Search:

Database nation : the death of privacy in the 21st century / by Garfinkel, Simson.(CARDINAL)206303;
Includes bibliographical references (pages 273-292) and index.
Subjects: Privacy, Right of; Computer security;

SQL : a beginner's guide / by Oppel, Andrew J.,author.;
Essential SQL Skills Made Easy Fully revised to cover the latest software versions, this easy-to-follow guide will get you started programming in SQL right away. Discover how to create database tables, access and modify data, work with triggers and transactions, build effective queries, and handle management and administrative functions. SQL: A Beginner's Guide, Fourth Edition offers clear instruction on each topic and is loaded with step-by-step examples. This practical book includes coverage of database security, SQL/XML, and new temporal data features. Designed for Easy Learning: Key Skills & ConceptsLists of specific skills covered in the chapter Ask the ExpertQ&A sections filled with bonus information and helpful tips Try ThisHands-on exercises that show how to apply your skills NotesExtra information related to the topic being covered TipsHelpful reminders or alternate ways of doing things CautionsErrors and pitfalls to avoid Self-TestsChapter-ending quizzes to test your knowledge Annotated SyntaxExample code with commentary that describes the programming techniques being illustrated
Subjects: SQL (Computer program language); Relational databases.;

Microsoft SQL Server 2016 : a beginner's guide / by Petković, Dušan,author.(CARDINAL)656979;
Relational database systems: an introduction -- Planning the installation and installing SQL server -- SQL server management studio -- SQL components -- Data definitions language -- Queries -- Modification of a table's contents -- Stored procedures and user defined functions -- System catalog -- Indices -- Views -- Security system of the database engine -- Concurrency control -- Triggers -- System environment of the database engine -- Backup, recovery, and system availability -- Automating system administration tasks -- Data replication -- Query optimizer -- Performance tuning -- In-memory OLTP -- Business intelligence: an introduction -- SQL server analysis services -- Business intelligence and transact-SQL -- SQL server reporting services -- Optimizing techniques for data warehousing -- Columnstore indices -- XML and JSON integration in the database engine -- Spatial and temporal data -- SQL server full-text search.Get up and running on Microsoft SQL Server 2016 in no time with help from this thoroughly revised, practical resource. The book offers thorough coverage of SQL management and development and features full details on the newest business intelligence, reporting, and security features. Filled with new real-world examples and hands-on exercises, Microsoft SQL Server 2016: A Beginner's Guide, Sixth Edition, starts by explaining fundamental relational database system concepts. From there, you will learn how to write Transact-SQL statements, execute simple and complex database queries, handle system administration and security, and use the powerful analysis and BI tools. XML, spatial data, and full-text search are also covered in this step-by-step tutorial.
Subjects: Handbooks and manuals.; SQL server.; Database management.; Client/server computing.;

Learning MySQL : get a handle on your data / by Grippa, Vinicius M.,Author(DLC)no2021118195; Kuzmichev, Sergey,Author(DLC)no2021118204;
Get a comprehensive overview on how to set up and design an effective database with MySQL. This thoroughly updated edition covers MySQL's latest version, including its most important aspects. Whether you're deploying an environment, troubleshooting an issue, or engaging in disaster recovery, this practical guide provides the insights and tools necessary to take full advantage of this powerful RDBMS. Authors Vinicius Grippa and Sergey Kuzmichev from Percona show developers and DBAs methods for minimizing costs and maximizing availability and performance. You'll learn how to perform basic and advanced querying, monitoring and troubleshooting, database management and security, backup and recovery, and tuning for improved efficiency. This edition includes new chapters on high availability, load balancing, and using MySQL in the cloud. *Get started with MySQL and learn how to use it in production *Deploy MySQL databases on bare metal, on virtual machines, and in the cloud *Design database infrastructures *Code highly efficient queries *Monitor and troubleshoot MySQL databases *Execute efficient backup and restore operations *Optimize database costs in the cloud *Understand database concepts, especially those pertaining to MySQL.
Subjects: MySQL (Electronic resource); SQL (Computer program language); Web databases.;

Murach's PHP and MySQL : training & reference / by Murach, Joel,1968-author.(CARDINAL)206512; Harris, Ray(Software engineer),author.(CARDINAL)814983;
Introduction to web development with PHP -- How to code a PHP application -- Introduction to relational databases and MySQL -- How to use PHP with a MySQL database -- How to use the MVC pattern to organize your code -- How to test and debug a PHP application -- How to work with form data -- How to code control statements -- How to work strings and numbers -- How to work with dates -- How to create and use arrays -- How to work with cookies and sessions -- How to create and use functions -- How to create and use objects -- How to use regular expressions, handle exceptions, and validate data -- How to design a database -- How to use SQL to create a MySQL database -- How to use SQL to work with a MySQL database -- Professional PHP for working with MySQL -- A database-driven website -- How to create secure websites -- How to send email -- How to work with files, uploads, and images -- An eCommerce website -- Appendix A: How to set up Windows for this book -- Appendix B: How to set up Mac OS X for this book -- Appendix C: How to set up Linux for this book.
Subjects: MySQL (Electronic resource); Relational databases.; PHP (Computer program language);

Jobs in information technology / by Harris, Beatrice,author.(CARDINAL)792488;
"Information technology means storing, retrieving, and sending data. It is crucial to everyday life. Every time someone searches for the answer to a question online, streams a movie or TV show, or looks at photographs and videos on the internet, they can thank the hard work of people who work in information technology, or IT. This beneficial book, a valuable addition to any STEM library, introduces many IT-related careers, such as computer programmer, database administrator, and information security analyst. Readers will learn how to pursue these careers and the importance of these occupations in our world today"--Grades 4-6
Subjects: Information technology;

Careers in intelligence & national security. by Salem Press,issuing body.(CARDINAL)521037;
Includes bibliographical references (pages 355-362) and index.Publishers Note -- Introduction -- Profiles -- Actuary -- Aerospace engineer -- Arbitrator/mediator/conciliator -- Cartographer/Photogrammetrist -- Computer and information research scientist -- Computer/Information systems manager -- Computer network architect -- Computer programmer -- Computer support specialist -- Data scientist -- Database administrator/Architect -- Electrical/Electronics engineer -- Electromechanical/Mechatronics technologist/Technician -- Emergency management director -- Human resources specialist -- Information security analyst -- Interpreter/Translator -- Judge/Hearing officer -- Lawyer -- Logistician -- Military careers -- Network and computer systems administrator -- News Analyst/Reporter/Journalist -- Operations research analyst -- Paralegal/Legal assistant -- Photographer -- Police officer/Detective -- Public relations specialist -- Security guard/Gambling surveillance officer -- Software developer/Quality assurance analyst/Tester -- Telecommunications technician -- Appendix A: Holland code -- Appendix B: Further reading -- Appendix C: List of organizations and resources -- Index.Careers in intelligence & national security provides detailed and need-to-know information on various careers in the secretive intelligence sphere. Each chapter provides a wealth of real-world information including A Day in the life, Work environment, Education & training, Earnings & advancement, Employment outlook, and Conversations with real professionals, as well as contacts for more information.
Subjects: Intelligence service; National security; Vocational guidance.;

Unwarranted : policing without permission / by Friedman, Barry,1958-author.(CARDINAL)671276;
Includes bibliographical references and index.The problems of policing ; Democratic policing. Policing in secret ; Legislatures that won't legislate ; Courts that can't judge ; Fostering democratic policing -- Constitutional policing. Searches without warrant ; Searches without probably cause ; General searches ; Discriminatory searches -- Twenty-first-century policing. Surveillance technology ; Third-party information and the cloud ; Government databases ; Counterterrorism and national security -- The challenges of democratic policing."As the debate about out-of-control policing heats up, an authority on constitutional law offers a provocative account of how our rights have been eroded In June 2013, documents leaked by Edward Snowden sparked widespread debate about secret government surveillance of Americans. Just over a year later, the shooting of Michael Brown, a black teenager in Ferguson, Missouri, set off protests and triggered concern about militarization and discriminatory policing. In Unwarranted, Barry Friedman argues that these two seemingly disparate events are connected, and that the problem is not so much the policing agencies as it is the rest of us. We allow these agencies to operate in secret and to decide how to police us, rather than calling the shots ourselves. The courts have let us down entirely. Unwarranted is filled with stories of ordinary people whose lives were sundered by policing gone awry. Driven by technology, policing has changed dramatically from cops seeking out bad guys, to mass surveillance of all of society, backed by an increasingly militarized capability. Friedman captures this new eerie environment in which CCTV, location tracking, and predictive policing has made us all suspects, while proliferating SWAT teams and increased use of force puts everyone at risk. Police play an indispensable role in our society. But left under-regulated by us and unchecked by the courts, our lives, liberties, and property are at peril. Unwarranted is a vital, timely intervention in debates about policing, a call to take responsibility for governing those who govern us. "--"As the debate about out-of-control policing heats up, an authority on constitutional law offers a provocative account of how our rights have been eroded"--
Subjects: Electronic surveillance; Intelligence service; Espionage; Civil rights; Privacy, Right of; Law enforcement;

SQL all-in-one / by Taylor, Allen G.,author.(CARDINAL)759158; Blum, Richard,1962-author.(CARDINAL)422552;
Introduction -- BOOK 1: Getting started with SQL. Understanding relational databases ; Modeling a system ; Getting to know SQL ; SQL and the relational model ; Knowing the major components of SQL ; Drilling down to the SQL nitty-gritty -- BOOK 2: Developing relational databases. System development overview ; Building a database model ; Balancing performance and correctness ; Creating a database with SQL -- BOOK 3: Writing SQL queries. Values, variables, functions, and expressions ; SELECT statements and modifying clauses ; Querying multiple tables with subqueries ; Querying multiple tables with relational operators ; Cursors -- BOOK 4: Securing your data. Protecting against hardware failure and external threats ; Protecting against user errors and conflicts ; Assigning access privileges ; Error handling -- BOOK 5: Programming with SQL. Database development environments ; Interfacing SQL to a procedural language ; Using SQL in an application program ; Designing a sample application ; Building an application ; Understanding SQL's procedural capabilities ; Connecting SQL to a remote database -- BOOK 6: Working with advanced data types in SQL: XML, JSON, and PGQ. Using XML with SQL ; Storing XML data in SQL tables ; Retrieving data from XML documents ; Using JSON with SQL ; Exploring property graph queries -- BOOK 7: Optimizing your database. Tuning the database ; Tuning the environment ; Finding and eliminating performance bottlenecks -- BOOK 8: Appendixes. SQL:2023 reserved words ; Glossary."SQL All-in-One For Dummies has everything you need to get started with the SQL programming language, and then to level up your skill with advanced applications. This relational database coding language is one of the most used languages in professional software development. And, as it becomes ever more important to take control of data, there's no end in sight to the need for SQL know-how. You can take your career to the next level with this guide to creating databases, accessing and editing data, protecting data from corruption, and integrating SQL with other languages in a programming environment. Become a SQL guru and turn the page on the next chapter of your coding career"--
Subjects: SQL (Computer program language); Relational databases.; Database management.;

Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;