Sql Books
Author: Akande
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: ECE407
Topics: SQL, RDBMS, Database, DBMS, QUERIES IN A DBMS, DBMS languages, EMBEDDED SQL
Author: Akande
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: ECE407
Topics: SQLite Installation, SQLite
Author: Thomas Connolly, Carolyn Begg
School: Edo University
Department: Science and Technology
Course Code: CMP222, CMP214
Topics: Database Systems, database environment, database languages, data definition language, data models conceptual modeling, database architectures, Multi-user DBMS Architectures, teleprocessing, Distributed DBMSs, data warehousing, cloud computing, Oracle Architecture, relational models, relational calculus, SQL, writing SQL commands, data manipulation, advanced SQL, object-relational DBMs, Database System Development Lifecycle, database analysis, database design, database planning, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, normalization, Data Redundancy, Advanced Normalization, database security, data administration, database administration, concurrency control, database recovery, query processing, query optimization, distributed DBMs, Distributed Transaction Management, Distributed Concurrency Control, Distributed Deadlock Management, Distributed Database Recovery, data replication, data Replication Architecture, data Replication Schemes, object oriented DBMs, Scripting Languages, web, Common Gateway Interface, HTTP cookies, Microsoft’s Web Platform, JAVA, Oracle Internet Platform, Semi structured Data, XML, XML schema, XML Query Languages, Data Warehouse Architecture, Data Warehousing Tools, Data Warehousing Technologies, Data Warehousing Using Oracle, data mart, Data Warehousing Design, Online Analytical Processing, data mining, oracle data mining
Database System Concepts ,7th edition
Author: Abraham Silberschatz, Henry Korth, S Sudarshan
School: Modibbo Adama University of Technology
Department: Engineering
Course Code: TT301, TT304
Topics: Relational Model, Intermediate SQL, SQL, Advanced SQL, Database Design, E-R Model, Relational Database Design, database design, Complex Data Types, Data Analytics, big data, Physical Storage Systems, Data Storage Structures, Indexing, big data analytics, storage management, Query Processing, Query Optimization, Transactions, Transaction management, Concurrency Control, Recovery System, Database System Architectures, Parallel Storage, Distributed Storage, Parallel database, Distributed database, Parallel Query Processing, Distributed Query Processing, Parallel Transaction Processing, Distributed Transaction Processing, Advanced Indexing Techniques, Indexing Techniques, Blockchain Databases
Database Systems A Practical Approach to Design, Implementation, and Management ,6th edition
Author: Thomas Connolly, Caroline Begg
School: Modibbo Adama University of Technology
Department: Engineering
Course Code: TT301, TT304
Topics: Database Environment, Database Architecture, Relational Model, Relational languages, Relational Algebra, Relational Calculus, Data Manipulation, Data Definition, Advanced SQL, SQL, Object-Relational DBMSs, Database Analysis, Database Design, Database System Development Lifecycle, Entity–Relationship Modeling, Enhanced Entity–Relationship Modeling, Normalization, Advanced Normalization, Conceptual Database Design, Logical Database Design, Physical Database Design, Database Issues, Data Management, Transaction Management, Query Processing, Distributed DBMSs, Replication, Mobile Databases, Object-Oriented DBMS, Object DBMSs, Web Technology, Semistructured Data, Business Intelligence, Data Warehousing, Data Warehousing Design, OLAP, Data mining
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology