talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

SQL Server 2008 Administration in Action

SQL Server 2008 Administration in Action offers over 100 DBA-tested, high-value, best practices that will help you tame the beast and keep it under control. Unlike the many comprehensive SQL Server reference tomes out there that attempt to cover the whole SQL Server feature set, this book drills down on the techniques, procedures, and practices that help you keep your database running like clockwork. About the Technology The integrity and security of your database is crucial to your business. SQL Server 2008 is a massive and mature product with a very large feature set. As a SQL Server administrator, you must be equipped to handle myriad day-to-day tasks to keep your database healthy, and you must also be prepared to act quickly when something unexpected happens. About the Book SQL Server 2008 Administration in Action focuses the production DBA, digging deep into the various tasks specific to that role. Expert author Rod Colledge — check him out at sqlCrunch.com — teaches you best practices that cover the lifecycle of a SQL Server system, including infrastructure design, installation, and operational maintenance. And while many of these techniques will work in any recent version of SQL Server, you'll find full coverage of emerging SQL Server 2008 best practices. Each technique is presented in a task-driven style, and in the order of the typical life cycle of a SQL Server system. This allows you to easily open the book at the appropriate page and focus on what you need to know for each specific situation. What's Inside Selecting and configuring server components Distributing I/O load over multiple controllers Selecting the appropriate stripe size Configuring storage cache Preparing for SQL Server clustering Configure the private network for cluster use only Configure the cluster network priority Prepare resources for a clustered SQL Server installation Index selection and maintenance Identify and drop unused indexes Identify and create missing indexes Select the appropriate clustered index Database mirroring Prepare the mirror server for failover Select the appropriate failover mode Consider disabling log stream compression for CPU bottlenecked systems Upgrading SQL Server Reduce downtime with T-Log backup/restore and the side-by-side upgrade method Prior to an upgrade, run DBCC checks and take full backups with verification Ensure read only is not enabled prior to the upgrade About the Reader This book is a DBA's best friend. It covers the most important and often overlooked areas that you need to maintain to keep your databases secure, in-tune, and well-protected in the event of disaster. About the Author Rod Colledge is an independent SQL Server consultant based in Brisbane, Australia. Since 1996, Rod has specialized in the development and administration of SQL Server database systems. His recent work has included the design and implementation of custom transactional replication and log shipping solutions, performance tuning large, high-volume databases, and developing procedures for operational maintenance of large database systems. In September 2007, Rod founded sqlCrunch.com, a website specializing in summarizing and categorizing links to SQL Server white papers and best practices. Quotes Simply loaded with excellent and immediately useful information. - Kevin Kline, Quest Software I thought I knew SQL Server until I read this book. - Tariq Ahmed, Coauthor of Flex 4 in Action A refreshing database administration book. - Michael Redman, Microsoft Required for any MS DBA. - Andrew Siemer, OTX Research It delivered way beyond my expectations...Packed with useful enterprise-level knowledge. - Darren Neimke, Author of ASP.NET 2.0 Web Parts in Action

Developing Web Applications with Perl, memcached, MySQL® and Apache

The only book to address using cache to enhance and speed up Web application development Developers use Apache, MySQL, memcached, and Perl to build dynamic Web sites that store information within the MySQL database; this is the only book to address using these technologies together to alleviate the database load in Web development Covers each of the four systems and shows how to install, set up, and administer them; then shows the reader how to put the parts together to start building applications Explains the benefits of a base perl library for code re-use, and provides sample applications that demonstrate in a practical way the information covered in the previous chapters Examines monitoring, performance, and security, with a problem-solving chapter that walks the reader through solving real-world issues

Mule in Action

Mule in Action covers Mule fundamentals and best practices. It is a comprehensive tutorial that starts with a quick ESB overview and then gets Mule to work. It dives into core concepts like sending, receiving, routing, and transforming data. Next, it gives you a close look at Mule's standard components and how to roll out custom ones. You'll pick up techniques for testing, performance tuning, BPM orchestration, and even a touch of Groovy scripting. About the Technology Mule is a widely used open source enterprise service bus. It is standards based, provides easy integration with Spring and JBoss, and fully supports the enterprise messaging patterns collected by Hohpe and Woolf. You can readily customize Mule without writing a lot of new code. About the Book Mule in Action covers Mule fundamentals and best practices. It is a comprehensive tutorial that starts with a quick ESB overview and then gets Mule to work. It dives into core concepts like sending, receiving, routing, and transforming data. Next, it gives you a close look at Mule's standard components and how to roll out custom ones. You'll pick up techniques for testing, performance tuning, BPM orchestration, and even a touch of Groovy scripting. What's Inside Mule deployment, logging, and monitoring Common transports, routers, and transformers Security, routing, orchestration, and transactions About the Reader Written for developers, architects, and IT managers, the book requires familiarity with Java but no previous exposure to Mule or other ESBs. About the Authors Both authors are Java EE architects. David Dossot is the project "despot" of the JCR Transport and has worked with Mule since 2005. John D'Emic is Chief Integration Architect at OpSource Inc., where he has used Mule since 2006. Quotes A deep, anatomical view of Mule ESB. - Ara Abrahamian, Arachitect, Coauthor of Java Open Source Programming A top-to-bottom example-driven guide I haven't found anywhere else. - Ben Hall, Technical Lead, IBBS Outstanding examples show how to use Mule. - Doug Warren, Software Architect, Java Web Services These guys know what they are talking about! - Fabrice Dewasmes, Java & Open Source Department Director, Pragma Consult Works better than a carrot to get the Mule going. Useful even for experts. - Jeroen Benckhuijsen, Software Architect, Atos Origin

SQL Injection Attacks and Defense, 2nd Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Attacks and Defense, Second Edition is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack. SQL Injection Attacks and Defense, Second Edition includes all the currently known information about these attacks and significant insight from its team of SQL injection experts, who tell you about: Understanding SQL Injection – Understand what it is and how it works Find, confirm and automate SQL injection discovery Tips and tricks for finding SQL injection within code Create exploits for using SQL injection Design apps to avoid the dangers these attacks SQL injection on different databases SQL injection on different technologies SQL injection testing techniques Case Studies Securing SQL Server, Second Edition is the only book to provide a complete understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures Covers unique, publicly unavailable information, by technical experts in such areas as Oracle, Microsoft SQL Server, and MySQL---including new developments for Microsoft SQL Server 2012 (Denali) Written by an established expert, author, and speaker in the field, with contributions from a team of equally renowned creators of SQL injection tools, applications, and educational materials

Databases A Beginner's Guide

Essential Database Skills--Made Easy! Learn standard database design and management techniques applicable to any type of database. Featuring clear examples using both Microsoft Access and Oracle, Databases: A Beginner's Guide begins by showing you how to use Structured Query Language (SQL) to create and access database objects. Then, you'll discover how to implement logical design using normalization, transform the logical design into a physical database, and handle data and process modeling. You'll also get details on database security, online analytical processing (OLAP), connecting databases to applications, and integrating XML and object content into databases. Designed for Easy Learning Key Skills & Concepts--Chapter-opening lists of specific skills covered in the chapter Ask the Expert--Q&A sections filled with bonus information and helpful tips Try This--Hands-on exercises that show you how to apply your skills Notes--Extra information related to the topic being covered Self Tests--Chapter-ending quizzes to test your knowledge

MySQL® Administrator's Bible

With special focus on the next major release of MySQL, this resource provides a solid framework for anyone new to MySQL or transitioning from another database platform, as well as experience MySQL administrators. The high-profile author duo provides essential coverage of the fundamentals of MySQL database management—including MySQL’s unique approach to basic database features and functions—as well as coverage of SQL queries, data and index types, stores procedure and functions, triggers and views, and transactions. They also present comprehensive coverage of such topics as MySQL server tuning, managing storage engines, caching, backup and recovery, managing users, index tuning, database and performance monitoring, security, and more.

SQL Injection Attacks and Defense

Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts. What is SQL injection?-Understand what it is and how it works Find, confirm, and automate SQL injection discovery Discover tips and tricks for finding SQL injection within the code Create exploits using SQL injection Design to avoid the dangers of these attacks

Beginning, Microsoft® SQL Server® 2008 Administration

SQL Server 2008 introduces many new features that will change database administration procedures; many DBAs will be forced to migrate to SQL Server 2008. This book teaches you how to develop the skills required to successfully administer a SQL Server 2008 database; no prior experience is required. The material covers system installation and configuration/architecting, implementing and monitoring security controls, configuring and managing network communications, automating administration tasks, disaster prevention and recovery, performance monitoring, optimizing and ensuring high availability, as well as major SQL Server 2008 components including Integration Services, Reporting Services, Analysis Services, and Service Broker.

Microsoft® SQL Server® 2008 MDX Step by Step

Teach yourself the Multidimensional Expressions (MDX) query language—one step at a time. With this practical, learn-by-doing tutorial, you’ll build the core techniques for using MDX with Analysis Services to deliver high-performance business intelligence solutions. Discover how to: Construct and execute MDX queries Work with tuples, sets, and expressions Build complex sets to retrieve the exact data users need Perform aggregation functions and navigate data hierarchies Assemble time-based business metrics Customize an Analysis Services cube through the MDX script Implement dynamic security to control data access Develop MDX-driven reports in SQL Server Reporting Services CD features: Practice exercises Database and code samples Fully searchable eBook

Data Leaks For Dummies®

Data leaks expose your customers to identity theft and your business to security risks. But how do you set up a data loss prevention plan? Start with Data Leaks For Dummies! Now more than ever, it’s critical to keep your company data locked up tighter than Fort Knox. Data Leaks For Dummies has the scoop on what’s at risk, how leaks happen, how to keep your data safe without being inflexible, and even what to do if the worst happens. It shows you how to: Identify risk by learning to see your data the way a criminal would Recognize how innocent mistakes, common carelessness, and malicious insiders also pose a threat Learn how to defend against phishing, e-mail threats, and wireless security breaches Be alert for social engineering attacks, suspicious contract workers, dumpster divers, and plain old eavesdroppers Plan for safe disposal of old hardware, use caution with SMS and e-mail archives, and be aware of how Webcasts and conference calls can be invaded Discover how crooks steal data in public places such as Internet cafes Develop a recovery plan, build a team, and even manage press coverage should data loss occur You’ll learn why free data storage devices could cost you a lot, how to protect mobile devices, why data corruption might be even worse than data loss, and how you can help software developers build safer applications. Data Leaks For Dummies will help you protect your customers, the reputation of your business, and your bottom line.

Mastering SQL Server® 2008

As Microsoft's bestselling database manager, SQL Server is highly flexible and customizable, and has excellent support—the 2008 version offers several significant new capabilities. This book offers accurate and expert coverage on the updates to SQL Server 2008 such as its enhanced security; the ability to encrypt an entire database, data files, and log files without the need for application changes; a scalable infrastructure that can manage reports and analysis of any size and complexity; and its extensive performance data collection.

PHP6 and MySQL® 6 Bible

MySQL is the leading open source database on the market and PHP continues to dominate the server side of the scripting market—together, they are the most popular and common team for creating dynamic, database-driven web sites. This comprehensive book covers the newest version of PHP and MySQL and is packed with extensive code examples, full working applications, and valuable troubleshooting advice. You’ll explore installing, developing, and debugging the latest versions of PHP and MySQL and get insight on advanced topics such as error handling, debugging, PEAR, security, HTTP, cookies, and OOP.

Microsoft® SQL Server 2008 Management and Administration

If you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based reference you’ve been searching for. Authored by a world-class expert on SQL Server in the enterprise, this book goes far beyond the basics, taking on the complex tasks that DBAs need to make the most of Microsoft’s flagship database platform. SQL Server MVP, Ross Mistry presents proven techniques for SQL Server 2008 installation, upgrades, backup/restore, data transfer, indexing, high availability, security, and much more. He draws on extensive testing in high-profile production environments to offer step-by-step solutions and powerful tips you won’t find anywhere else. Every chapter begins with a section identifying SQL Server 2008’s most significant new improvements, and concludes with a convenient summary of best practices. Each chapter also outlines the benefits of leveraging Windows Server 2008. Understand how to: Master DBA tips, tricks, and best practices proven in actual enterprise environments Install, upgrade or transition to SQL Server 2008. Harden and Secure an implementation. Encrypt SQL Server from an end-to-end perspective. Implement high availability–and leverage SQL Server 2008’s major improvements to failover clustering and database mirroring Save time with SQL Server 2008’s new policy-based management tools Performance tune and troubleshoot a SQL Server 2008 environment. Optimize application performance and manage workloads with the powerful new Resource Governor Implement Performance Studio, maintenance plans, Transparent Data Encryption and much more… Bonus Content: The book is based on Windows Server 2008 Step by step instructions of how to implement a failover cluster on Windows Server 2008 SQL Server PoweShell Administration Tasks Consolidate and virtualize SQL Server with Hyper-V Step by step instructions on how to install Hyper-V Proactively Monitor SQL Server with Operations Manager Install Windows Server 2008 certificates to encrypt SQL Server data Contributing Writers include: Hilary Cotter — SQL Server MVP John Welch — SQL Server MVP Marco Shaw — PowerShell MVP Maciej Pilecki — SQL Server MVP Shirmattie Seenarine — Technical Writer

Beginning Oracle® Application Express

Oracle Application Express is an easy-to-use application development environment built on the Oracle technology stack. There are two aspects of that previous sentence that you may find jarring—that Oracle, a company widely known for its database technology, has an application development environment, and that Oracle, a company thought of as delivering high-end, enterprise-ready technology, has anything that is easy to use. But, as this book will show, the introductory statement is completely accurate. Oracle Application Express, commonly known as Oracle APEX or simply APEX, does benefit from the long-established enterprise-class robustness that is the hallmark of Oracle technology. The applications you build will be able to support hundreds of users and many terabytes of data, scalability far beyond even the imagination of most other development environments. And Oracle APEX, with its declarative, wizard-driven methodology, is truly easy to use. In the course of the few hundred pages of this book, you will not only learn about how to use APEX, you will create a usable order entry system. The fast learning curve presented in these pages is a consequence of many years of development and refinement of the APEX product, which began life almost a decade ago within Oracle. By the end of this volume, you will know enough to create your own applications, as well as having the knowledge and understanding of Oracle APEX and the world of Oracle technology to explore further refinements on your own. Best of all, you can use APEX with absolutely no cost—either in a hosted environment, as suggested in Chapter 1, or with a free version of the Oracle database. Welcome to the world of Oracle Application Express! This book is aimed at a particular group of users—those who are not familiar with Oracle Application Express. The book assumes that you have a basic knowledge of application development, the type you could get from playing around with a personal database such as Access. In fact, this book was written with an Access developer in mind—an Access developer looking to step up to a more scalable and reliable environment, with reduced maintenance overhead and greater integration between application systems. This book covers the use of Oracle Application Express. Although the book is based on the 3.5 version, you can use the book with older versions as well. However, since the book will use a hosted version of Oracle Application Express, and since both the Oracle database that support the product and the product itself are available as free downloads from http://otn.oracle.com, you should be able to use the latest version easily. This book is structured to give the reader a gradual introduction to the essentials of development with Oracle Application Express. The book contains the following: Welcome to Oracle!—This contains an overview of Oracle Application Express, as well as instructions on how to set up a hosted development environment for performing the exercises used in the book. Jumpstart Oracle Application Express—You will leap into creating applications with Oracle Application Express and finish a simple application by the end of this. Extending Your Oracle APEX Application—This will introduce you to the options in Oracle APEX that let you ensure that your users will enter correct data while using your application. Validation, Calculation, Navigation, and Lists—This continues the exploration of the aspects of APEX that help you to ensure that data used in your application is correct. Additionally, this covers basic navigation options for your application. Reporting and Charting—This covers the powerful and flexible reports you can create with Oracle APEX, and introduces you to the graphical capabilities of APEX reporting. Components Working Together—This extends your work with charts, showing how you can create charts that link to a more detailed view of the data they represent. You will also learn how to create a calendar page with links to the data shown as part of the calendar, and how to add images taken from the underlying database to an Oracle APEX report. Customizing User Interfaces—This explores advanced options for customizing user interfaces, on individual pages as well as across your entire APEX application. PL/SQL—This introduces you to PL/SQL, the underlying language used to implement your APEX application, and demonstrates how to use the power of PL/SQL to extend the logic in your application. Security—This covers how security is implemented for your APEX environment. Deployment and Administration—This covers the options you have for deploying an APEX application to another environment and walks you through one of those options. Additionally, this introduces you to the administrative functionality you can use to monitor and manage your APEX applications. Packaged Applications—This gives an overview of packaged applications available for Oracle Application Express, with a more detailed look at a select few. Migration—This describes how to migrate applications from Microsoft Access to Oracle Application Express.

SQL Server Forensic Analysis

“What Kevvie Fowler has done here is truly amazing: He has defined, established, and documented SQL server forensic methods and techniques, exposing readers to an entirely new area of forensics along the way. This fantastic book is a much needed and incredible contribution to the incident response and forensic communities.” —Curtis W. Rose, founder of Curtis W. Rose and Associates and coauthor of Real Digital Forensics The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly–a disclosure that is painful for companies and customers alike. There is only one way to avoid this problem: Master the specific skills needed to fully investigate SQL Server intrusions. In author Kevvie Fowler shows how to collect and preserve database artifacts safely and non-disruptively; analyze them to confirm or rule out database intrusions; and retrace the actions of an intruder within a database server. A chapter-length case study reinforces Fowler’s techniques as he guides you through a real-world investigation from start to finish. SQL Server Forensic Analysis, The techniques described in can be used both to identify unauthorized data access and modifications and to gather the information needed to recover from an intrusion by restoring the pre-incident database state. SQL Server Forensic Analysis Coverage includes Determining whether data was actually compromised during a database intrusion and, if so, which data Real-world forensic techniques that can be applied on all SQL Server instances, including those with default logging Identifying, extracting, and analyzing database evidence from both published and unpublished areas of SQL Server Building a complete SQL Server incident response toolkit Detecting and circumventing SQL Server rootkits Identifying and recovering previously deleted database data using native SQL Server commands is the first book of its kind to focus on the unique area of SQL Server incident response and forensics. Whether you’re a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, auditor, or database professional, you’ll find this book an indispensable resource. SQL Server Forensic Analysis

Microsoft® SQL Server™ 2008 Analysis Services Unleashed

As the foundation of the Microsoft Business Intelligence Strategy, Microsoft SQL Server 2008 Analysis Services provides users with faster access to data and even more tools for managing and analyzing data across multidimensional objects (databases, dimensions, cubes). Microsoft SQL Server 2008 Analysis Services Unleashed is the ultimate guide for anyone who is planning to use the latest version of Analysis Services. It gives readers insight into the way Analysis Services functions, and explains practical methods for designing and creating multidimensional objects. It also provides valuable insight into the reasons behind the design decisions taken by the product development team. The authors have been involved with Analysis Services from its earliest days. They have documented in detail the internal features of Analysis Services 2008, explaining server architecture, main data structures, data processing, and query resolution algorithms. Discover the new functionality introduced in Analysis Services 2008 including MDX enhancements and new DMV (dynamic memory views) Work with the Business Intelligence Development Studio, the new Dimension Editor, and Aggregation Designer interfaces Enjoy complete coverage of new Shared Scalable Databases scale-out infrastructure Learn the key concepts of multidimensional modeling Explore the multidimensional object model and its definition language Integrate multidimensional and relational databases Build client applications to access data in Analysis Services Unravel the inner workings of the server architecture, including main data structures, data processing, and query resolution algorithms Learn the main concepts of the MDX language and gain an in-depth understanding of advanced MDX concepts Gain a deeper understanding of the internal and external protocols for data transfer, including the XML/A protocol Discover how Analysis Services manages memory Explore the security model, including role-based security, code-access security, and data security Category: Microsoft SQL Server Covers: Microsoft SQL Server 2008 Analysis Services User Level: Intermediate-Advanced $59.99 USA / $65.99 CAN / £38.99 Net UK±

Deployment Guide Series: IBM Tivoli Identity Manager 5.0

Deploying an identity management solution for a medium size business begins with a thorough analysis of the existing business and IT environment. After we fully understand the organization, their deployed infrastructure, and the application framework, we can define an applicable representation of these assets within an identity management implementation. This IBM® Redbooks® publication, intended for IBM Business Partners, takes a step-by-step approach to implementing an identity management solution based on IBM Tivoli® Identity Manager. Part 1 discusses the general business context and the planning approach for an identity management solution. Part 2 takes you through an example company profile with existing business policies and guidelines and builds an identity management solution design for this particular environment. We describe how the components can be integrated into the existing environment. Then, we focus on the detailed configuration of identity management integration tasks that must be implemented in order to create a fully functional end-to-end solution. This IBM Redbooks publication does not introduce any general identity management concepts, nor does it systematically explain all of Tivoli Identity Manager's components and capabilities; instead, those details are thoroughly discussed in the IBM Redbooks publications: Identity Management Design Guide with IBM Tivoli Identity Manager, SG24-6996, and Enterprise Security Architecture Using IBM Tivoli Security Solutions, SG24-6014.

SAP Security Configuration and Deployment

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise. This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations. Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security. The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP

Beginning Database Design Solutions

This book is intended for IT professionals and students who want to learn how to design, analyze, and understand databases. The material will benefit those who want a better high-level understanding of databases such as proposal managers, architects, project managers, and even customers. The material will also benefit those who will actually design, build, and work with databases such as database designers, database administrators, and programmers. In many projects, these roles overlap so the same person may be responsible for working on the proposal, managing part of the project, and designing and creating the database. This book is aimed at IT professionals and students of all experience levels. It does not assume that you have any previous experience with databases or programs that use them. It doesn't even assume that you have experience with computers. All you really need is a willingness and desire to learn. This book explains database design. It tells how to plan a database's structure so the database will be robust, resistant to errors, and flexible enough to accommodate a reasonable amount of future change. It explains how to discover database requirements, build data models to study data needs, and refine those models to improve the database's effectiveness. The book solidifies these concepts by working through a detailed example that designs a realistic database. Later chapters explain how to actually build databases using two common database products: Access 2007 and MySQL. The book finishes by describing some of the topics you need to understand to keep a database running effectively such as database maintenance and security. This book explains database design. It tells how to determine what should go in a database and how the database should be structured to give the best results. This book does not focus on actually creating the database. The details of database construction are different for different database tools so, to remain as generally as useful as possible, this book doesn't concentrate on any particular database system. You can apply the techniques described here equally to whatever database tool you use whether it's Access, SQL Server, Oracle, MySQL, or some other database product. Most database products include free editions that you can use for smaller projects. For example, SQL Server Express Edition, Oracle Express Edition, and MySQL Community Server are all free. To remain database neutral, the book does not assume you are using a particular database so you don't need any particular software or hardware. To work through the Exercises, all you really need is a pencil and some paper. You are welcome to type solutions into your computer if you like but you may actually find working with pencil and paper easier than using a graphical design tool to draw pictures, at least until you are comfortable with database design and are ready to pick a computerized design tool. "Goals of Effective Database Design," explains the reasons why people and organizations use databases. It explains a database's purpose and conditions that it must satisfy to be useful. This also describes the basic ACID (Atomicity, Consistency, Isolation, Durability) and CRUD (Create, Read, Update, Delete) features that any good database should have. It explains in high-level general terms what makes a good database and what makes a bad database. "Database Types," explains some of the different types of databases that you might decide to use. These include flat files, spreadsheets, hierarchical databases (XML), object databases, and relational databases. The relational database is one of the most powerful and most commonly used forms of database so it is the focus of this book, but it is important to realize that there are alternatives that may be more appropriate under certain circumstances. This gives some tips on deciding which kind of database might be best for a particular project. "Relational Database Fundamentals," explains basic relational database concepts such as tables, rows, and columns. It explains the common usage of relational database terms in addition to the more technical terms that are sometimes used by database theorists. It describes different kinds of constraints that databases use to guarantee that the data is stored safely and consistently. "Understanding User Needs," explains how to learn about the users' needs and gather user requirements. It tells how to study the users' current operations, existing databases (if any), and desired improvements. It describes common questions that you can ask to learn about users' operations, desires, and needs, and how to build the results into requirements documents and specifications. This explains what use cases are and tells how to use them and the requirements to guide database design and to measure success. "Translating User Needs into Data Models," introduces data modeling. It explains how to translate the user's conceptual model and the requirements into other more precise models that define the database design rigorously. This describes several database modeling techniques including user-interface models, semantic object models, entity-relationship diagrams, and relational models. "Extracting Business Rules," explains how a database can handle business rules. It explains what business rules are, how they differ from database structure requirements, and how you can identify business rules. This explains the benefits of separating business rules from the database structure and tells how achieve that separation. "Normalizing Data," explains one of the biggest tools in database design: normalization. Normalization techniques allow you to restructure a database to increase its flexibility and make it more robust. This explains the various forms of normalization, emphasizing the stages that are most common and important: first, second, and third normal forms (1NF, 2NF, and 3NF). It explains how each of these kinds of normalization helps prevent errors and tells why it is sometimes better to leave a database slightly less normalized to improve performance. "Designing Databases to Support Software Applications," explains how databases fit into the larger context of application design and lifecycle. This explains how later development depends on the underlying database design. It discusses multi-tier architectures that can help decouple the application and database design so there can be at least some changes to either without requiring changes to the other. "Common Design Patterns," explains some common patterns that are useful in many applications. Some of these techniques include implementing various kinds of relationships among objects, storing hierarchical and network data, recording temporal data, and logging and locking. "Common Design Pitfalls," explains some common design mistakes that occur in database development. It describes problems that can arise from insufficient planning, incorrect normalization, and obsession with ID fields and performance. "User Needs and Requirements," walks through the steps required to analyze the users' problem, define requirements, and create use cases. It describes interviews with fictitious customers that are used to identify the application's needs and translate them into database requirements. "Building a Data Model," translates the requirements gathered in the previous into a series of data models that precisely define the database's structure. This builds user-interface models, entity-relationship diagrams, semantic object models, and relational models to refine the database's initial design. The final relational models match the structure of a relational database fairly closely so they are easy to implement. "Extracting Business Rules," identifies the business rules embedded in the relational model. It shows how to extract those rules in order to separate them logically from the database's structure. This makes the database more robust in the face of future changes to the business rules. "Normalization and Refinement," refines the relational model by normalizing it. It walks through several versions of the database that are in different normal forms. It then selects the degree of normalization that provides a reasonable tradeoff between robust design and acceptable performance. "Microsoft Access," explains how to build a database with Microsoft Access 2007. This explains enough to get started and to use Access to build non-trivial databases. You can use other versions of Access to work through this, although the locations of menus, buttons, and other Access features are different in different versions. "MySQL," explains how to build a database with MySQL. This tells where to download a free version of MySQL. It explains how to use the MySQL Command Line Client as well as some useful graphical tools including MySQL Query Browser and MySQL Workbench. "Introduction to SQL," provides an introduction to SQL (Structured Query Language). It explains how to use SQL commands to add, insert, update, and delete data. By using SQL, you can help insulate a program from the idiosyncrasies of the particular database product that it uses to store data. "Building Databases with SQL Scripts," explains how to use SQL scripts to build a database. It explains the advantages of this technique, such as the ability to create scripts to initialize a database before performing tests. It also explains some of the restrictions on this method, such as the fact that the user must create and delete tables in specific orders to satisfy table relationships. "Database Maintenance," describes some of the database maintenance issues that are part of any database application. Though performing and restoring backups, compressing tables, rebuilding indexes, and populating data warehouses are strictly not database design tasks, they are essential to any working application. "Database Security," explains database security issues. It explains the kinds of security that some database products provide. It also explains some additional techniques that can enhance database security such as using database views to appropriately restrict the users' access to data.

Oracle Database 11g The Complete Reference

The Definitive Guide to Oracle Database 11 g Get full details on the powerful features of Oracle Database 11 g from this thoroughly updated Oracle Press guide. Oracle Database 11g: The Complete Reference explains how to use all the new features and tools, execute powerful SQL queries, construct PL/SQL and SQLPlus statements, and work with large objects and object-relational databases. Learn how to implement the latest security measures, tune database performance, and deploy grid computing techniques. An invaluable cross-referenced appendix containing Oracle commands, keywords, features, and functions is also included. Install Oracle Database 11 g or upgrade from an earlier version Create database tables, sequences, indexes, views, and user accounts Construct SQL statements, procedures, queries, and subqueries Optimize security using virtual private databases and transparent data encryption Import and export data using SQLLoader and Oracle Data Pump Use SQL replay, change management, and result caching Avoid human errors using flashback and automatic undo management Build and tune PL/SQL triggers, functions, and packages Develop database applications using Java, JDBC, and XML Optimize availability and scalability with Oracle Real Application Clusters