• Microsoft SQL Server 2008 R2 Administration Cookbook

    Microsoft SQL Server 2008 R2 Administration Cookbook

    Microsoft SQL Server is a powerful relational database engine, widely used to store and maintain data in Enterprises of various levels—be they small, medium, or large. SQL Server delivers a rich set of integrated services and reporting features that enable you to do more with your data such as query, search, synchronize, report, and analyze. SQL Server 2008 R2 accelerates the capabilities to scale database operations and is a highly scalable...

     468 p cit 07/05/2013 142 1

  • Microsoft SQL Server 2008 R2 High Availability

    Microsoft SQL Server 2008 R2 High Availability

    The term High Availability means that the servers or systems that host or run the business-critical applications should be highly available 24 X 7. As the word itself defines how important it is to make these applications and data available for end-users as well as business users, if this data is not available for a short time, it will be a big problem for both sets of users. Imagine a bank spread across the country and having a huge customer...

     308 p cit 07/05/2013 118 2

  • Microsoft SQL Azure: Enterprise Application Development

    Microsoft SQL Azure: Enterprise Application Development

    The arrival of Cloud Services has been a defining moment for enterprises, small businesses, and the public sector. The landscape is changing from moment to moment. Although Microsoft entered this arena a little late, it made up for lost time by making an immense effort by building its mega data centers around the world. In handling this new business strategy, Microsoft hoisted its entire software powerhouse, honed and built over the years, on...

     420 p cit 07/05/2013 113 1

  • Microsoft Data Protection Manager 2010

    Microsoft Data Protection Manager 2010

    Microsoft Data Protection Manager (DPM) 2010 is a backup and recovery solution which provides continuous data protection for Windows application and file servers to seamlessly integrated disk, tape, and cloud. This Data Protection Manager book is a practical, step-by-step tutorial that will show you how to effectively back up your business data using Microsoft Data Protection Manager 2010 and how to plan, deploy, install, configure, and...

     360 p cit 07/05/2013 99 1

  • Learning UML 2.0

    Learning UML 2.0

    "Since its original introduction in 1997, the Unified Modeling Language has revolutionized software development. Every integrated software development environment in the world--open-source, standards-based, and proprietary--now supports UML and, more importantly, the model-driven approach to software development. This makes learning the newest UML standard, UML 2.0, critical for all software developers--and there isn't a better choice than...

     409 p cit 07/05/2013 107 3

  • Learning SPARQL Querying and Updating with SPARQL 1.1

    Learning SPARQL Querying and Updating with SPARQL 1.1

    More and more people are using the query language SPARQL (pronounced “sparkle”) to pull data from a growing collection of public and private data. Whether this data is part of a semantic web project or an integration of two inventory databases on different platforms behind the same firewall, SPARQL is making it easier to access it. In the words of W3C Director and Web inventor Tim Berners-Lee, “Trying to use the Semantic Web without...

     256 p cit 07/05/2013 98 1

  • JSTL in Action

    JSTL in Action

    This book will show you how to make the most of JSTL. It begins without assuming you know anything more than HTML, and it gently introduces you to all the principles you’ll need to produce flexible, powerful web pages. The goal of this book isn’t to satisfy my own ego by showing you how subtle and tricky technology can be, but instead to equip you to handle any JSTL-related issue that arises when you produce real-world, dynamic web sites....

     111 p cit 07/05/2013 38 1

  • Understanding MySQL Internals

    Understanding MySQL Internals

    In the summer of 2003, somebody on the MySQL mailing list proposed a book about MySQL internals. As I read the email, I realized that I had the background to write such a book, but I had just finished writing my first book and was not looking forward to writing another. I tried to talk myself out of the responsibility, saying to myself nobody would ever publish a book so technical and specialized. There simply would not be enough of an...

     256 p cit 07/05/2013 90 1

  • The Definitive Guide to MongoDB The NoSQL Database for Cloud and Desktop Computing

    The Definitive Guide to MongoDB The NoSQL Database for Cloud and Desktop Computing

    The seed for The Definitive Guide to MongoDB was actually planted some years ago when I walked into a local bookstore, and first spotted a book on databases. I started reading the back-cover copy and a few pages of the front matter, but quickly found the book closed in my hands, as I quietly mumbled to myself: “Humph. Who needs databases, other than a very large enterprise?” I put the book back, and headed home without thinking any more...

     329 p cit 07/05/2013 118 1

  • Oracle 11g For Dummies

    Oracle 11g For Dummies

    If you are reading this text, chances are you’re considering throwing yourself into the wonderful world of Oracle database administration. The good news is, you have come to right place. The bad news? Well, it’s not really bad news . . . but you have quite an adventure ahead of you. Luckily, the authors of this book, your guides in this adventure, can help smooth out any bumpy roads. With over 35 years of combined Oracle experience, we...

     412 p cit 07/05/2013 89 1

  • MongoDB and Python

    MongoDB and Python

    I’ve been building production database-driven applications for about 10 years. I’ve worked with most of the usual relational databases (MSSQL Server, MySQL, PostgreSQL) and with some very interesting nonrelational databases (Freebase.com’s Graphd/MQL, Berkeley DB, MongoDB). MongoDB is at this point the system I enjoy working with the most, and choose for most projects. It sits somewhere at a crossroads between the performance and...

     66 p cit 07/05/2013 113 1

  • Expert Oracle and Java Security Programming Secure Oracle Database Applications with Java

    Expert Oracle and Java Security Programming Secure Oracle Database Applications with Java

    Every day I read e-mails and articles dealing with computer security attacks and breaches, and the repercussions that follow. I have been getting onboard with computer security for decades, and there is no end in sight for this effort. Each and every professional in information technology has a commitment to keep with regard to computer security. We have, most of us, signed computing codes of conduct, and further we have aligned ourselves with...

     466 p cit 07/05/2013 92 1

Hướng dẫn khai thác thư viện số