Books

Search Books...

Sql Books

SQL and RDBMS

Author: Akande

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ECE407

Topics: SQL, RDBMS, Database, DBMS, QUERIES IN A DBMS, DBMS languages, EMBEDDED SQL

SQLite Installation

Author: Akande

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ECE407

Topics: SQLite Installation, SQLite

Database Systems, 6th edition

Author: Thomas Connolly, Carolyn Begg

School: Edo University

Department: Science and Technology

Course Code: CMP222, CMP214

Topics: Database Systems, database environment, database languages, data definition language, data models conceptual modeling, database architectures, Multi-user DBMS Architectures, teleprocessing, Distributed DBMSs, data warehousing, cloud computing, Oracle Architecture, relational models, relational calculus, SQL, writing SQL commands, data manipulation, advanced SQL, object-relational DBMs, Database System Development Lifecycle, database analysis, database design, database planning, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, normalization, Data Redundancy, Advanced Normalization, database security, data administration, database administration, concurrency control, database recovery, query processing, query optimization, distributed DBMs, Distributed Transaction Management, Distributed Concurrency Control, Distributed Deadlock Management, Distributed Database Recovery, data replication, data Replication Architecture, data Replication Schemes, object oriented DBMs, Scripting Languages, web, Common Gateway Interface, HTTP cookies, Microsoft’s Web Platform, JAVA, Oracle Internet Platform, Semi structured Data, XML, XML schema, XML Query Languages, Data Warehouse Architecture, Data Warehousing Tools, Data Warehousing Technologies, Data Warehousing Using Oracle, data mart, Data Warehousing Design, Online Analytical Processing, data mining, oracle data mining

Database System Concepts ,7th edition

Author: Abraham Silberschatz, Henry Korth, S Sudarshan

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: Relational Model, Intermediate SQL, SQL, Advanced SQL, Database Design, E-R Model, Relational Database Design, database design, Complex Data Types, Data Analytics, big data, Physical Storage Systems, Data Storage Structures, Indexing, big data analytics, storage management, Query Processing, Query Optimization, Transactions, Transaction management, Concurrency Control, Recovery System, Database System Architectures, Parallel Storage, Distributed Storage, Parallel database, Distributed database, Parallel Query Processing, Distributed Query Processing, Parallel Transaction Processing, Distributed Transaction Processing, Advanced Indexing Techniques, Indexing Techniques, Blockchain Databases

Database Systems A Practical Approach to Design, Implementation, and Management ,6th edition

Author: Thomas Connolly, Caroline Begg

School: Modibbo Adama University of Technology

Department: Engineering

Course Code: TT301, TT304

Topics: Database Environment, Database Architecture, Relational Model, Relational languages, Relational Algebra, Relational Calculus, Data Manipulation, Data Definition, Advanced SQL, SQL, Object-Relational DBMSs, Database Analysis, Database Design, Database System Development Lifecycle, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, Normalization, Advanced Normalization, Conceptual Database Design, Logical Database Design, Physical Database Design, Database Issues, Data Management, Transaction Management, Query Processing, Distributed DBMSs, Replication, Mobile Databases, Object-Oriented DBMS, Object DBMSs, Web Technology, Semistructured Data, Business Intelligence, Data Warehousing, Data Warehousing Design, OLAP, Data mining

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology