Posts Tagged ‘ english ’

SQL Tuning by Dan Tow

DOWNLOAD – mediafire

O’Reilly Media | 336 pages | 989.18 KB | english | ISBN-10: 0596005733 | ISBN-13: 978-0596005733 | CHM (file format) | 2003

A poorly performing database application not only costs users time, but also has an impact on other applications running on the same computer or the same network. SQL Tuning provides an essential next step for SQL developers and database administrators who want to extend their SQL tuning expertise and get the most from their database applications.

There are two basic issues to focus on when tuning SQL: how to find and interpret the execution plan of an SQL statement and how to change SQL to get a specific alternate execution plan. SQL Tuning provides answers to these questions and addresses a third issue that’s even more important: how to find the optimal execution plan for the query to use.

Author Dan Tow outlines a timesaving method he’s developed for finding the optimum execution plan–rapidly and systematically–regardless of the complexity of the SQL or the database platform being used. You’ll learn how to understand and control SQL execution plans and how to diagram SQL queries to deduce the best execution plan for a query. Key chapters in the book include exercises to reinforce the concepts you’ve learned. SQL Tuning concludes by addressing special concerns and unique solutions to “unsolvable problems.”

Whether you are a programmer who develops SQL-based applications or a database administrator or other who troubleshoots poorly tuned applications, SQL Tuning will arm you with a reliable and deterministic method for tuning your SQL queries to gain optimal performance.

Dan Tow is an independent consultant, operating under the banner SingingSQL ( His experience solving Oracle-related performance problems goes all the way back to his 1989 hire by Oracle Corporation. During most of his tenure at Oracle, Dan focused on the performance of Oracle Applications, managing the performance group for that division. In this role, he found a fertile testing ground for his SQL tuning method applied to the huge set of complex SQL included in those applications, including both online SQL and diverse batch processes. In 1998, Dan left Oracle to lead performance for TenFold Corporation, where he applied the same methods to tuning questions on DB2, and SQL Server, and Sybase, as well as on Oracle. In 2002, Dan started his own business, SingingSQL, through which he offers diverse database-related tuning services, including SQL tuning and systematically analyzing load to learn which SQL should be tuned. He has introduced his SQL tuning method to over 1,000 people in short lectures, and now offers in-depth courses in the material, using this book as textbook. Dan has a Ph.D. in chemical engineering from the University of Wisconsin at Madison. He lives in Palo Alto, California, and can be reached at

DOWNLOAD – mediafire

Database Hacker’s Handbook – Defending Database Servers by David Litchfield

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children’s grades and what groceries you buy. Database attacks are potentially crippling-and relentless.

In this essential follow-up to The Shellcoder’s Handbook, four of the world’s top security experts teach you to break into and defend the seven most popular database servers. You’ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM’s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know

Wiley | 500 pages | 2.81 MB | english | ISBN-10: 0764578014 | ISBN-13: 978-0764578014 | CHM (file format) | 2005

DOWNLOAD – mediafire

Applied Mathematics for Database Professionals by Lex de Haan

Relational databases hold data, right? They indeed do, but to think of a database as nothing more than a container for data is to miss out on the profound power that underlies relational technology. A far more powerful way of thinking lies in relational technologys foundation in the mathematical disciplines of logic and set theory.

Databases contain truths or propositions describing some area of interest such as a business. Those truths are organized into sets. Operations from logic and set theory can be applied to existing sets of truths to derive new sets of truths. Applied Mathematics for Database Professionals introduces you to this way of thinking, to the logic and set theory that underlies relational database technology. All this may sound abstract now, but there are profound benefits from the deeper understanding youll gain from this book. Youll learn to

  • Become a better database designer. Youll make fewer mistakes, and your designs will be more flexible in response to changing data needs.
  • Use the expressive power of mathematics to precisely specify designs and business rules.
  • Communicate effectively about design using the universal language of mathematics.
  • Develop and write complex SQL statements with confidence.
  • Avoid pitfalls and problems from common relational bugaboos such as null values and duplicate rows.

The math that you learn in this book will put you above the level of understanding of most database professionals today. Youll better understand the technology and be able to apply it more effectively. Youll avoid data anomalies like redundancy and inconsistency. Understanding whats in this book will take your mastery of relational technology to heights you may not have thought possible.

This book is reviewed and endorsed by C. J. Date and features a foreword by the same.

Apress | 376 pages | 2.81 MB | english | ISBN-10: 1590597451 | ISBN-13: 978-1590597453 | PDF | 2007

DOWNLOAD – mediafire

Quantum Communications and Cryptography by Sergienko

All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect secrecy.

Quantum Communications and Cryptography is the first comprehensive review of the past, present, and potential developments in this dynamic field. Leading expert contributors from around the world discuss the scientific foundations, experimental and theoretical developments, and cutting-edge technical and engineering advances in quantum communications and cryptography.

The book describes the engineering principles and practical implementations in a real-world metropolitan network as well as physical principles and experimental results of such technologies as entanglement swapping and quantum teleportation. It also offers the first detailed treatment of quantum information processing with continuous variables. Technologies include both free-space and fiber-based communications systems along with the necessary protocols and information processing approaches.

Bridging the gap between physics and engineering, Quantum Communications and Cryptography supplies a springboard for further developments and breakthroughs in this rapidly growing area.

crc press | 248 pages | 3.68 MB | english | ISBN-10: 0849336848 | ISBN-13: 978-0849336843 | PDF | 2005

DOWNLOAD – mediafire

Codes: The Guide to Secrecy From Ancient to Modern Times by Richard A. Mollin

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist.

The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion.

Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner. ———————Features——————— · Presents self-contained, thorough, and vibrantly illustrated coverage accessible to both professionals and laypersons · Provides an intuitive approach with illustrations to provide an overview of the topics for the general reader that does not require a mathematical approach · Incorporates more than 200 footnotes and 300 references for access to more in-depth information and further reading · Contains all necessary mathematics, requisite probability theory, and exercises organized by chapter in the appendices

Chapman and Hall/CRC | 704 pages | 5.39 MB | english | ISBN-10: 1584884703 | ISBN-13: 978-1584884705 | PDF | 2005

DOWNLOAD – mediafire