Which paint color is most likely to tell you that a used car is in good shape? How can officials identify the most dangerous New York City manholes before they explode? And how did Google searches predict the spread of the H1N1 flu outbreak?
The key to answering these questions, and many more, is big data. “Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.
In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.
The key? Make tough decisions about which processes you must execute well, then implement the IT systems needed to digitize those processes. Citing numerous companies worldwide, the authors show how constructing the right enterprise architecture enhances profitability and time to market, improves strategy execution, and even lowers IT costs. Though clear, engaging explanation, they demonstrate how to define your operating model—your vision of how your firm will survive and grow—and implement it through your enterprise architecture. Their counterintuitive but vital message: when it comes to executing your strategy, your enterprise architecture may matter far more than your strategy itself.
The book begins by tracing the historical development of emergency management from the 1800s to the present world of homeland security. It then discusses the hazards faced by emergency management and the methods of assessing hazard risk; the function of mitigation and the strategies and programs emergency management or other disciplines use to reduce the impact of disasters; and emergency management preparedness.
The book also covers the importance of communication in the emergency management of the twenty-first century; the functions and processes of disaster response; government and voluntary programs aimed at helping people and communities rebuild in the aftermath of a disaster; and international emergency management. It also addresses the impact of September 11, 2001 on traditional perceptions of emergency management; and emergency management in the post-9/11, post-Katrina environment.
* Expanded coverage of risk management * Enhanced coverage of disaster communications, including social networking sites like Twitter * More material on mitigation of disasters * Up-to-date information on the role of FEMA in the Obama administration
This instructional manual focuses on pin tumbler locks, the construction and function of which are illustrated with the aid of several diagrams. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and shown. Guides and exercises demonstrate the use of basic lock-picking tools in order to manipulate and open these locks. The text also describes the most common "alternative" designs of pin tumbler locks and summarizes the tools and techniques that can be effective against them. It comes with a DVD filled with indispensable lock picking videos and color photos.
This book is an ideal reference for penetration testers, security consultants, and IT security professionals as well as hackers.Detailed photos make learning as easy as picking a lockDVD is filled with indispensible lock picking videos and color photosExtensive appendix details tools and toolkits currently available for all your lock picking needs
Mullins presents realistic, thorough, and up-to-date coverage of every DBA task, including creating database environments, data modeling, normalization, design, performance, data integrity, compliance, governance, security, backup/recovery, disaster planning, data and storage management, data movement/distribution, data warehousing, connectivity, metadata, tools, and more.
This edition adds new coverage of “Big Data,” database appliances, cloud computing, and NoSQL. Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. You’ll also find an all-new glossary, plus up-to-the-minute DBA rules of thumb.
Master Data Management equips you with a deeply practical, business-focused way of thinking about MDM—an understanding that will greatly enhance your ability to communicate with stakeholders and win their support. Moreover, it will help you deserve their support: you’ll master all the details involved in planning and executing an MDM project that leads to measurable improvements in business productivity and effectiveness.
* Presents a comprehensive roadmap that you can adapt to any MDM project.
* Emphasizes the critical goal of maintaining and improving data quality.
* Provides guidelines for determining which data to “master.
* Examines special issues relating to master data metadata.
* Considers a range of MDM architectural styles.
* Covers the synchronization of master data across the application infrastructure.
Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data, improve corresponding business processes, and maximize its value in SOA environments.
Enterprise Master Data Management provides an authoritative, vendor-independent MDM technical reference for practitioners: architects, technical analysts, consultants, solution designers, and senior IT decisionmakers. Written by the IBM® data management innovators who are pioneering MDM, this book systematically introduces MDM’s key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA.
Drawing on their experience with cutting-edge projects, the authors introduce MDM patterns, blueprints, solutions, and best practices published nowhere else—everything you need to establish a consistent, manageable set of master data, and use it for competitive advantage.
How MDM and SOA complement each other Using the MDM Reference Architecture to position and design MDM solutions within an enterprise Assessing the value and risks to master data and applying the right security controls Using PIM-MDM and CDI-MDM Solution Blueprints to address industry-specific information management challenges Explaining MDM patterns as enablers to accelerate consistent MDM deployments Incorporating MDM solutions into existing IT landscapes via MDM Integration Blueprints Leveraging master data as an enterprise asset—bringing people, processes, and technology together with MDM and data governance Best practices in MDM deployment, including data warehouse and SAP integration
Jim Whitehurst, CEO of Red Hat, one of the world’s most revolutionary companies, shows how open principles of management—based on transparency, participation, and community—reinvent the organization for the fast-paced connected era. Whitehurst gives readers an insider’s look into how an open and innovative organizational model works. He shows how to leverage it to build community, respond quickly to opportunities, harness resources and talent both inside and outside the organization, and inspire, motivate, and empower people at all levels to act with accountability.
The Open Organization is a must-read for leaders struggling to adapt their management practices to the values of the digital and social age. Brimming with Whitehurst’s personal stories and candid advice for leading an open organization, as well as with instructive examples from employees and managers at Red Hat and companies such as Google, The Body Shop, and Whole Foods, this book provides the blueprint for reinventing your organization.
Essential SharePoint® 2010 approaches Microsoft SharePoint Server 2010 from a strict business value perspective, explaining exactly how to plan and implement SharePoint solutions to achieve superior business results.
The authors are leading enterprise SharePoint consultants and draw on their unsurpassed experience to focus on the SharePoint features that offer the most real-world value. You’ll find practical advice about how to succeed with knowledge management, business intelligence, and process improvement, and how to derive value from new innovations such as social tagging and mashups.
The book includes comprehensive, “in the trenches” guidance on planning, architecture, governance, training, and other key issues most SharePoint books ignore. The authors identify success factors, intangibles, and “gotchas,” helping you systematically reduce project risk and time-to-value ratio. Learn how toCustomize your best portal or collaboration strategy Sustain a portal for continual, measurable value Leverage the new community and social features in SharePoint 2010 Succeed with enterprise content management Streamline business processes with Workflow and Forms Choose the right roles for Web collaboration, search, and Microsoft Office Plan for secure external collaboration Migrate smoothly from SharePoint 2007 Train and communicate for a successful launch
Whether you’re a business leader, IT manager, architect, analyst, developer, or consultant, this book will help you tightly align SharePoint projects with business strategy to deliver outstanding results.
Let's face it, SQL is a deceptively simple language to learn, and many database developers never go far beyond the simple statement: SELECT columns FROM table WHERE conditions. But there is so much more you can do with the language. In the SQL Cookbook, experienced SQL developer Anthony Molinaro shares his favorite SQL techniques and features. You'll learn about:
Window functions, arguably the most significant enhancement to SQL in the past decade. If you're not using these, you're missing out
Powerful, database-specific features such as SQL Server's PIVOT and UNPIVOT operators, Oracle's MODEL clause, and PostgreSQL's very useful GENERATE_SERIES function
Pivoting rows into columns, reverse-pivoting columns into rows, using pivoting to facilitate inter-row calculations, and double-pivoting a result set
Bucketization, and why you should never use that term in Brooklyn.
How to create histograms, summarize data into buckets, perform aggregations over a moving range of values, generate running-totals and subtotals, and other advanced, data warehousing techniques
The technique of walking a string, which allows you to use SQL to parse through the characters, words, or delimited elements of a string
Written in O'Reilly's popular Problem/Solution/Discussion style, the SQL Cookbook is sure to please. Anthony's credo is: "When it comes down to it, we all go to work, we all have bills to pay, and we all want to go home at a reasonable time and enjoy what's still available of our days." The SQL Cookbook moves quickly from problem to solution, saving you time each step of the way.
The book takes you step-by-step through the analysis of case law as it applies to situations commonly faced by security practitioners. It describes the legal requirements faced by security firms and emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency. It also examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that are likely to intensify in the future. New features of this edition include: a chapter on the legal implications of private contractors operating in war zones like Afghanistan; updated coverage of statutory authority, as well as state and federal processes of oversight and licensure; and special analysis of public-private cooperative relationships in law enforcement. A historical background helps readers understand the present by seeing the full context of recent developments.
This book will appeal to: students in physical security, security management, and criminal justice programs in traditional and for-profit schools; security professionals; and those working in law enforcement.Authoritative, scholarly treatise sheds light on this increasingly important area of the lawHistorical background helps readers understand the present by seeing the full context of recent developmentsNational scope provides crucial parameters to security practitioners throughout the USNEW TO THIS EDITION! A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement
If you have an aptitude for mathematics and some programming skills, author Joel Grus will help you get comfortable with the math and statistics at the core of data science, and with hacking skills you need to get started as a data scientist. Today’s messy glut of data holds answers to questions no one’s even thought to ask. This book provides you with the know-how to dig those answers out.Get a crash course in PythonLearn the basics of linear algebra, statistics, and probability—and understand how and when they're used in data scienceCollect, explore, clean, munge, and manipulate dataDive into the fundamentals of machine learningImplement models such as k-nearest Neighbors, Naive Bayes, linear and logistic regression, decision trees, neural networks, and clusteringExplore recommender systems, natural language processing, network analysis, MapReduce, and databases
Lopp's straight-from-the-hip style is unlike any other writer on management. He pulls no punches and tells stories he probably shouldn't. But they are massively instructive and cut to the heart of the matter whether it's dealing with your boss, handling a slacker, hiring top guns, or seeing a knotty project through to completion.
This second editions expands on the management essentials. It will explain why we hate meetings, but must have them, it carefully documents the right way to have a 1-on-1, and it documents the perils of not listening to your team.
Writing code is easy. Managing humans is not. You need a book to help you do it, and this is it.
Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they can focus on their business. It also reveals the cloud's effect on corporate organization structures, the evolution of traditional IT in the global economy, potential benefits and risks of cloud models and most importantly, how the IT function is being rethought by companies today who are making room for the coming tidal wave that is cloud computing.Why IT and business thinking must change to capture the full potential of cloud computing Topics including emerging cloud solutions, data security, service reliability, the new role of IT and new business organization structures Other titles by Hugos include: Business Agility: Sustainable Prosperity in a Relentlessly Competitive World and Essentials of Supply Chain Management, 2nd Edition
Practical and timely, this book reveals why it's worth every company's time and effort to exploit cloud computing's potential for their business's survival and success.
Get the Access 2010 information you need to succeed with this comprehensive reference. If this is your first encounter with Access, you'll appreciate the thorough attention to database fundamentals and terminology. If you're familiar with earlier versions, you can jump right into Access 2010 enhancements such as the new Access user interface and wider use of XML and Web services.Takes you under the hood of Microsoft Access 2010, the database application included with Microsoft Office 2010 Explores the latest enhancements, such as a new user interface and wider use of XML and Web services; also, how to exchange data with Word, Excel, PowerPoint, and other Office apps Covers how to create tables, manipulate datasheets, and work with multiple tables Explains the seven database objects and how to use a seven-step design method to build a database tailored to your needs Shows you how to build forms, use Visual Basic and the VBA Editor, automate query parameters, create functions and subroutines, use XML to create data access pages, and more Includes a CD with all source code from the book and working examples, plus bonus shareware, freeware, trial, demo and evaluation programs that work with or enhance Microsoft Office
You’ll want to keep this soup-to-nuts Access reference close at hand!
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Implementing an enterprise-wide Configuration Management Database (CMDB) is one of the most influential actions an IT organization can take to improve service delivery and bridge the gap between technology and the business. With a well-designed CMDB in place, companies are better positioned to manage and optimize IT infrastructure, applications, and services; automate more IT management tasks; and restrain burgeoning costs. Now, there’s an objective, vendor-independent guide to making a CMDB work in your organization. The CMDB Imperative presents a start-to-finish implementation methodology that works and describes how the CMDB is shifting to the superior Configuration Management System (CMS).
Expert CMDB industry analyst Glenn O’Donnell and leading-edge architect and practitioner Carlos Casanova first review the drivers behind a CMDB and the technical, economic, cultural, and political obstacles to success. Drawing on the experiences of hundreds of organizations, they present indispensable guidance on architecting and customizing CMDB solutions to your specific environment. They’ll guide you through planning, implementation, transitioning into production, day-to-day operation and maintenance, and much more. Coverage includes
Defining the tasks and activities associated with configuration management Understanding the CMDB’s role in ITIL and the relationship between CMDBs and ITIL v3’s CMS Building software models that accurately represent each entity in your IT environment Ensuring information accuracy via change management and automated discovery Understanding the state of the CMDB market and selling the CMDB within your organization Creating federated CMDB architectures that successfully balance autonomy with centralized control Planning a deployment strategy that sets appropriate priorities and reflects a realistic view of your organization’s maturity Integrating systems and leveraging established and emerging standards Previewing the future of the CMDB/CMS and how it will be impacted by key trends such as virtualization, SOA, mobility, convergence, and “flexi-sourcing”
An international sensation—and still the talk of the relevant blogosphere—this Wall Street Journal and New York Times business bestseller examines the “power” in numbers. Today more than ever, number crunching affects your life in ways you might not even imagine. Intuition and experience are no longer enough to make the grade. In order to succeed—even survive—in our data-based world, you need to become statistically literate.
Cutting-edge organizations are already crunching increasingly larger databases to find the unseen connections among seemingly unconnected things to predict human behavior with staggeringly accurate results. From Internet sites like Google and Amazon that use filters to keep track of your tastes and your purchasing history, to insurance companies and government agencies that every day make decisions affecting your life, the brave new world of the super crunchers is happening right now. No one who wants to stay ahead of the curve should make another keystroke without reading Ian Ayres’s engrossing and enlightening book.
When the term “big data” first came on the scene, bestselling author Tom Davenport (Competing on Analytics, Analytics at Work) thought it was just another example of technology hype. But his research in the years that followed changed his mind.
Now, in clear, conversational language, Davenport explains what big data means—and why everyone in business needs to know about it. Big Data at Work covers all the bases: what big data means from a technical, consumer, and management perspective; what its opportunities and costs are; where it can have real business impact; and which aspects of this hot topic have been oversold.
This book will help you understand:
• Why big data is important to you and your organization
• What technology you need to manage it
• How big data could change your job, your company, and your industry
• How to hire, rent, or develop the kinds of people who make big data work
• The key success factors in implementing any big data project
• How big data is leading to a new approach to managing analytics
With dozens of company examples, including UPS, GE, Amazon, United Healthcare, Citigroup, and many others, this book will help you seize all opportunities—from improving decisions, products, and services to strengthening customer relationships. It will show you how to put big data to work in your own organization so that you too can harness the power of this ever-evolving new resource.
SQLite is a small, embeddable, SQL-based, relational database management system. It has been widely used in low- to medium-tier database applications, especially in embedded devices. This book provides a comprehensive description of SQLite database system. It describes design principles, engineering trade-offs, implementation issues, and operations of SQLite.
In All You Can Pay, Anna Bernasek and D.T. Mongan show how companies use what they know about you to determine how much you are willing to pay for certain products and services. Colleges calculate the price you pay based on the information revealed in the application almost all parents submit for federal aid. Hotels, sports events and health products and services are also using this strategy. The price of everything online—from airline tickets to toilet paper—now fluctuates from moment to moment. Through a toxic combination of price discrimination and cutting-edge technology, sellers can instantly change the price they charge an individual based on their calculations of demand and supply at that point in time. Online stores use your zip code to charge you a different price from someone in another zip code.
Bernasek and Mongan offer a dire warning and demonstrate how big data threatens the very icon of the American way: the free market. The ability to understand consumers on a granular level, in real time, and simultaneously to customize the price each person is offered, shifts the balance of power away from the consumer so dramatically that the freedom of markets is at risk. The trend is alarming and, if left unchecked, the destination is clear. Yet consumers and companies can still choose a different path, and in this chilling and illuminating book, Bernasek and Mongan show us how.
* Completely updated with coverage of all core security principles
* Course text for the Certified Protection Officer (CPO) Program
* Includes all new sections on information security, terrorism awareness, and first response during crises
Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter
In Data Driven, Thomas Redman, the "Data Doc," shows how to leverage and deploy data to sharpen your company's competitive edge and enhance its profitability. The author reveals:
· The special properties that make data such a powerful asset
· The hidden costs of flawed, outdated, or otherwise poor-quality data
· How to improve data quality for competitive advantage
· Strategies for exploiting your data to make better business decisions
· The many ways to bring data to market
· Ideas for dealing with political struggles over data and concerns about privacy rights
Your company's data is a key business asset, and you need to manage it aggressively and professionally. Whether you're a top executive, an aspiring leader, or a product-line manager, this eye-opening book provides the tools and thinking you need to do that.
Updates include 14 new chapters, 3 completely revised chapters, "Student Performance Objectives" in each chapter, and added information on related resources (both print and online).
* Completion of the Security Supervision and Management Program is the initial step toward the Certified in Security Supervision and Management (CSSM) designation
* Over 40 experienced security professionals contribute chapters in their area of specialty
* Revised throughout, and completely updated with 14 new chapters on topics such as Leadership, Homeland Security, Strategic Planning and Management, Budget Planning, Career Planning, and much more.
* Quizzes at the end of each chapter allow for self testing or enhanced classroom work
This book includes primary texts, reader-friendly expository explanations, and sample discussion questions. Prior knowledge of the law is not necessary in order to use and understand this book. The contents are organized into 13 substantive chapters plus two additional chapters with problem sets, making the book especially easy to use for a separate course focused on law. The book leads students through the process of understanding both what the law requires and how to analyze issues for which there is no clear legal answer. It features materials on such critical issues as how to judge the extent of Constitutional authority for government to intervene in the lives and property of American citizens. At the same time, it also captures bread-and-butter issues such as responder liability and disaster relief methods. No other book brings these components together in a logically organized, step by step fashion. The book also features case studies of high-risk scenarios including pandemic flu, together with charts and text boxes for clarification.
This book will be of interest to graduate and undergraduate students studying the major legal principles underlying emergency management and homeland security policy and operations; professionals in EM and HS; and private-sector risk managers.* Features case studies of high-risk scenarios including pandemic flu
* Offers extensive analysis of legal issues from a distinguished scholar, together with charts and text boxes for clarification
* Teaches readers how to think about issues crucial to the life and liberty of US citizens, including the limits of constitutional authority
Master Oracle Database 11g fundamentals quickly and easily. Using self-paced tutorials, this book covers core database essentials, the role of the administrator, high availability, and large database features. Oracle Database 11g: A Beginner's Guide walks you, step by step, through database setup, administration, programming, backup, and recovery. In-depth introductions to SQL and PL/SQL are included. Designed for easy learning, this exclusive Oracle Press guide offers:Core Concepts--Oracle Database 11g topics presented in logically organized chapters Critical Skills--Lists of specific skills covered in each chapter Projects--Practical exercises that show how to apply the critical skills learned in each chapter Progress Checks--Quick self-assessment sections to check your progress Notes--Extra information related to the topic being covered Mastery Checks--Chapter-ending quizzes to test your knowledge
Updated for the latest versions of this popular database, this edition covers many complex features that have been added to MySQL 5.0 and 5.1, including a section dedicated to stored procedures and triggers. After a brief introduction on installation and initial setup, the book explains: How to configure MySQL, such as setting the root passwordMySQL data types, including numerics, strings, dates, and complex typesSQL syntax, commands, data types, operators, and functionsArithmetic, comparison and logical operatorsAggregate and general functionsStored procedures and triggers, including procedure definition, procedure calls, procedure management, cursors, and triggersYou don't have time to stop and thumb through an exhaustive reference when you're hard at work. This portable and affordable guide is small enough to fit into your pocket, and gives you a convenient reference that you can consult anywhere. When you reach a sticking point and need to get to a solution quickly, the MySQL Pocket Reference is the book you want to have.
Crystal Reports 2008 For Dummies is a quick and easy guide to get you going with the latest version of this bestselling report-writing software. In fact, it’s so popular that previous editions have made it a bestseller too. Crystal Reports 2008 For Dummies gives you just what you should know to produce the reports you’ll need most often, including how to:Pull specific information from your database, sort and group it, and find the details you need Use dynamic or cascading prompts Troubleshoot and print reports and save time with templates View reports on your LAN Write formulas to retrieve specific information Create and update OLAP reports Format reports, control page breaks, and even add graphics or Flash files Enhance your reports with charts and maps Use Crystal Reports in the enterprise
There’s also a companion Web site with sample reports from the book and links to sites with more related information. With Crystal Reports 2008 For Dummies by your side, you’ll soon be able to create reports from simple to spectacular, whenever the need arises.
The perspective of the book is from the top down: looking at the overall architecture and then delving into the issues underlying the components. This allows people who are building or using a data warehouse to see what lies ahead and determine what new technology to buy, how to plan extensions to the data warehouse, what can be salvaged from the current system, and how to justify the expense at the most practical level. This book gives experienced data warehouse professionals everything they need in order to implement the new generation DW 2.0.
It is designed for professionals in the IT organization, including data architects, DBAs, systems design and development professionals, as well as data warehouse and knowledge management professionals.* First book on the new generation of data warehouse architecture, DW 2.0.
* Written by the "father of the data warehouse", Bill Inmon, a columnist and newsletter editor of The Bill Inmon Channel on the Business Intelligence Network.
* Long overdue comprehensive coverage of the implementation of technology and tools that enable the new generation of the DW: metadata, temporal data, ETL, unstructured data, and data quality control.
It presents proven strategies to prevent and reduce incidents of loss due to legal issues, theft and other crimes, fire, accidental or intentional harm from employees as well as the many ramifications of corporate mismanagement. It contains a brand new terrorism chapter, along with coverage on background investigations, protection of sensitive information, internal threats, and considerations at select facilities (nuclear, DoD, government and federal). Author Philip Purpura once again demonstrates why students and professionals alike rely on this best-selling text as a timely, reliable resource.
This book is an ideal resource for criminal justice and security academic programs, physical security professionals, retail security professionals, security managers, security consultants, law enforcement professionals, investigations professionals, risk and contingency planning professionals.- Covers the latest professional security issues surrounding Homeland Security and risks presented by threats of terrorism
- Recommended reading for ASIS International's prestigious CPP Certification
- Cases provide real-world applications
Each chapter presents a self-contained lesson on a key SQL concept or technique, with numerous illustrations and annotated examples. Exercises at the end of each chapter let you practice the skills you learn. With this book, you will:Move quickly through SQL basics and learn several advanced featuresUse SQL data statements to generate, manipulate, and retrieve dataCreate database objects, such as tables, indexes, and constraints, using SQL schema statementsLearn how data sets interact with queries, and understand the importance of subqueriesConvert and manipulate data with SQL's built-in functions, and use conditional logic in data statements
Knowledge of SQL is a must for interacting with data. With Learning SQL, you'll quickly learn how to put the power and flexibility of this language to work.
* Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network
"Uniting the Virtual Workforce offers much-needed guidance on how to navigate the largely unmapped territory of virtual work environments in the global economy. The authors do an outstanding job of presenting how organizations should address the challenges of virtual workforces so as to reap the huge potential benefits of increased growth, productivity, and innovation."
-C. Warren Axelrod, PhD, Chief Privacy Officer and Business Information Security Officer, U.S. Trust, and author of Outsourcing Information Security
"Lojeski and Reilly bring us something that readers of business books so rarely get-no nonsense practical guidance on how to manage distance, especially where it most often serves as an impediment to working effectively.Ê If you interface with widely dispersed team members who rarely see one another and communicate by virtue of impersonal electronics, you may expect to find this book provocative, counterintuitive, and above all, exciting. It gives all of us who have to struggle, while working with talent stretched across distance, hope, that maybe there are ways to do this right!"
-Patrick J. McKenna, author of First Among EqualsÊ
"A must-read for global corporate executives who manage geographically dispersed job sharing teams. Practical strategies for preventing productivity loss and optimizing innovation. The authors pull no punches in showing the real downsides to the virtual work phenomenon; they have done a great service for us all."
-Jeff Saperstein, author of Creating Regional Wealth in the Innovation Economy
"Uniting the Virtual Workforce charts the course for competing in the twenty-first century by tapping into the powers of virtual work. Any manager who ignores the virtual workforce is underperforming, and any company or organization that does not appreciate virtual work is already at a competitive disadvantage. Karen and Dick have tapped into a key ingredient in the recipe for global growth."
-Jerry MacArthur Hultin, President, Polytechnic University, and former Under Secretary of the Navy
"Authors Sobel Lojeski and Reilly have provided a useful primer for the harried executive striving for productivity improvements while seeing the workload expand and the workforce disperse. Using conceptual definitions of Physical, Operational, and Affinity Distance to describe the multifaceted dimensions of building teams of people to work effectively together, the authors construct a very powerful set of metrics for a manager to improve the capability of his or her workgroup, no matter where it resides or how it is composed. The book is rich in anecdotes and specific studies that illustrate the concepts in an engaging, pertinent, and easy-to-understand manner. In an age of outsourcing, offshoring, and decentralizing groups of people who have to get things done together, reading this small book will repay itself many times over."
-Charles House, Director, Media X Lab at Stanford University, and former Director of the Societal Impact of Technology, Intel Corporation
—Jeff Lenamon, CIBC World Markets
Updated edition with exciting new Access 2007 features!
Harness the power of Access 2007 with the expert guidance in this comprehensive reference. Beginners will appreciate the thorough attention to database fundamentals and terminology. Experienced users can jump right into Access 2007 enhancements like the all-new user interface and wider use of XML and Web services. Each of the book's six parts thoroughly focuses on key elements in a logical sequence, so you have what you need, when you need it. Designed as both a reference and a tutorial, Access 2007 Bible is a powerful tool for developers needing to make the most of the new features in Access 2007.Build Access tables using good relational database techniques Construct efficient databases using a five-step design method Design efficient data-entry and data display forms Utilize the improved Access report designer Use Visual Basic(r) for Applications and the VBA Editor to automate applications Build and customize Access 2007 ribbons Seamlessly exchange Access data with SharePoint(r) Employ advanced techniques such as the Windows(r) API and object-oriented programming Add security and use data replication in your Access applications
What's on the CD-ROM?
Follow the examples in the book chapter by chapter using the bonus materials on the CD-ROM. You'll find separate Microsoft Access database files for each chapter and other working files, includingAll the examples and databases used in the book, including database files, images, data files in various formats, and icon files used in the book's examples A complete sample application file, including queries, reports, objects, and modules, that you can use as a reference
See the CD-ROM appendix for details and complete system requirements.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
most complex database environments. The provided examples and sample code provide plenty of hands-on opportunities to learn more about SQL Server and create your own viable solutions.
Four leading SQL Server experts present deep practical insights for administering SQL Server, analyzing and optimizing queries, implementing data warehouses, ensuring high availability, tuning performance, and much more. You will benefit from their behind-the-scenes look into SQL Server, showing what goes on behind the various wizards and GUI-based tools. You’ll learn how to use the underlying SQL commands to fully unlock the power and capabilities of SQL Server.
Writing for all intermediate-to-advanced-level SQL Server professionals, the authors draw on immense production experience with SQL Server. Throughout, they focus on successfully applying SQL Server 2014’s most powerful capabilities and its newest tools and features.
Detailed information on how to…
The important stuff you need to know:Dive into relational data. Solve problems quickly by connecting and combining data from different tables.Create professional documents. Publish reports, charts, invoices, catalogs, and other documents with ease.Access data anywhere. Use FileMaker Go on your iPad or iPhone—or share data on the Web.Harness processing power. Use new calculation and scripting tools to crunch numbers, search text, and automate tasks.Run your database on a secure server. Learn the high-level features of FileMaker Pro Advanced.Keep your data safe. Set privileges and allow data sharing with FileMaker’s streamlined security features.
–Charles Carr, Reviews Editor, ComputorEdge Magazine
Create Forms for Business
Ensure Data Entry Accuracy
Build Elegant Form Interfaces
Collect Data Via Email
Design Effective Business Reports
Make an Invoice Report
Create Mailing Labels
Work with Multiple Tables
Develop your Microsoft Access expertise instantly with proven techniques
Let’s face it: Microsoft Access is a large, intimidating program. Most people never progress beyond creating simple tables and using wizards to build basic forms and reports. At the same time, you need information and you know that what you seek is embedded somewhere in your Access database. Without a more sophisticated knowledge of how to extract and present that data, you’re forced to rely on office gurus and overworked IT people to provide canned reports or one-size-fits-all solutions.
This book changes all that by giving you the skills to build efficient front-ends for data (forms), publish the results in an attractive and easy-to-read format (reports), and extract the data you need (queries). This book shuns the big Access picture and instead focuses intently on forms, reports, and queries. This in-depth approach will give you the knowledge and understanding you need to get at the data and prove the old saw that knowledge is power.
· Focuses on the three technologies that you must master to get the most out of Access: forms, reports, and queries.
· Avoids database theory in favor of practical know-how that you can put to use right away.
· Packed full of real-world examples and techniques to help you learn and understand the importance of each section.
· Covers what’s new and changed in Microsoft Access 2007.
Part I: Creating Forms
Chapter 1 Creating and Using a Form
Chapter 2 Working with Form Controls
Chapter 3 Designing Forms for Efficient and Accurate Data Entry
Chapter 4 Designing Forms for Business Use
Chapter 5 Creating Specialized Forms
Part II: Designing and Customizing Reports
Chapter 6 Creating and Publishing a Report
Chapter 7 Designing Effective Business Reports
Chapter 8 Designing Advanced Reports
Chapter 9 Creating Specialized Reports
Part III: Creating Powerful Queries
Chapter 10 Creating a Basic Query
Chapter 11 Building Criteria Expressions
Chapter 12 Working with Multiple-Table Queries
Chapter 13 Creating Advanced Queries
Chapter 14 Creating PivotTable Queries
Chapter 15 Querying with SQL Statements
It includes new coverage throughout of terrorism as it relates to cargo and travel security, potential areas of attack and target hardening techniques, and the use of current technologies to combat new threats.
The book begins with a new chapter on the development of Homeland Security in the United States. Traditional physical and guard security is covered in addition to advances in the electronic and computer security areas, including biometric security, access control, CCTV surveillance advances, as well as the growing computer security issues of identity theft and computer fraud.
The Seventh Edition provides the most comprehensive breakdown of security issues for the student while detailing the latest trends, legislation, and technology in the private and government sectors for real-world application in students' future careers. As the definitive resource for anyone entering or currently working in the security industry, this book will also benefit law enforcement personnel, security consultants, security managers, security guards and other security professionals, and individuals responsible for Homeland Security.* Examines the attacks of September 11th, 2001 and the lasting impact on the security industry
* Expanded figures and photographs support new coverage of emerging security issues
* Recommended reading for the American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) and Physical Security Professional (PSP) exams
In The Art of SQL, author and SQL expert Stephane Faroult argues that this "safe approach" only leads to disaster. His insightful book, named after Art of War by Sun Tzu, contends that writing quick inefficient code is sweeping the dirt under the rug. SQL code may run for 5 to 10 years, surviving several major releases of the database management system and on several generations of hardware. The code must be fast and sound from the start, and that requires a firm understanding of SQL and relational theory.
The Art of SQL offers best practices that teach experienced SQL users to focus on strategy rather than specifics. Faroult's approach takes a page from Sun Tzu's classic treatise by viewing database design as a military campaign. You need knowledge, skills, and talent. Talent can't be taught, but every strategist from Sun Tzu to modern-day generals believed that it can be nurtured through the experience of others. They passed on their experience acquired in the field through basic principles that served as guiding stars amid the sound and fury of battle. This is what Faroult does with SQL.
Like a successful battle plan, good architectural choices are based on contingencies. What if the volume of this or that table increases unexpectedly? What if, following a merger, the number of users doubles? What if you want to keep several years of data online? Faroult's way of looking at SQL performance may be unconventional and unique, but he's deadly serious about writing good SQL and using SQL well. The Art of SQL is not a cookbook, listing problems and giving recipes. The aim is to get you-and your manager-to raise good questions.
The #1 Easy, Commonsense Guide to Database Design! Michael J. Hernandez’s best-selling Database Design for Mere Mortals® has earned worldwide respect as the clearest, simplest way to learn relational database design. Now, he’s made this hands-on, software-independent tutorial even easier, while ensuring that his design methodology is still relevant to the latest databases, applications, and best practices. Step by step, Database Design for Mere Mortals ® , Third Edition, shows you how to design databases that are soundly structured, reliable, and flexible, even in modern web applications. Hernandez guides you through everything from database planning to defining tables, fields, keys, table relationships, business rules, and views. You’ll learn practical ways to improve data integrity, how to avoid common mistakes, and when to break the rules.
Understanding database types, models, and design terminology
Discovering what good database design can do for you—and why bad design can make your life miserable
Setting objectives for your database, and transforming those objectives into real designs
Analyzing a current database so you can identify ways to improve it
Establishing table structures and relationships, assigning primary keys, setting field specifications, and setting up views
Ensuring the appropriate level of data integrity for each application
Identifying and establishing business rules
Whatever relational database systems you use, Hernandez will help you design databases that are robust and trustworthy. Never designed a database before? Settling for inadequate generic designs? Running existing databases that need improvement? Start here.
After reading this book, you will be able to design the overall architecture for functioning business intelligence systems with the supporting data warehousing and data-integration applications. You will have the information you need to get a project launched, developed, managed and delivered on time and on budget – turning the deluge of data into actionable information that fuels business knowledge. Finally, you’ll give your career a boost by demonstrating an essential knowledge that puts corporate BI projects on a fast-track to success.Provides practical guidelines for building successful BI, DW and data integration solutions. Explains underlying BI, DW and data integration design, architecture and processes in clear, accessible language.Includes the complete project development lifecycle that can be applied at large enterprises as well as at small to medium-sized businesses Describes best practices and pragmatic approaches so readers can put them into action. Companion website includes templates and examples, further discussion of key topics, instructor materials, and references to trusted industry sources.
Create and deliver data-rich reports across the enterprise using this complete server-based reporting solution. Written by a member of the original Reporting Services development team, Microsoft SQL Server 2008 Reporting Services covers the entire report-building and distribution process, including data extraction, integration with desktop and Web applications, and end-user access. The book explains how to maximize all of the powerful features, including the new Tablix data format, as well as enhanced performance, scalability, and visualization capabilities.Install, configure, and customize SQL Server 2008 Reporting Services Create SELECT queries to extract data Generate reports from the Report Wizard and from scratch Add charts, images, and gauges Build reusable report templates Use the new Tablix data format to create reports with any structure Export reports to Word, Excel, PDF, HTML, XML, and other formats Enable end-user access to reports via the Report Server and its Report Manager web interface
This book is a guide for the savvy manager who wants to capitalize on this technological revolution. It begins with a high-level example of how an average person might interact with a service-oriented architecture, and progresses to more detail, discussing technical forces driving adoption and how to manage technology, culture and personnel issues that can arise during adoption. An extensive reference section provides quick access to commonly used terms and concepts.Broad, non-technical explanation of a technical topic for managers at all levelsOnly web services book to cover data management and software engineering perspectives; excellent resource for all members of IT teamsProvides a set of leadership principles and suggested applications for using this technology
This updated second edition provides guidance for database developers, advanced configuration for system administrators, and an overview of the concepts and use cases for other people on your project. Ideal for NoSQL newcomers and experienced MongoDB users alike, this guide provides numerous real-world schema design examples.Get started with MongoDB core concepts and vocabularyPerform basic write operations at different levels of safety and speedCreate complex queries, with options for limiting, skipping, and sorting resultsDesign an application that works well with MongoDBAggregate data, including counting, finding distinct values, grouping documents, and using MapReduceGather and interpret statistics about your collections and databasesSet up replica sets and automatic failover in MongoDBUse sharding to scale horizontally, and learn how it impacts applicationsDelve into monitoring, security and authentication, backup/restore, and other administrative tasks
Squeeze maximum performance and efficiency from every T-SQL query you write or tune. Four leading experts take an in-depth look at T-SQL’s internal architecture and offer advanced practical techniques for optimizing response time and resource usage. Emphasizing a correct understanding of the language and its foundations, the authors present unique solutions they have spent years developing and refining. All code and techniques are fully updated to reflect new T-SQL enhancements in Microsoft SQL Server 2014 and SQL Server 2012.
Write faster, more efficient T-SQL code:
Move from procedural programming to the language of sets and logic Master an efficient top-down tuning methodology Assess algorithmic complexity to predict performance Compare data aggregation techniques, including new grouping sets Efficiently perform data-analysis calculations Make the most of T-SQL’s optimized bulk import tools Avoid date/time pitfalls that lead to buggy, poorly performing code Create optimized BI statistical queries without additional software Use programmable objects to accelerate queries Unlock major performance improvements with In-Memory OLTP Master useful and elegant approaches to manipulating graphs
About This Book
For experienced T-SQL practitioners Includes coverage updated from Inside Microsoft SQL Server 2008 T-SQL Querying and Inside Microsoft SQL Server 2008 T-SQL Programming Valuable to developers, DBAs, BI professionals, and data scientists Covers many MCSE 70-464 and MCSA/MCSE 70-461 exam topics
Detailing the hows and the whys of successful Essbase implementation, the book arms you with simple yet powerful tools to meet your immediate needs, as well as the theoretical knowledge to proceed to the next level with Essbase. Infrastructure, data sourcing and transformation, database design, calculations, automation, APIs, reporting, and project implementation are covered by subject matter experts who work with the tools and techniques on a daily basis. In addition to practical cases that illustrate valuable lessons learned, the book offers:
Undocumented Secrets—Dan Pressman describes the previously unpublished and undocumented inner workings of the ASO Essbase engine. Authoritative Experts—If you have questions that no one else can solve, these 12 Essbase professionals are the ones who can answer them. Unpublished—Includes the only third-party guide to infrastructure. Infrastructure is easy to get wrong and can doom any Essbase project. Comprehensive—Let there never again be a question on how to create blocks or design BSO databases for performance—Dave Farnsworth provides the answers within. Innovative—Cameron Lackpour and Joe Aultman bring new and exciting solutions to persistent Essbase problems.
With a list of contributors as impressive as the program of presenters at a leading Essbase conference, this book offers unprecedented access to the insights and experiences of those at the forefront of the field. The previously unpublished material presented in these pages will give you the practical knowledge needed to use this powerful and intuitive tool to build highly useful analytical models, reporting systems, and forecasting applications.
The book contains 12 units and 45 chapters. Written by leading security educators, trainers and consultants, it has served as the authoritative text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development. The book concludes with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.
This will be an ideal reference for security students and CPO candidates.Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development.Concludes chapters with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.Written by a cross-disciplinary contributor team consisting of top experts in their respective fields.
There is no other book like this on the market. All FileMaker books include information on calculation formulas, scripting, etc., but none have expressly focused on giving readers one simple thing: a quick reference to be used in conjunction with their programming efforts. Some books teach, others explain, still others explore specific in-depth topics. This book will appeal to the entire FileMaker Pro community and be a great extension of their library. This edition is updated for the many new features coming with FileMaker 12, including the product's design functionality and the file format, and a new section dedicated to FileMaker Go, which is the iOS client.