of Oracle Fusion Middleware components and lays out core use cases, best practices, and step-by-step administrative instructions. Discover how to provision servers and clusters, configure Web services, manage portals, and optimize the performance of the full stack of Oracle Fusion Middleware components. Monitoring, diagnosing, and security are also covered in this definitive resource. Understand key architectural concepts behind Oracle Fusion Middleware 11 g Create and deploy Oracle WebLogic Server domains and clusters Set up and manage applications built using Oracle Application Development Framework Maximize the value of your Oracle SOA Suite environments Manage portals and Enterprise 2.0 services from Oracle WebCenter Secure deployments with Oracle Platform Security Services and Oracle Identity Management Understand Oracle Exalogic and Oracle Virtual Assembly Builder

Expert Oracle Application Express

Expert Oracle Application Express brings you groundbreaking insights into developing with Oracle's enterprise-level, rapid-development tool from some of the best practitioners in the field today. Oracle Application Express (APEX) is an entirely web-based development framework that is built into every edition of Oracle Database. The framework rests upon Oracle's powerful PL/SQL language, enabling power users and developers to rapidly develop applications that easily scale to hundreds, even thousands of concurrent users. The 13 authors of Expert Oracle Application Express build their careers around APEX. They know what it takes to make the product sing—developing secure applications that can be deployed globally to users inside and outside a large enterprise. The authors come together in this book to share some of their deepest and most powerful insights into solving the difficult problems surrounding scalability, globalization, configuration and lifecycle management, and more. You'll learn about debugging and performance, deep secrets to customizing your application user interface, how to secure applications from intrusion, and about deploying globally in multiple languages. Expert Oracle Application Express is truly a book that will move you and your skillset a big step towards the apex of Application Express development. Presents best-practices and development insights from leading experts in the field Addresses globalization, scalability, security, and other concerns of enterprise-level development Shows how to customize APEX for your own application needs What you'll learn Solve tough problems in scalability in order to serve thousands of users Design applications to sidestep performance problems and easily scale upwards Deploy applications globally while respecting linguistic and cultural differences Customize applications by exploiting APEX's roots in PL/SQL Reduce the stress of managing application lifecycle and configuration Secure outwardly-facing applications and their data from intrusion Who this book is for Expert Oracle Application Express is aimed at APEX developers who seek the deepest possible knowledge of Oracle Application Express and how to develop with it. Readers should know and be proficient with APEX, and be prepared to expend some mental energy in absorbing the high-end material in this book.

Sams Teach Yourself SQL in 24 Hours, Fifth Edition

Master all the fundamentals of modern SQL -- hands-on, step-by-step! ¿ The up-to-the-minute SQL tutorial for everyone who wants to create applications, query data, or manage databases Updated to cover the latest ANSI/ISO standards, plus powerful Oracle and SQL Server extensions Covers everything from the basics through optimization, security, and enterprise techniques Step-by-step instructions, examples, quizzes, exercises, and tips In just 24 sessions of one hour or less, beginning-to-intermediate-level readers learn how to use SQL to build effective databases, efficiently retrieve data, and manage everything from performance to security! Using this book's straightforward, step-by-step approach, you learn hands-on, through practical examples based on the free, open source MySQL database. One step at a time, you discover how to define efficient database structures, objects, and tables edit data and tables manage transactions write effective queries categorize, summarize, sort, group, and restructure data use joins and subqueries manage databases, users, and security use views, synonyms, and system catalogs extend SQL to the enterprise and Internet even master important Oracle and Microsoft SQL Server extensions. Step-by-step instructions carefully walk through common questions, issues, and tasks... Q and As, Quizzes, and Exercises help you build and test your knowledge... Notes, Tips, and Cautions point out shortcuts, solutions, and problems to avoid. Each lesson builds on what you've already learned, delivering a strong real-world foundation for success with any relational database environment or application!

IBM Converged Switch B32

This IBM® Redbooks® document introduces the IBM Converged Switch B32. This switch supports Fibre Channel over Ethernet (FCoE), Fibre Channel, Converged Enhanced Ethernet (CEE), and traditional Ethernet protocol connectivity for servers and storage. FCoE is a new protocol that can expand Fibre Channel into the Ethernet environment, and it helps to combine and leverage the advantages of two technologies, Fibre Channel protocol and Ethernet. Features of the IBM Converged Switch B32 include: A 32-port multiprotocol switch for server I/O consolidation Enterprise-class availability for business continuance Improved return on investment and investment protection Fabric security for mission-critical information

How to Cheat at Securing SQL Server 2005

The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible. Provides the multi-tasked Sys Admin with the essential information needed to perform the daily tasks Covers SQL Server 2005, which is a massive product with significant challenges for IT managers Emphasizes best-practice security measures

Getting Started with the IBM Smart Analytics System 9600

The IBM® Smart Analytics System 9600 is a single, end-to-end business analytics solution to accelerate data warehousing and business intelligence initiatives. It provides integrated hardware, software, and services that enable enterprise customers to quickly and cost-effectively deploy business-changing analytics across their organizations. As a workload-optimized system for business analytics, it leverages the strengths of the System z® platform to drive: Significant savings in hardware, software, operating, and people costs to deliver a complete range of data warehouse and BI capabilities Faster time to value with a reduction in the time and speed associated with deploying Business Intelligence Industry-leading scalability, reliability, availability, and security Simplified and faster access to the data on System z

Oracle 10g Developing Media Rich Applications

Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997, Oracle became the first commercial database with integrated multimedia technology for application developers. Since that time, Oracle has enhanced and extended these features to include native support for image, audio, video and streaming media storage; indexing, retrieval and processing in the Oracle Database, Application Server; and development tools. Databases are not only words and numbers for accountants, but they also should utilize a full range of media to satisfy customer needs, from race car engineers, to manufacturing processes to security. The full range of audio, video and integration of media into databases is mission critical to these applications. This book details the most recent features in Oracle’s multimedia technology including those of the Oracle10gR2 Database and the Oracle9i Application Server. The technology covered includes: object relational media storage and services within the database, middle tier application development interfaces, wireless delivery mechanisms, and Java-based tools. * Gives broad coverage to integration of multimedia features such as audio and instrumentation video, from race cars to analyze performance, to voice and picture recognition for security data bases. As well as full multimedia for presentations * Includes field tested examples in enterprise environments * Provides coverage in a thorough and clear fashion developed in a London University Professional Course

SQL All-in-One For Dummies®, 2nd Edition

The soup-to-nuts guide on all things SQL! SQL, or structured query language, is the international standard language for creating and maintaining relational databases. It is the basis of all major databases in use today and is essential for the storage and retrieval of database information. This fun and friendly guide takes SQL and all its related topics and breaks it down into easily digestible pieces for you to understand. You'll get the goods on relational database design, development, and maintenance, enabling you to start working with SQL right away! Provides an overview of the SQL language and examines how it is integral for the storage and retrieval of database information Includes updates to SQL standards as well as any new features Explores SQL concepts, relational database development, SQL queries, data security, database tuning, and more Addresses the relationship between SQL and programming as well as SQL and XML If you're looking for an up-to-date sequel to the bestelling first edition of SQL All-in-One For Dummies, then this is the book for you!

Microsoft SQL Server 2008 R2 Master Data Services

Best Practices for Deploying and Managing Master Data Services (MDS) Effectively manage master data and drive better decision making across your enterprise with detailed instruction from two MDS experts. Microsoft SQL Server 2008 R2 Master Data Services Implementation & Administration shows you how to use MDS to centralize the management of key data within your organization. Find out how to build an MDS model, establish hierarchies, govern data access, and enforce business rules. Legacy system integration and security are also covered. Real-world programming examples illustrate the material presented in this comprehensive guide. Create a process-agnostic solution for managing your business domains Learn how to take advantage of the data modeling capabilities of MDS Manage hierarchies and consolidations across your organization Import data by using SQL Server Integration Services and T-SQL statements Ensure data accuracy and completeness by using business rules and versioning Employ role-based security at functional, object, and attribute levels Design export views and publish data to subscribing systems Use Web services to progrmmatically interact with your implementation

IBM System Storage b-type Multiprotocol Routing: An Introduction and Implementation

The rapid spread and adoption of production storage area networks (SANs) has fueled the need for multiprotocol routers. The routers provide improved scalability, security, and manageability by enabling devices in separate SAN fabrics to communicate without merging fabrics into a single, large SAN fabric. This capability enables clients to initially deploy separate SAN solutions at the departmental and data center levels. Then, clients can consolidate these separate solutions into large enterprise SAN solutions as their experience and requirements grow and change. Alternatively, multiprotocol routers can help to connect existing enterprise SANs for a variety of reasons. For instance, the introduction of Small Computer System Interface over IP (iSCSI) provides for the connection of low-end, low-cost hosts to enterprise SANs. The use of an Internet Protocol (IP) in the Fibre Channel (FC) environment provides for resource consolidation and disaster recovery planning over long distances. And the use of FC-FC routing services provides connectivity between two or more fabrics without having to merge them into a single SAN. This IBM® Redbooks® publication targets storage network administrators, system designers, architects, and IT professionals who sell, design, or administer SANs. It introduces you to products, concepts, and technology in the IBM System Storage™ SAN Routing portfolio, which is based on Brocade products and technology. This book shows the features of these products and examples of how you can deploy and use them.

Tivoli Integration Scenarios

This IBM® Redbooks® publication provides a broad view of how Tivoli® system management products work together in several common scenarios. You must achieve seamless integration for operations personnel to work with the solution. This integration is necessary to ensure that the product can be used easily by the users. Product integration contains multiple dimensions, such as security, navigation, data and task integrations. Within the context of the scenarios in this book, you see examples of these integrations. The scenarios implemented in this book are largely based on the input from the integration team, and several clients using IBM products. We based these scenarios on common real-life examples that IT operations often have to deal with. Of course, these scenarios are only a small subset of the possible integration scenarios that can be accomplished by the Tivoli products, but they were chosen to be representative of the integration possibilities using the Tivoli products. We discuss these implementations and benefits that are realized by these integrations, and also provide sample scenarios of how these integrations work. This book is a reference guide for IT architects and IT specialists working on integrating Tivoli products in real-life environments.

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security. Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities. Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.

Securing SQL Server

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits. Named a 2011 Systems Administration Book by InfoSec Reviews Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged

Pro SQL Azure

SQL Azure represents Microsoft's cloud-based delivery of its enterprise-caliber, SQL Server database management system (formerly under the code name "Oslo"). Pro SQL Azure introduces you to this new platform, showing you how to program and administer it in a variety of cloud computing scenarios. You'll learn to program SQL Azure from Silverlight, ASP.NET, WinForms, and from SQL Reporting Services. You'll also understand how to manage the platform by planning for scalability, troubleshooting performance issues, and implementing strong security. Shows how to use SQL Azure from Silverlight, ASP.NET, and more Covers management, scalability, and troubleshooting Addresses the all-important issue of securing your data

Legal Issues in Information Security

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!

Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. Part 1 of this book discusses fundamental security and privacy concepts. Part 2 examines recent US laws that address information security and privacy. And Part 3 considers security and privacy for organizations.

Oracle Database Administration for Microsoft SQL Server DBAs

Apply Your SQL Server DBA Skills to Oracle Database Administration Use your SQL Server experience to set up and maintain a high-performance Oracle Database environment. Written by a DBA with expertise in both platforms, Oracle Database Administration for Microsoft SQL Server DBAs illustrates each technique with clear explanations, examples, and comparison tables. Get full details on Oracle Database intervals, creation assistants, management techniques, and query tools. High availability, disaster recovery, and security procedures are also extensively covered in this comprehensive Oracle Press guide. Install and configure Oracle Database on Windows or Linux systems Administer and monitor databases from Oracle Enterprise Manager Implement robust security using roles, permissions, and privileges Back up and restore databases with Oracle Recovery Manager Use the Oracle cost-based optimizer to tune performance Write, debug, and execute PL/SQL queries using Oracle SQL Developer Maximize availability with Oracle Real Application Clusters Build standby and failover servers using Oracle Data Guard

MongoDB: The Definitive Guide

How does MongoDB help you manage a huMONGOus amount of data collected through your web application? With this authoritative introduction, you'll learn the many advantages of using document-oriented databases, and discover why MongoDB is a reliable, high-performance system that allows for almost infinite horizontal scalability. Written by engineers from 10gen, the company that develops and supports this open source database, MongoDB: The Definitive Guide provides guidance for database developers, advanced configuration for system administrators, and an overview of the concepts and use cases for other people on your project. Learn how easy it is to handle data as self-contained JSON-style documents, rather than as records in a relational database. Explore ways that document-oriented storage will work for your project Learn how MongoDB’s schema-free data model handles documents, collections, and multiple databases Execute basic write operations, and create complex queries to find data with any criteria Use indexes, aggregation tools, and other advanced query techniques Learn about monitoring, security and authentication, backup and repair, and more Set up master-slave and automatic failover replication in MongoDB Use sharding to scale MongoDB horizontally, and learn how it impacts applications Get example applications written in Java, PHP, Python, and Ruby

Microsoft® Access® 2010 Programmer's Reference

A comprehensive guide to programming for Access 2010 and 2007 Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic. Access 2010 Programmer's Reference is a comprehensive guide to the best-of-breed techniques for programming Access applications. Coverage Includes: Introduction to Microsoft Access 2010 New Features Upgrading and Converting to Access 2010 Macros in Access 2010 Using the VBA Editor VBA Basics Using VBA in Access Creating Classes in VBA Extending VBA with APIs Working with the Windows Registry Using DAO to Access Data Using ADO to Access Data Using SQL with VBA Using VBA to Enhance Forms Enhancing Reports with VBA Customizing the Ribbon Customizing the Office Backstage Working with Office 2010 Working with SharePoint Working with .NET Building Client-Server Applications with Access The Access 2010 Templates Access Runtime Deployment Database Security Access 2010 Security Features

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business. By interlacing his personal experience with cutting-edge research and unforgettable stories, John not only inspires change inside of your organization, but outlines a simple framework with which to build a Culture of Privacy. This book is a must-read for any individual with a Social Security Number and any business leader who doesn't want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach. Protect your net worth and bottom line using the 7 Mindsets of a Spy Accumulate Layers of Privacy Eliminate the Source Destroy Data Risk Lock Your Assets Evaluate the Offer Interrogate the Enemy Monitor the Signs In this revised edition, John includes an 8th Mindset, Adaptation, which serves as an additional bridge between personal protection and bulletproofing your organization. Privacy Means Profit offers a one-stop guide to protecting what's most important and most at risk-your essential business and personal data.

Information Assurance

In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance Additional focus on security and survivability issues in wireless networks

SQL Server® 2008 Administration: Real World Skills for MCITP Certification and Beyond

The ideal on-the-job reference guide for SQL Server 2008 database administrators If you manage and administer SQL Server 2008 in the real world, you need this detailed guide at your desk. From planning to disaster recovery, this practical book explores tasks and scenarios that a working SQL Server DBA faces regularly and shows you step by step how to handle them. Topics include installation and configuration, creating databases and tables, optimizing the database server, planning for high availability, and more. And, if you're preparing for MCTS or MCITP certification in SQL Server 2008 administration, this book is the perfect supplement to your preparation, featuring a CD with practice exams, flashcards, and video walkthroughs of the more difficult administrative tasks Delves into Microsoft's SQL Server 2008, a rich set of enterprise-level database services for business-critical applications Explores the skills you'll need on the job as a SQL Server 2008 administrator Shows you how to implement, maintain, and repair the SQL Server database, including bonus videos on the CD where the authors walks you through the more difficult tasks Covers database design, installation and configuration, creating databases and tables, security, backup and high availability, and more Supplements your preparation for MCTS and MCITP SQL Server 2008 certification with in-depth coverage of the skill sets required for certification, as defined by Microsoft Uses hands-on exercises and real-world scenarios to keep what you're learning grounded in the reality of the workplace Make sure you're not only prepared for certification, but also for your job as a SQL Server 2008 administrator, with this practical reference! Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.