Oracle SQL Tuning Pocket ReferenceOne of the most important challenges faced by Oracle database administrators and Oracle developers is the need to tune SQL statements so that they execute efficiently. In this book, Mark Gurry shares his in-depth knowledge of Oracle's SQL statement optimizers. Mark provides solutions to many common problems that occur with both the rule-based and cost-based optimizers. Mark provides a number of handy SQL tuning tips, discusses the use of the DBMS_STATS package to manage database statistics, and shows you how to use outlines to specify execution plans for SQL statements in third-party applications that you can't otherwise modify. ...
Developing Large Web ApplicationsHow do you create a mission-critical site that provides exceptional performance while remaining flexible, adaptable, and reliable 24/7? Written by the manager of a UI group at Yahoo!, this book offers practical steps for building rock-solid applications that remain effective even as you add features, functions, and users. You'll learn how to develop large web applications with the extreme precision required for other types of software. ...
Complete Web MonitoringComplete Web Monitoring demonstrates how to measure every aspect of your web presence -- including analytics, backend performance, usability, communities, customer feedback, and competitive analysis -- whether you're running an e-commerce site, a community, a media property, or a Software-as-a-Service company. This book's concrete examples, clear explanations, and practical recommendations make it essential for anyone who runs a website. ...
Cloud Security and PrivacyYou may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. This book offers you sound advice from three well-known authorities in the tech security world. ...
Digital Photography Pocket Guide, 3rd EditionWho can resist the instant gratification of the digital camera? For everyone who owns or will own a digital camera, Derrick Story delivers Digital Photography Pocket Guide, 3rd Edition--the perfect on-the-go guide for taking top-notch digital photos. In full color, this third edition of the bestselling pocket guide covers everything from shooting sports action, close ups, and night shots, to dealing with image resolution, archiving, memory cards, and much more. ...
FBML EssentialsDo you have an idea for a Facebook application? With FBML Essentials, you'll learn how to build it quickly using the Facebook Markup Language (FBML) and other easy-to-use tools in the site's framework. This book not only gets you started with this toolkit, you also get a complete reference on every FBML tag Facebook has ever written, with advice on the best ways to use these tags in your code. ...
Getting Started with Flex 3Discover how easy RIA development can be with this one-of-a-kind handbook from the Adobe Developer Library. Several clear, step-by-step mini-tutorials teach you about web services, event handling, designing user interfaces with reusable components, and more. After finishing this guide, you'll be able to build Flash applications ranging from widgets to full-featured RIAs using the Flex SDK and Flex Builder 3.0 -- whether you come from an open source or Visual Studio-intensive background. ...
Getting Started with ProcessingLearn computer programming the easy way with Processing, a simple language that lets you use code to create drawings, animation, and interactive graphics. Programming courses usually start with theory, but this book lets you jump right into creative and fun projects. It's ideal for anyone who wants to learn basic programming, and serves as a simple introduction to graphics for people with some programming skills. ...
Hardening Cisco RoutersThis succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength. ...
Head First AjaxAjax is no longer an experimental approach to website development, but the key to building browser-based applications that form the cornerstone of Web 2.0. Head First Ajax gives you an up-to-date perspective that lets you see exactly what you can do - and has been done - with Ajax. With it, you get a highly practical, in-depth, and mature view of what is now a mature development approach.
Using the unique and highly effective visual format that has turned Head First titles into runaway bestsellers, this book offers a big picture overview to introduce Ajax, and then explores the use of individual Ajax components - including the JavaScript event model, DOM, XML, JSON, and more - as it progresses. You'll find plenty of sample applications that illustrate the concepts, along with exercises, quizzes, and other interactive features to help you retain what you've learned.
Head First Ajax covers: The JavaScript event model; Making Ajax requests with XMLHTTPREQUEST objects; The asynchronous a ...