Informations
Jump to content

Lorem Ipsum...

Click to Dismiss this Notification
Ładowanie danych...

100%

Administrator
  • Posts

    816
  • Joined

  • Last visited

  • Days Won

    5
  • Donations

    9000.00 USD 
  • Points

    158,851 [ Donate ]
  • Country

    United Kingdom

Everything posted by 100%

  1. 100%

    Linux

    Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to determine the security of the server or network? If you answered yes to these questions, then you have come to the right place. Linux is an operating system used by system administrators and hackers to manage the server or network's security. You can use the operating system to address business demands, including network administration, system administration, and database management. In this book, you will learn more about the different techniques to help you protect the system from a security breach and how you can protect the files and data you have on your system. In this book, you will first learn about how you can use Linux on virtual machines. You will also learn about the different tools you can use to harden the network and server's security. You will learn about the different permissions and accesses and how you can use it to enhance the security of setting the security. You will also learn about how you can perform a penetration test, or an ethical hack, to scan the system and see what you can do to improve the settings. Over the course of this book, you will discover how to: Installing Linux on your system and accessing it using a virtual machine Secure user accounts using passwords and ACLs Secure the server using a firewall and other methods Learn to decrypt and encrypt data sent over the network Explore various methods to prevent hackers from accessing information in your system Perform tests to identify any vulnerabilities in the network and server, and more! If you are eager to learn more about Linux, grab a copy of this book today!
  2. 100%

    Linux

    If you are looking for a complete guide on how to install, configure, and use Linux as operating system, and a simple, step-by-step method for becoming a hacker, then keep reading... 4 Books in 1! This Book Includes: Linux for Beginners Linux for Hackers Hacking with Linux Hacking with Kali Linux Linux is a free and freely distributed operating system inspired by the UNIX system, written by Linus Torvalds with the help of thousands of programmers. Unlike other operating systems, such as MacOS (Apple operating system), UNIX is not intended to be easy to use, but to be extremely flexible. It is generally as easy to use as other operating systems, although great efforts are being made to facilitate its use. This operating system is an option to be taken into account by those users who are dedicated to work through networks, devote to programming, or learn hacking techniques. Especially for hackers, Linux is the best operating system on the market because it allows to perform a wide variety of tasks and transform your computer into an incredible hacking machine. Learn the hacking skills requires time. However, everything is possible with the correct guide and a lot of useful information. If you are ready to learn how to hack with Linux, then this book is your best bet. This is a detailed guide to learn all the principles of hacking and how to turn your Linux system into an unstoppable machine! You'll learn: Basic system concepts How to understand the user interface How to handle possible mistakes and errors How the operating system architecture works Basics of Linux and Hacking How to use Linux commands The correct hacking procedure Web and network hacking tools Ethical and unethical parts of hacking The hierarchy of hackers How to prevent cyber-attacks and malwares Cyber-security and cryptography Why is Kali Linux the best option for every hacker And much more Even if you are a complete beginner on programming this book will give you the correct information to understand the subject and start practicing today! As you reach the end of the book, you shall have a clearer picture of how the working environment works. The book has clear, simple explanations that can be easy to understand and thus, your journey towards learning how to hack shall be simplified. Start your journey! Develop underground hacking skills and turn your Linux system into a powerful, unbreakable, and unstoppable machine! Get This Book Today, Scroll Up and Click the Buy Now Button!
  3. 100%

    Linux

    If you are ready to harness the amazing power of the Linux operating system and master the best-kept hacking secrets with Kali Linux, then keep reading... Are you a programmer looking for the perfect way to get started with Linux, but don't know where to start? Do you want to go beyond the basics and become a Linux power user with well-developed skills in hacking, cybersecurity and penetration testing? If you answered yes to any of these questions, then this book is for you. In this book, you're going to discover why Linux is the information security professional's platform of choice, as well as master the industrial-grade Kali Linux distro that will get you started on penetrating networks, exploiting systems, breaking into computers and more. Here what you're going to discover in this primer guide to programming for Linux Everything you need to know about Linux-history, origin, variants/distribution (distros) and uses Step-by-step instructions to set up and install Debian/GNU Linux How to use the crontab command to configure Linux Adding a graphical user interface to make Linux easier to navigate How to install your first few useful software on Linux using the command line How to navigate with Linux and access various files and software Why learning the command line is one of the most useful computer skills to have How to master the Linux command-line tool or terminal List of commands that will help you navigate your computer using the Linux terminal Awesome alternatives to some popular Windows software ...and much more! Here's a preview of what you're going to learn in Hacking with Kali Linux What being a "hacker" really means and the four types of hackers in today's cyberspace A high-level overview of how hacking really works and how attackers cover their tracks Why Kali Linux is the perfect operating system platform of choice if you want to become a hacker Step-by-step instructions to install and set up Kali Linux with images 6 indispensable tools every modern hacker needs to have in their toolbox How to choose the best programming languages to learn as a newbie hacker How ethical and black hat hackers carry out reconnaissance and sniff out weaknesses in a computer network Surefire ways to protect your computer system and network from malicious attacks ...and tons more! Whether you're completely new to the Linux ecosystem or you're a seasoned programmer looking for the perfect way to get your feet wet with hacking and penetration testing, there is something in the pages of this bundle for you. Scroll to the top of the page and click the "Buy Now" button to start your hacking adventures today!
  4. 100%

    Linux

    Do you want to learn how to master Linux, but don't know where to begin and are pressed for time? Are you interested in moving beyond the graphical user interface and becoming a Linux power user? If you answered yes to any of these, you've come to the right place. If you want to discover how to use the all-powerful Linux operating system, uncover the depths of the command line and level up your programming career, then keep reading... Linux might not be a platform of choice for desktop and personal computers, but it is one beast of an operating system and powers over 90% of the world's technology infrastructure from supercomputers to high-capacity servers and billions of Android smartphones. You can see why it makes sense to master this highly underrated operating system--in the personal computing world at least. In this guide, you're going to learn how to gain mastery of Linux--from the graphical user interface to the command-line interface--in a gradual systematic way, as well as fundamental and advanced concepts to take your Linux programming skills to the next level. Here what you're going to discover in this primer guide to programming for Linux: Everything you need to know about Linux--history, origin, variants/distribution (distros) and uses Step-by-step instructions to set up and install Debian/GNU Linux How to use the crontab command to configure Linux Adding a graphical user interface to make Linux easier to navigate How to install your first few useful software on Linux using the command line How to navigate with Linux and access various files and software Why learning the command line is one of the most useful computer skills to have How to master the Linux command line tool or terminal List of commands that will help you navigate your computer using the Linux terminal Awesome alternatives to some popular Windows software ...and much more! Whether you're a novice that wants to get up to speed using Linux or you're a power user looking for a reference guide with tips to help you become more productive, this book contains everything you need to know to use Linux to its utmost capability. Scroll up right now and click the "Buy Now" button to get started with Linux today!
  5. 8 mini books chock full of Linux! Inside, over 800 pages of Linux topics are organized into eight task-oriented mini books that help you understand all aspects of the latest OS distributions of the most popular open-source operating system in use today. Topics include getting up and running with basics, desktops, networking, internet services, administration, security, scripting, Linux certification, and more. This new edition of Linux All-in-One For Dummies has a unique focus on Ubuntu, while still including coverage of Debian, Red Hat, SuSE, and others. The market is looking for administrators, and part of the qualifications needed for job openings is the authentication of skills by vendor-neutral third parties (CompTIA/Linux Professional Institute)—and that’s something other books out there don’t address. Install and configure peripherals, software packages, and keep everything current Connect to the internet, set up a local area network (including a primer on TCP/IP, and managing a local area network using configuration tools and files) Browse the web securely and anonymously Get everything you need to pass your entry-level Linux certification exams This book is for anyone getting familiar with the Linux OS, and those looking for test-prep content as they study for the level-1 Linux certification!
  6. 100%

    Linux

    Do You Want to Master The Linux Operating System? Would You Like to Start Leveraging The Command Line System Fast and Easily? If your answer yes, but you have no programming experience, then this book will provide the basic knowledge and tools you need to become successful programmer with Linux Operating System! As an operating system, Linux is very efficient and has an excellent design. It is multitasking, multi-user, multi-platform and multiprocessor; on Intel platforms run in protected mode. It protects the memory so that a program cannot bring down the rest of the system. It loads only the parts of a program that are used and shares memory between programs increasing speed and decreasing memory usage. In The Linux Programming Bible, you'll discover everything you need to know to master shell scripting and make informed choices about the elements you employ. Here is what you'll learn from this groundbreaking book- Step-by-step instructions to set up and install Debian/GNU Linux Install virtual machines All about the Shell The Linux Directory Structure Write scripts that use AWK to search and reports on log files All the Linux commands you'll use most often Directory Hierarchy How to install your first few useful software on Linux System Configuration the Structure of /etc Environment Variables And Much More! This book is for anyone getting familiar with the Linux OS, and those looking for test-prep content as they study for the level-1 Linux certification! Whether you're a novice that wants to get up to speed using Linux or you're a power user looking for a reference guide with tips to help you become more productive faster than you could have imagined. Click the "Buy Now" button to get started with Linux right away!
  7. One in five small businesses fall victim to cybercrime each year. Cybercrime costs the global economy billions of dollars each year and is expected to continue to rise because small businesses are considered low-hanging fruit and easy prey for criminals. Inside You'll find practical, cost-effective ways to protect you, your clients' data, and your reputation from hackers, ransomware and identity thieves. You'll learn: -The truth about Windows updates and software patches -The 7 layers of security every small business must have -The top 10 ways hackers get around your firewall and anti-virus software -46 security tips to keep you safe and more.
  8. Print Textbook & Virtual Security Cloud Lab Access: 180-day subscription. Please confirm the ISBNs used in your course with your instructor before placing your order; your institution may use a custom integration or an access portal that requires a different access code. Fully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, Second Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization's network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
  9. Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your network Key Features Explore pfSense, a trusted open source network security solution Configure pfSense as a firewall and create and manage firewall rules Test pfSense for failover and load balancing across multiple WAN connections Book Description While connected to the internet, you're a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or 'shield') between your computer and cyberspace. pfSense is highly versatile firewall software. With thousands of enterprises using pfSense, it is fast becoming the world's most trusted open source network security solution. Network Security with pfSense begins with an introduction to pfSense, where you will gain an understanding of what pfSense is, its key features, and advantages. Next, you will learn how to configure pfSense as a firewall and create and manage firewall rules. As you make your way through the chapters, you will test pfSense for failover and load balancing across multiple wide area network (WAN) connections. You will then configure pfSense with OpenVPN for secure remote connectivity and implement IPsec VPN tunnels with pfSense. In the concluding chapters, you'll understand how to configure and integrate pfSense as a Squid proxy server. By the end of this book, you will be able to leverage the power of pfSense to build a secure network. What you will learn Understand what pfSense is, its key features, and advantages Configure pfSense as a firewall Set up pfSense for failover and load balancing Connect clients through an OpenVPN client Configure an IPsec VPN tunnel with pfSense Integrate the Squid proxy into pfSense Who this book is for Network Security with pfSense is for IT administrators, security administrators, technical architects, chief experience officers, and individuals who own a home or small office network and want to secure it.
  10. 100%

    Hacking

    In order to understand hackers and protect the network infrastructure you must think like a hacker in today's expansive and eclectic internet and you must understand that nothing is fully secured.Considering that you are preparing to became an Ethical Hacker, IT Security Analyst, IT Security Engineer, or a Cybersecurity Specialist, yet still in doubt and want to know about Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots, you will find this book extremely useful. If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY.The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work. Your reading of this book will boost your knowledge on what is possible in today's hacking world and help you to become an Ethical Hacker aka Penetration Tester.BUY THIS BOOK NOW AND GET STARTED TODAY!IN THIS BOOK YOU WILL LEARN ABOUT: -What is The OSI Model-What are Zone Based Firewalls-Firewall Behavior and TCP State Table-Network Address Translation-Port Address Translation-Demilitarized Zone-TCP & UDP Traffic on Firewalls-Client Connection Process -System Intrusion Indicators-Indicators of Network Intrusion-Anomalous Behaviour-Firewall Implementations & Architectures-Packet Filtering Firewalls-Circuit-level Gateway-Application Firewalls-Stateful Firewalls-Next-Gen Firewalls-Detecting Firewalls-IP address spoofing-Source Routing-Tiny fragment attack-Tunneling-Evasion Tools-Intrusion Detection Systems-Signature-based IDS-Statistical Anomaly-based IDS-Network-Based IDS-Host Intrusion Detection System-Evasion by Confusion-Fragmentation attack-Overlapping Fragments Attack-Time-to-Live attack-DoS Attack & Flooding Attack-IDS weakness Detection-Honeypot Types & Honeypot DetectionBUY THIS BOOK NOW AND GET STARTED TODAY!
  11. In Web Application Firewalls: A Practical Approach, John Stauffacher shares his expertise and the methods he has used for optimizing Web application firewalls throughout his career. This book focuses on a general methodology and then delves into vendor specifics for firewalls such as F5 ASM, Imperva, and the open source tool ModSecurity. Web Application Firewalls provides you with everything you need to understand and properly deploy a Web application firewall (WAF). You'll learn basic methodology and concepts, including the fundamentals of authentication, flows, URLs, cookies, assets, signatures, DDOS mitigation, and Web services inspection. Then, you'll learn about the WAF Lifecycle methodology, including onboarding the application, policy creation, testing, deployment, and verification. The book also offers hands-on product-specific tutorials on popular WAFs. You'll have everything you need to optimize your Web application firewall against any security threat. Presents the only comprehensive overview of Web application firewall methodology, from one of the industry's leading experts on WAF Gives you everything you need to configure, deploy, and optimize your Web application firewall Provides product-specific coverage of all the most popular WAFs, including F5, ModSecurity, and Imperva
  12. Checkpoint Cisco ASA Firewall and Linux Admin Interview Questions And Answers - 3 Books in 1 - 1.Checkpoint Firewall Admin Interview Questions and Answers by Mark Tim2.Answers, Cisco ASA Firewall Interview Q&A by Salsag Gulberg3.Interview Guide for Linux Administrator by Mike RyanHave you ever thought that you could have done the interview a bit better to get your dream job? Interviewing is a game that needs to be played with preparation and confidence. You have to improve your ability to answer with a reason to out stand yourself with others.If you are preparing for an interview Cisco ASA Firewall or Checkpoint Firewall Admin or Linux Admin role, then you would possibly welcome some help with the sorts of questions you may expect to be asked. IT development environment of every organization will be specific. Interviewers count on applicants to have as a minimum 60% to 70% of know-how in line with their organization environment in order that he can be selected and trained further. Each interview will be different, but some common questions will unavoidably be asked. Checkpoint Cisco ASA Firewall and Linux Admin Interview Questions And Answers, which includes 3 books in 1 is a fantastic aid, designed with this in thoughts, and covers the most possible questions that you may be asked in your interview, helping you;-Gain the knowledge to easily face the interview with confidence.-Learn the most likely asked questions and answers.-Precise and Straight to the point.-Ideal for last minute revision.-Gain the knowledge from real time experience.-Anticipate the questions that might be asked and helps you give a heads up.This interview book bundle will help you to be better organized and more able to face your interview with self-confidence with a purpose to be tons favorite.Suitable for beginner stage or intermediate level applicants, these books addresses a number of the typically asked questions that applicants have to assume and put together them for a successful interview and is even helpful for readers after the interview, as a accessible manual for everyday work.Your efforts in preparing the interview will bring a value to your future carrier growth. These books are a good resource to leverage the information to build confidence and win the trust.Get your copy today and take a positive step to next level !
  13. Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. And OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and anti-virus. No network is too insignificant to be spared by an attacker. Even home networks, washing machines, and smartwatches are threatened and require a secure environment. Firewalls are a component of the security concept. They protect against known and new threats to computers and networks. A firewall offers the highest level of protection if its functions are known, its operation is simple, and it is ideally positioned in the surrounding infrastructure. OPNsense accepts the challenge and meets these criteria in different ways. This book is the ideal companion for understanding, installing and setting up an OPNsense firewall. Each chapter explains a real-world situation, describes the theoretical fundamentals, and presents a laboratory experiment for better understanding. Finally, it offers a solution using OPNsense methods and knowledge from a technical background. The chapters are mostly independent of each other, but presented with increasing levels of proficiency. Thus, the topics dealt with are appropriate for beginners to professionals.
  14. 100%

    SQL

    Could your company benefit from the advantages SQL offers? SQL, or Structured Query Language, has been around since the 80s. It has proven to be effective and efficient, making it the ideal solution for your database demands. The best part? You can learn how to program using SQL in just nine chapters.
  15. 100%

    SQL

    Are you thinking about learning SQL, but not sure where to start? That's where databases and SQL come in, providing the means to manage and interpret data easily. SQL is the go-to language for database management.
  16. 100%

    SQL

    Whether you're completely new to programming or you are looking for a new language to expand your skills, you will find this book an invaluable tool for starting and mastering programming in SQL.
  17. 100%

    Learn PHP 8

    Write solid, secure, object-oriented code in the new PHP 8. In this book you will create a complete three-tier application using a natural process of building and testing modules within each tier. This practical approach teaches you about app development and introduces PHP features when they are actually needed rather than providing you with abstract theory and contrived examples. In Learn PHP 8, programming examples take advantage of the newest PHP features; you’ll follow a learn-by-doing approach, which provides you with complete coding examples. “Do It” exercises in each chapter provide the opportunity to make adjustments to the example code. The end-of-chapter programming exercises allow you to develop your own applications using the algorithms demonstrated in the chapter. Each tier is logically and physically separated using object-oriented and dependency injection techniques, thus allowing independent tiers that can be updated with little or no effect on the other tiers. In addition to teaching good programming practices through OOP, there is a strong emphasis on creating secure code. As each chapter is completed, you’ll have the opportunity to design and create an application reinforcing the concepts learned. What You Will Learn Program PHP 8 web applications Use interfaces, containers, and platforms Apply modular programming Manage data objects and use MySQL and other databases Work with multi-functional and secure user interfaces Handle logging exceptions and more Who This Book Is For Those new to web development, specifically PHP programming. Also, this book can be useful to those who have some PHP/web development experience who are new to PHP 8.
  18. Know how locks work in MySQL and how they relate to transactions. This book explains the major role that locks play in database systems, showing how locks are essential in allowing high-concurrency workloads. You will learn about lock access levels and lock granularities from the user level as well as table locks to record and gap locks. Most importantly, the book covers troubleshooting techniques when locking becomes a pain point. Several of the lock types in MySQL have a duration of a transaction. For this reason, it is important to understand how transactions work. This book covers the basics of transactions as well as transaction isolation levels and how they affect locking. The book is meant to be your go-to resource for solving locking contention and similar problems in high-performance MySQL database applications. Detecting locking issues when they occur is the first key to resolving such issues. MySQL Concurrency provides techniques for detecting locking issues such as contention. The book shows how to analyze locks that are causing contention to see why those locks are in place. A collection of six comprehensive case studies combine locking and transactional theory with realistic lock conflicts. The case studies walk you through the symptoms to look for in order to identify which issue you are facing, the cause of the conflict, its analysis, solution, and how to prevent the issue in the future. What You Will Learn Understand which lock types exist in MySQL and how they are used Choose the best transaction isolation level for a given transaction Detect and analyze lock contention when it occurs Reduce locking issues in your applications Resolve deadlocks between transactions Resolve InnoDB record-level locking issues Resolve issues from metadata and schema locks Who This Book Is For Database administrators and SQL developers who are familiar with MySQL and want to gain a better understanding of locking and transactions as well as how to work with them. While some experience with MySQL is required, no prior knowledge of locks and transactions is needed.
  19. Use MySQL Shell, the first modern and advanced client for connecting to and interacting with MySQL. It supports SQL, Python, and JavaScript. That’s right! You can write Python scripts and execute them within the shell interactively, or in batch mode. The level of automation available from Python combined with batch mode is especially helpful to those practicing DevOps methods in their database environments. Introducing MySQL Shell covers everything you need to know about MySQL Shell. You will learn how to use the shell for SQL, as well as the new application programming interfaces for working with a document store and even automating your management of MySQL servers using Python. The book includes a look at the supporting technologies and concepts such as JSON, schema-less documents, NoSQL, MySQL Replication, Group Replication, InnoDB Cluster, and more. MySQL Shell is the client that developers and database administrators have been waiting for. Far more powerful than the legacy client, MySQL Shell enables levels of automation that are useful not only for MySQL, but in the broader context of your career as well. Automate your work and build skills in one of the most in-demand languages. With MySQL Shell, you can do both! What You'll LearnUse MySQL Shell with the newest features in MySQL 8 Discover what a Document Store is and how to manage it with MySQL Shell Configure Group Replication and InnoDB Cluster from MySQL Shell Understand the new MySQL Python application programming interfaces Write Python scripts for managing your data and the MySQL high availability features Who This Book Is For Developers and database professionals who want to automate their work and remain on the cutting edge of what MySQL has to offer. Anyone not happy with the limited automation capabilities of the legacy command-line client will find much to like in this book on the MySQL Shell that supports powerful automation through the Python scripting language.
  20. Design cost-efficient database solutions, scale enterprise operations and reduce overhead business costs with MySQL Key FeaturesExplore the new and advanced features of MySQL 8.0Use advanced techniques to optimize MySQL performanceCreate MySQL-based applications for your enterprise with the help of practical examplesBook Description Advanced MySQL 8 teaches you to enhance your existing database infrastructure and build various tools to improve your enterprise applications and overall website performance. The book starts with the new and exciting MySQL 8.0 features and how to utilize them for maximum efficiency. As you make your way through the chapters, you will learn to optimize MySQL performance using indexes and advanced data query techniques for large queries. You will also discover MySQL Server 8.0 settings and work with the MySQL data dictionary to boost the performance of your database. In the concluding chapters, you will cover MySQL 8.0 Group Replication, which will enable you to create elastic, highly available, and fault-tolerant replication topologies. You will also explore backup and recovery techniques for your databases and understand important tips and tricks to help your critical data reach its full potential. By the end of this book, you’ll have learned about new MySQL 8.0 security features that allow a database administrator (DBA) to simplify user management and increase the security of their multi-user environments. What you will learnExplore new and exciting features of MySQL 8.0Analyze and optimize large MySQL queriesUnderstand MySQL Server 8.0 settingsMaster the deployment of Group Replication and use it in an InnoDB clusterMonitor large distributed databasesDiscover different types of backups and recovery methods for your databasesExplore tips to help your critical data reach its full potentialWho this book is for Advanced MySQL 8 is for database administrators, data architects, and database developers who want to dive deeper into building advanced database applications in the MySQL environment.
  21. Get a comprehensive overview on how to set up and design an effective database with MySQL. This thoroughly updated edition covers MySQL's latest version, including its most important aspects. Whether you're deploying an environment, troubleshooting an issue, or engaging in disaster and recovery, this practical guide provides the insights and tools necessary to take full advantage of this powerful RDBMS. Authors Vinicius Grippa and Sergey Kuzmichev from Percona show developers and DBAs methods for minimizing costs and maximizing availability and performance. You'll learn how to perform basic and advanced querying, monitoring and troubleshooting, database management and security, backup and recovery, and tuning for improved efficiency. This edition includes new chapters on high availability, load balancing, and using MySQL in the cloud. Learning MySQL will help you: Deploy MySQL databases on bare metal, on virtual machines, and in the cloud Design database infrastructures Code highly efficient queries Monitor and troubleshoot MySQL databases Execute efficient backup and restore operations Optimize database costs in the cloud Understand database concepts, especially those pertaining to MySQL
  22. 100%

    MySQL

    If you're a developer, you just can't ignore databases.Databases are the storage of the information that your program will process. From a simple web-app to a world-class corporation, data is inside databases.You have to know how to read, process and handle them.With this practical manual you will learn how to work with SQL databases, with a focus on MySQL.You'll have access to practical examples and discover the basics to start working with these powerful tools. With this book you will learn ... ▸ What is a database and why it is essential for any web project ▸ What are the types of databases and why you need to know MySQL ▸ How to create your development environment on Windows, Mac and Linux ▸ How to create and manage databases ▸ Functions to create and handle tables ▸ How to manage relationships between tables ▸ Sorting and aggregation functions ▸ What is MySQL Workbench and how to use it
  23. Databases are everywhere, from social media and gaming to finance, government, and healthcare. Wrangling data into an organized and easily accessible form is key to unlocking better entertainment, cures for diseases, and reducing crime in our modern world. Through the colorful, unique activities in this volume, readers will learn how to change the world with data using structured query language or SQL and relational databases. These hands-on projects explore how databases are designed and structured, and how to update, change, and use them for analytics.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

spacer.png

Disable AdBlock
The popup will be closed in 5 seconds...