Welcome to the "PostgreSQL 8.4 Official Documentation - Volume III. Server Programming"! After many years of development, PostgreSQL has become feature-complete in many areas. This release shows a targeted approach to adding features (e.g., authentication, monitoring, space reuse), and adds capabilities defined in the later SQL standards.
Welcome to the "PostgreSQL 8.4 Official Documentation - Volume II. Server Administration"! After many years of development, PostgreSQL has become feature-complete in many areas. This release shows a targeted approach to adding features (e.g., authentication, monitoring, space reuse), and adds capabilities defined in the later SQL standards.
Welcome to the PostgreSQL 8.4 Official Documentation - Volume I. The SQL Language! After many years of development, PostgreSQL has become feature-complete in many areas. This release shows a targeted approach to adding features (e.g., authentication, monitoring, space reuse), and adds capabilities defined in the later SQL standards.
This book is part of the PostgreSQL 9.0 documentation collection (up-to-date & full), published by Fultus Corporation. PostgreSQL 9.0 includes built-in, binary replication, and over a dozen other major features which will appeal to everyone from web developers to database hackers.
This book is part of the PostgreSQL 9.0 documentation collection (up-to-date & full), published by Fultus Corporation. PostgreSQL 9.0 includes built-in, binary replication, and over a dozen other major features which will appeal to everyone from web developers to database hackers.
This book is for moderate to advanced PostgreSQL database professionals who wish to extend PostgreSQL, utilizing the most updated features of PostgreSQL 9.4. For a better understanding of this book, familiarity with writing SQL, a basic idea of query tuning, and some coding experience in your preferred language is expected.
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book will help you: Plan and design incident response, disaster recovery, compliance, and physical security Learn and apply basic penetration-testing concepts through purple teaming Conduct vulnerability management using automated processes and tools Use IDS, IPS, SOC, logging, and monitoring Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Reduce exploitable errors by developing code securely
This value-priced guide by one of the Top 25 Most Influential Women on the Web delivers 250 solutions, workarounds, tips, and annoyance-busters that Web designers won't find anywhere else Offers 500 pages of insider techniques to improve workflow and efficiency, save development time and money, and increase search engine rankings and site traffic, whether designers want to enhance an existing Web site or build a state-of-the-art site from scratch Covers topics such as HTML, XHTML, CSS, graphics and multimedia, cell phone and PDA accessibility, content development, tools, usability, information architecture, globalization, and site redesign Molly Holzschlag is a steering committee member of the Web Standards Project (WaSP) and spokesperson for the World Organization of Webmasters, as well as a frequent lecturer at industry conferences and the author of twenty-five previous books
The Art of UNIX Programming poses the belief that understanding the unwritten UNIX engineering tradition and mastering its design patterns will help programmers of all stripes to become better programmers. This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of "hackers" the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.