Descriere: Design Feature-Rich PL/SQL ApplicationsDeliver dynamic, client/server PL/SQL applications with expert guidance from an Oracle programming professional. With full coverage of the latest features and tools, Oracle Database 11g PL/SQL Programming lays out each topic alongside detailed explanations, cut-and-paste syntax examples, and real-world case studies. Access and modify database information, construct powerful PL/SQL statements, execute effective queries, and deploy bulletproof security. You'll also learn how to implement C, C++, and Java procedures, Web-enable your database, cut development time, and optimize performance.Create, debug, and manage Oracle-driven PL/SQL programsUse PL/SQL structures, delimiters, operators, variables, and statementsIdentify and eliminate errors using PLSQL_WARNINGS and exception handlersWork with functions, procedures, packages, collections, and triggersDefine and deploy varray, nested table, and associative array data typesHandle external routines, object types, large objects, and secure filesCommunicate between parallel sessions using DBMS_ALERT and DBMS_PIPECall external procedures through Oracle Net Services and PL/SQL wrappersIntegrate internal and server-side Java class libraries using Oracle JVMDevelop robust Web applications using PL/SQL Gateway and Web Toolkit
Autori: Michael McLaughlin | Editura: McGraw-Hill/Osborne Media | Anul aparitiei: 2008 | ISBN: 9780071494458 | Numar de pagini: 835 | Categorie: Computers
Franklin D Kramer
Cyberpower and National Security
The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas. The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional ...
It's the monster hunters' last chance to stop an all-out monster war! We're under attack! The last of the mega-monsters known as the Named are fighting their way into our world, and only a mysterious being known as the Guardian can help--but the Guardian is dying. To save him, Charlie Benjamin and his friends from the Nightmare Academy must journey into the heart of a Hydra cave, through the spooky Bermuda Triangle graveyard, and across the treacherous, monster-filled San Diego Zoo.
Herbert Schildt, Schildt Herbert