talk-data.com talk-data.com

Event

O'Reilly Data Engineering Books

2001-10-19 – 2027-05-25 Oreilly Visit website ↗

Activities tracked

615

Collection of O'Reilly books on Data Engineering.

Filtering by: Cyber Security ×

Sessions & talks

Showing 601–615 of 615 · Newest first

Search within this event →
Managing & Using MySQL, 2nd Edition

MySQL is a popular and robust open source database product that supports key subsets of SQL on both Linux and Unix systems. MySQL is free for nonprofit use and costs a small amount for commercial use. Unlike commercial databases, MySQL is affordable and easy to use. This book includes introductions to SQL and to relational database theory. If you plan to use MySQL to build web sites or other Linux or Unix applications, this book teaches you to do that, and it will remain useful as a reference once you understand the basics. Ample tutorial material and examples are included throughout. This book has all you need to take full advantage of this powerful database management system. It takes you through the whole process from installation and configuration to programming interfaces and database administration. This second edition has a greatly enhanced administration chapter that includes information on administrative tools, server configuration, server startup and shutdown, log file management, database backup and restore, and database administration and repair. In addition, a new chapter on security describes data, server, and client-server security, while a chapter on extending MySQL provides an overview of MySQL internals and describes the use of MySQL user-defined functions. If you know C/C++, Java, Perl, PHP, or Python, you can write programs to interact with your MySQL database. In addition, you can embed queries and updates directly in an HTML file so that a web page becomes its own interface to the database. Managing and Using MySQL includes chapters on the programming language interfaces, and it also includes a complete reference section with specific function calls for each language. Also included in the reference section are references to the SQL language, and details of the MySQL system variables, programs, and utilities. New to the second edition is a reference to the internal MySQL tables, which will be of particular interest to those who want to work extensively with MySQL security.

Web Database Applications with PHP, and MySQL

What do eBay, Amazon.com and CNN.com have in common? They're all applications that integrate large databases with the Web. The popularity (and power) of these applications stems from their accessibility and usability: thousands of users can access the same data at the same time without theneed to install any additional software on their computers. Web Database Applications with PHP and MySQL offers web developers a mixture of theoretical and practical information on creating web database applications. Using PHP, and MySQL, two open source technologies that are often combined to develop web applications, the book offers detailed information on designing relational databases and on web application architecture, both of which will be useful to readers who have never dealt with these issues before. The book also introduces Hugh and Dave's Online Wines, a complete (but fictional) online retail site that allows users to browse, search a database, add items to a shopping cart, manage their membership, and purchase wines. Using this site as an example, the book shows you how to implement searching and browsing, store user data, validate user input, manage transactions, and maintain security. If you want to build small to medium-scale web database applications that can run on modest hardware and process more than a million hits a day from users, this book will show you how.

Privacy Defended: Protecting Yourself Online

Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical information. The book offers clear discussion of privacy issues as they affect everyday users of digital devices, covering all current and near-future devices and technologies that pose privacy risks to users.

Access Database Design & Programming, 3rd Edition

Access Database Design & Programming takes you behind the details of the Access interface, focusing on the general knowledge necessary for Access power users or developers to create effective database applications. When using software products with graphical interfaces, we frequently focus so much on the interface that we forget about the general concepts that allow us to understand and use the software effectively. In particular, this book focuses on three areas: Unlike other Access books that take the long, detailed approach to every topic of concern to Access programmers, Database design. The book provides an enjoyable, informative overview of database design that carefully shows you how to normalize tables to eliminate redundancy without losing data. Queries. The book examines multi-table queries (i.e.,various types of joins) and shows how to implement them indirectly by using the Access interface or directly by using Access SQL. Programming. The book examines the VBA integrated development environment (IDE). It then goes on to provide an excellent introduction to Data Access Objects (DAO), ActiveX Data Objects (ADO), and ADO Extensions for Data Definition and Security (ADOX). These sections serve as a handy introduction and primer for basic database operations,such as modifying a table under program control, dynamically adding and deleting a record, and repositioning a record pointer. The concluding chapter focuses on common programming problems, such as computing running sums and comparing two sets. Access Database Design &Programming instead focuses on the core concepts, enabling programmers to develop solid, effective database applications. This book also serves as a 'second course' in Access that provides a relatively experienced Access user who is new to programming with the frequently overlooked techniques necessary to develop successfully in the Microsoft Access environment.Anyone interested in learning Access in depth, rather than just scraping the surface, will enjoy and benefit immensely from reading this book.

Web Security, Privacy & Commerce, 2nd Edition

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Explorer and Netscape Navigator, and a wide range of current programs and products. In vast detail, the book covers: Web technology--The technological underpinnings of the modern Internet and the cryptographic foundations of e-commerce are discussed, along with SSL (the Secure Sockets Layer), the significance of the PKI (Public Key Infrastructure), and digital identification, including passwords, digital signatures, and biometrics. Web privacy and security for users--Learn the real risks to user privacy, including cookies, log files, identity theft, spam, web logs, and web bugs, and the most common risk, users' own willingness to provide e-commerce sites with personal information. Hostile mobile code in plug-ins, ActiveX controls, Java applets, and JavaScript, Flash, and Shockwave programs are also covered. Web server security--Administrators and service providers discover how to secure their systems and web services. Topics include CGI, PHP, SSL certificates, law enforcement issues, and more. Web content security--Zero in on web publishing issues for content providers, including intellectual property, copyright and trademark issues, P3P and privacy policies, digital payments, client-side digital signatures, code signing, pornography filtering and PICS, and other controls on web content. Nearly double the size of the first edition, this completely updated volume is destined to be the definitive reference on Web security risks and the techniques and technologies you can use to protect your privacy, your organization, your system, and your network.

AIX Fast Connect for AIX Version 3.1 Guide

Fast Connect for AIX, announced with AIX 4.3.2, was IBM's first step to let PCs take advantage of the performance, scalability, and reliability of AIX. The new version 3.1 adds powerful new features, such as user name mapping and remote password change. This IBM Redbooks publication walks you through the installation and the setup of Fast Connect on your server. It shows how to customize this product by declaring file shares, and print shares. Because security and ease of administration of the password databases on the network are two important tasks for the system administrator, this book describes which security models are available and how to set up your PC clients to communicate with the Fast Connect for AIX server. For its in depth coverage of the Fast Connect for AIX product, this book is a must-read for I/T specialists who have to recommend a solution for AIX and PC interoperability, as well as system administrators who have to implement such a solution.

DB2® Universal Database for OS/390® Version 7.1 Certification Guide

IBM's definitive, authoritative DB2 for OS/390 and z/OS reference and self-study guide! The only comprehensive IBM(r) DB2 UDB V7.1 for OS/390 certification prep guide Covers administration, security, SQL, application development, tuning, and much more Contains dozens of expert DB2 tips, techniques and guidelines CD-ROM contains complete DB2 for OS/390 sample exam Written by IBM Gold Consultants for DB2 and S/390 The total resource for every professional running DB2 UDB V7.1 in OS/390 and z/OS environments Database administration, security, monitoring, tuning, SQL, and application development Sample test questions help you prepare for IBM's new DB2 UDB V7.1 for OS/390 exams The CD-ROM included with this book contains a complete IBM DB2 for OS/390 certification sample exam. IBM's DB2 Universal Database Version 7.1 for OS/390 delivers unparalleled performance, scalability, and reliability in today's enterprise e-business environments! Now, there's a complete, authoritative guide to deploying, managing, and developing applications with DB2 UDB V7.1 in both OS/390 and z/OS environments—and preparing for IBM's updated DB2 UDB V7.1 for OS/390 certification exam! Direct from IBM, this comprehensive day-to-day reference for running DB2 UDB in OS/390 and z/OS environments is also the only book with the in-depth knowledge professionals need in order to pass IBM's latest DB2 for OS/390DBA certification exam. Full of expert tips, techniques, and guidelines, it covers virtually every aspect of working with DB2 UDB in enterprise server: administration, connectivity, development, and much more. IBM Gold Consultants Richard Yevich and Susan Lawson present start-to-finish coverage of DB2's latest and most powerful enhancements, tools, and utilities, showing how to make the most of DB2 running on both OS/390 and next-generation z/OS platforms. Coverage includes: An overview of the DB2 UDB product family DB2 in OS/390 and z/OS environments: address spaces, attachments, interfaces, commands, and utilities Comprehensive security coverage, including access controls and auditing techniques SQL in depth: DB2 data structures, database objects, basic database design, and advanced coding DB2 UDB administration: maintaining data, backup/recovery, and more Performance monitoring and optimization: access paths, indexes, parallelism, buffer pool tuning, and subsystem tuning Data sharing: architecture and implementation in a Parallel Sysplex environment Detailed application development coverage: database extenders, cursors, stored procedures, triggers, object-relational extensions, locking, and concurrency Whether you're deploying DB2 UDB V7.1 in an OS/390 environment, managing DB2 UDB V7.1, preparing for DB2 UDB V7.1 certification, or all three, DB2 Universal Database Version 7.1 for OS/390 Certification Guide will be your single most valuable resource.

Oracle Essentials: Oracle9i, Oracle8i and Oracle8, Second Edition

The second edition of O'Reilly's bestselling Oracle Essentials has been updated to include the latest Oracle release, Oracle9 i. Oracle Essentials distills an enormous amount of information about Oracle's myriad technologies and releases into a compact, easy-to-read volume filled with focused text, illustrations, and helpful hints. Oracle9 i promises to be an even more significant upgrade than Oracle8 i, offering such major features as Real Application Clusters, flashback queries, Oracle personalization, clickstream intelligence, and Oracle Database Cache and Web Cache; it also promises significant improvements in Oracle's business intelligence, XML integration, high availability, and management capabilities. The book includes overviews of these features, as well as the new Oracle9 I Application Server (Oracle9 iAS) and Oracle9 i Portal. The book contains chapters on: Oracle products, options, and overall architecture for Oracle9 i and other recent releases Installing and running Oracle: creating databases, configuring Net8 (known as Oracle Net in Oracle9 i), starting up and shutting down Oracle Oracle data structures, datatypes, and ways of extending datatypes Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle networking, monitoring, and tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Oracle9 i, Oracle8 i, and the Web, including the latest Java, web, and XML technologies, interMedia, Oracle9 i Application Server, and Oracle9 i Portal For new Oracle users, DBAs, developers, and managers, Oracle Essentials is an all-in-one introduction to the full range of Oracle features and technologies, including the just-released Oracle9 i features. But even if you already have a library full of Oracle documentation, this compact book is the one you'll turn to, again and again, as your one-stop, truly essential reference.

Database Nation

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours. Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril. Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before? Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

NFS Illustrated

The Network File System (NFS) protocol that enables remote access to files is now a key element of any LAN. It is also currently and increasingly used as a key technology with the Web and wide area networks. Written for programmers creating NFS-based applications, network engineers creating new implementations of NFS, and network managers, NFS Illustrated promotes a thorough understanding of that protocol through extensive diagrams and real protocol traces that show NFS in action. Covering NFS versions 2 and 3, the book also looks into WebNFS and the new NFS version 4, with Internet support. Detailed and authoritative, the book not only examines NFS in depth, but also describes the protocols that underlie and support it, including External Data Representation (XDR), Remote Procedure Call (RPC), the NFS MOUNT protocol, and the NFS Lock Manager protocol. It discusses several NFS variants and compares NFS to a number of alternative file systems. You will find a detailed discussion on the NFS filesystem model and a procedure-by-procedure description of NFS versions 2 and 3, illustrated through the use of snoop traces that capture and display protocol packets from the network. In addition, the book addresses real-world implementation issues faced by those building an NFS client or server, factors that affect NFS performance, and critical performance benchmarks. Specific topics of interest include: NFS version 4, highlighting performance improvements, security features, and cross-platform interoperability for Internet operation RPC authentication and security Differences between NFS versions 2 and 3 Implementation issues for clients and servers Read-ahead and write-behind Caching policies The Lock Manager protocol Automounting NFS variants, including Spritely NFS, NQNFS, Trusted NFS, and NASD NFS NFS competitors: RFS, AFS, DCE/DFS, and CIFS The PCNFS protocol for implementing NFS on PC operating systems SPEC SFS benchmarks, WebNFS, and firewalls Comprehensive and current, NFS Illustrated is an essential resource for network professionals who want to use this widespread and evolving technology to its fullest.

Access Database Design and Programming, Second Edition

When using software products with graphical interfaces, we frequently focus so much on the details of how to use the interface that we forget about the more general concepts that allow us to understand and put the software to effective use. This is particularly true of a powerful database product like Microsoft Access. Novice, and sometimes even experienced, programmers are so concerned with how something is done in Access that they often lose sight of the general principles that underlie their database applications. Access Database Design & Programming, 2nd Edition, an update to the bestselling first edition, features: A discussion of Access' new VBA Integrated Development Environment, which, for the first time, is the one used by Word, Excel, and PowerPoint An expansion of the discussion of the VBA language itself, in response to reader requests A discussion of Microsoft's latest data access technology, called Active Data Objects (or ADO), along with a discussion of Open Database Connectivity(ODBC), which is intimately connected with ADO Unlike other Access books that take the long, detailed approach to every topic of concern to Access programmers, this book focuses instead on the core concepts, enabling programmers to develop solid, effective database applications. As a result, important topics such as designing forms and reports, database security, database replication, and programming for multiuser applications are simply not discussed. This book is a kind of "second course" in Access that provides a relatively experienced Access user who is new to programming with the frequently overlooked techniques necessary to successfully develop in the Microsoft Access environment. Anyone interested in learning Access in-depth, rather than just scraping the surface, will enjoy and immensely benefit from reading this book. Although this book is really an introduction directed to intermediate Microsoft Access users who are novice programmers, it should appeal to all levels of Access developers. For novice programmers, it focuses on a key body of knowledge that is typically neglected, but is nevertheless essential for developing effective database applications. For intermediate and advanced developers, its treatment of database design and queries provides a handy treatment that otherwise has to be gleaned from relatively uninteresting textbooks, while its programming chapters constitute a handy reference to some basic operations that can be performed using DAO or the Access object model.

Oracle Database Administration: The Essential Refe

Visit the catalog page for Oracle Database Administration: The Essential RefeVisit the errata page for Oracle Database Administration: The Essential RefeDownload the supplemental electronic content for Oracle Database Administration: The Essential Refe Oracle database administration requires a vast amount of information and an ability to perform a myriad of tasks--from installation to tuning to network troubleshooting to overall daily administration. Oracle provides many tools for performing these tasks; the trick is knowing what tool is right for the job, what commands you need to issue (and when), and what parameters and privileges you need to set. And, as every DBA knows, you need to know how do all this under pressure, while you face crisis after crisis. This book provides a concise reference to the enormous store of information an Oracle DBA needs every day (as well as what's needed only when disaster strikes). It's crammed full of quick-reference tables, task lists, and other summary material that both novice and expert DBAs will use time and time again. It covers the commands and operations new to Oracle8, but also provides Oracle7 information for sites still running earlier versions. Oracle Database Administration provides two types of material: DBA tasks--chapters summarizing how to perform critical DBA functions: installation, performance tuning, preventing data loss, networking, security and monitoring, auditing, query optimization, and the use of various Oracle tools and utilities DBA reference--chapters providing a quick reference to the Oracle instance and database, the initialization (INIT.ORA) parameters, the SQL statements commonly used by DBAs, the data dictionary tables, the system privileges and roles, and the SQLPlus, Export, Import, and SQLLoader syntax The book also includes a resource summary with references to additional books, Web sites, and other online and offline resources of special use to Oracle DBAs. Oracle Database Administration is the single essential reference you'll turn to again and again. If you must choose only one book to use at the office, keep at home, or carry to a site you're troubleshooting, this will be that book.

Oracle Distributed Systems

Any organization that uses the Oracle relational database management system (RDBMS) these days needs to use multiple databases. There are many reasons to use more than a single database in a distributed database system: Different databases may be associated with particular business functions, such as manufacturing or human resources. Databases may be aligned with geographical boundaries, such as a behemoth database at a headquarters site and smaller databases at regional offices. Two different databases may be required to access the same data in different ways, such as an order entry database whose transactions are aggregated and analyzed in a data warehouse. A busy Internet commerce site may create multiple copies of the same database to attain horizontal scalability. A copy of a production database may be created to serve as a development test bed. Tunability Platform autonomy Fault tolerance Scalability Location transparency Site autonomy Introduction to Distributed Database Systems SQLNet and Net8 Configuration and Administration Distributed Database Security Designing the Distributed System Oracle's Distributed System Implementation Sample Configurations 8. Engineering Considerations Oracle Replication Architecture Advanced Replication Option Installation Basic Replication Multi-Master Replication Updateable Snapshots Procedural Replication Conflict Avoidance and Resolution Techniques In a distributed database environment, data in two or more databases is accessible as if it were in a single database. Usually, the different databases are on different servers, which may be located at the same site or a continent away. Communication between the servers takes place via SQLNet (for Oracle7) or Net8 (for Oracle8). Distributed database environments offer a number of benefits over single- database systems, including: This book describes how you can use multiple databases and the distributed features of Oracle to best advantage. It covers: Table of contents: Part I: The Distributed System Part II: Replication Part III: Appendixes Appendix A: Built-in Packages for Distributed Systems Appendix B: Scripts

Data Warehousing: Architecture and Implementation

8090B-0 A start-to-finish process for deploying successful data warehouses. This book delivers what every data warehousing project participant needs most: a thorough overview of today's best solutions, and a reliable step-by-step process for building warehouses that meet their objectives. It answers the key questions asked by everyone involved in a data warehouse initiative: project sponsors, developers, managers, and CIOs. And, with over 75 figures, it doesn't just tell you how to get the job done: it shows you. Migration strategies and scenarios Management and support: issue resolution, capacity planning, security, backup, and more Specific answers for project sponsors, managers, and CIOs 12 steps for implementation Best techniques for schema design and metadata Choosing the right hardware, software, and platforms Evolving as new technologies mature Rely on this book's up-to-date listings of vendors and Web resources. Learn to evolve your data warehouse as new technologies mature-including metadata interchange standards, Web solutions, and Windows …Ø NT. Whatever your goals, Data Warehousing for IT Professionals will help you achieve them faster and at lower cost.

Oracle Security

Security in a relational database management system is complex, and too few DBAs, system administrators, managers, and developers understand how Oracle implements system and database security. This book gives you the guidance you need to protect your databases. Oracle security has many facets: Establishing an organization's security policy and plan Protecting system files and passwords Controlling access to database objects (tables, views, rows, columns, etc.) Building appropriate user profiles, roles, and privileges Monitoring system access via audit trails Oracle and Security Oracle System Files Oracle Database Objects The Oracle Data Dictionary Default Roles and User Accounts Profiles, Passwords, and Synonyms Developing a Database Security Plan Installing and Starting Oracle Developing a Simple Security Application Developing an Audit Plan Developing a Sample Audit Application Backing Up and Recovering a Database Using the Oracle Enterprise Manager Maintaining User Accounts Using the Oracle Security Server Using the Internet and the Web Using Extra-Cost Options Oracle Security describes how these basic database security features are implemented and provides many practical strategies for securing Oracle systems and databases. It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies. A table of contents follows: Preface Part I: Security in an Oracle System Part II: Implementing Security Part III: Enhanced Oracle Security Appendix A. References