programming4us
programming4us
DATABASE
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >  |  Displaying page 8 of 16, items 281 to 320 of 625.
SQL Server 2005 : Dynamic T-SQL - Supporting Optional Parameters (part 1) - Optional Parameters via Static T-SQL
Before presenting the dynamic SQL solution to the optional parameter problem, a few demonstrations are necessary to illustrate why static SQL is not the right tool for the job. There are a few different methods of varying complexity and effectiveness, but none deliver consistently.
SQL Server 2005 : Dynamic T-SQL - Why Go Dynamic?
Dynamic SQL can help create more flexible data access layers, thereby helping to enable more flexible applications, which makes for happier users.
MySQL for Python : Passing a query to MySQL
We have just seen how to form a query for a generic MySQL session. While that was not particularly difficult, using MySQL for Python is even easier.
MySQL for Python : Forming a query in MySQL
In order to best understand how to submit a query through MySQL for Python, it is important to ensure you understand how to submit a query in MySQL itself. The similarities between the two outnumber the differences, but the first may seem confusing if you don't properly understand the second.
SQL Injection : Platform-Level Defenses - Securing the Database
When an attacker has an exploitable SQL injection vulnerability, he can take one of two primary exploit paths. He can go after the application data itself, which depending on the application and the data could be very lucrative.
SQL Injection : Platform-Level Defenses - Using Runtime Protection (part 2) - Intercepting Filters
Most WAFs implement the Intercepting Filter pattern or include one or more implementations in their overall architecture. Filters are a series of independent modules that you can chain together to perform processing before and after the core processing of a requested resource (Web page, URL, script, etc.).
SQL Injection : Platform-Level Defenses - Using Runtime Protection (part 1) - Web Application Firewalls
The most well-known runtime solution in Web application security is the use of a Web application firewall (WAF). A WAF is a network appliance or software-based solution that adds security features to a Web application. Specifically, we’re focusing on what WAFs can offer in terms of SQL injection protection.
SQL Injection : Code-Level Defenses - Designing to Avoid the Dangers of SQL Injection
One design technique that can prevent or mitigate the impact of SQL injection is to design the application to exclusively use stored procedures for accessing the database.
SQL Injection : Code-Level Defenses - Canonicalization
A difficulty with input validation and output encoding is ensuring that the data being evaluated or transformed is in the format that will be interpreted as intended by the end user of that input.
SQL Injection : Code-Level Defenses - Encoding Output
In addition to validating input received by the application, it is often necessary to also encode what is passed between different modules or parts of the application. In the context of SQL injection, this is applied as requirements to encode, or “quote,” content that is sent to the database to ensure that it is not treated inappropriately.
Upgrading and Converting to Access 2010 : INSTALLING MULTIPLE VERSIONS OF ACCESS ON ONE PC, CHANGING FILE FORMATS
Before actually converting or enabling older files, it would be good to know how to work with the various file types in Access 2010. A good place to start is to specify the default file format.
Upgrading and Converting to Access 2010 : TO CONVERT OR TO ENABLE
You have several things to consider when deciding whether to convert an application to the Access ACCDB file format. The primary reason to convert is to take advantage of the new features that require the ACCDB file format, such as the ability to work with complex data, the ease of collecting data from e-mail forms, linking to SharePoint Services, and creating Web applications.
Oracle Database 11g : Database Fundamentals - Learn the Basic Oracle Database 11g Data Types, Work with Tables, Work with Stored Programmed Objects
Oracle Database 11g is the latest offering from Oracle. Perhaps you have heard a lot of hype about Oracle Database 11g, and perhaps not. Regardless of your experience, 11g is a rich, full-featured software intended to revolutionize the way many companies do their database business.
Oracle Database 11g : Database Fundamentals - Define a Database, Learn the Oracle Database 11g Architecture
Oracle Database 11g is the latest offering from Oracle. Perhaps you have heard a lot of hype about Oracle Database 11g, and perhaps not. Regardless of your experience, 11g is a rich, full-featured software intended to revolutionize the way many companies do their database business.
SQL Server 2005 : Advanced OLAP - Calculations (part 2) - Named Sets, More on Script View
Save your changes now, but before deploying them, switch back to script view to look at the entire set of generated code. Note that each calculation you entered, as well as the CALCULATE script command that was there initially, simply form successive sections of a single MDX script.
SQL Server 2005 : Advanced OLAP - Calculations (part 1) - Calculated Members
There’s a lot more to explore than these measure and dimension features. For instance, Analysis Services allows you to store calculated MDX expressions on the server that you can use in your queries. You can reference custom-built sets by name, create calculated measures or dimension attribute members, and more.
Exploiting SQL Injection : Automating SQL Injection Exploitation
Depending on the situation, you might require dozens of requests to properly fingerprint the remote DBMS, and maybe hundreds (or even thousands) to retrieve all the data you are interested in.
Exploiting SQL Injection : Out-of-Band Communication
The HTTP(S) connection that is used to send the request is also used to receive the response. However, this does not always have to be the case: The results can be transferred across a completely different channel, and we refer to such a communication as “out of band,” or simply OOB.
SQL Server 2008 R2 : Dropping Indexes, Online Indexing Operations, Indexes on Views
SQL Server 2008 supports the creation of indexes on views. Like indexes on tables, indexes on views can dramatically improve the performance of the queries that reference the views.
SQL Server 2008 R2 : Managing Indexes - Managing Indexes with T-SQL, Managing Indexes with SSMS
There are two different aspects to index management. The first aspect is the management of indexes by the SQL Server database engine. Fortunately, the engine does a good job of managing the indexes internally so that limited manual intervention is required.
SQL Server 2005 : Advanced OLAP - Advanced Dimensions and Measures (part 3)
One solution to this problem is to use an Analysis Services feature called member grouping, or discretization. Essentially, this feature groups members of a particular attribute by creating a new attribute/level “above” it.
SQL Server 2005 : Advanced OLAP - Advanced Dimensions and Measures (part 2) - Parent-Child Dimensions
We’ll start with the Shippers dimension. Recall that this dimension is flat (nonhierarchical); therefore, little refinement should be necessary. Meanwhile, this dimension contains two attributes while one is sufficient.
SQL Server 2005 : Advanced OLAP - Advanced Dimensions and Measures (part 1)
We’ll start with the Shippers dimension. Recall that this dimension is flat (nonhierarchical); therefore, little refinement should be necessary. Meanwhile, this dimension contains two attributes while one is sufficient.
Microsoft Systems Management Server 2003 : Maintaining the Database Through Microsoft SQL Server - Database Maintenance
To obtain a complete list and explanation of all Transact-SQL statements and stored procedures, including the DBCC commands, query the online help for SQL Server 2000.
Microsoft Systems Management Server 2003 : Maintaining the Database Through Microsoft SQL Server - SQL Server Components
SQL Server 7.0 and SQL Server 2000 maintain their database and transaction logs in their own files. If SQL Server is installed on the same computer as SMS 2003, SMS can create the database and log files for you during its setup. If not, you’ll need to create the files in advance.
Microsoft Visual Basic 2008 : Processing and Storing Data in SQL Server 2005 - Optimizing the LINQSQL Class
The LINQSQL class provides a wrapper around the Users table implementation in both the source and destination databases. Using the InsertRecord methods, we can migrate records into our destination database or create records in our source table.
ASP.NET 4 in VB 2010 : ADO.NET Fundamentals (part 6) - Disconnected Data Access
When you use disconnected data access, you keep a copy of your data in memory using the DataSet. You connect to the database just long enough to fetch your data and dump it into the DataSet, and then you disconnect immediately.
ASP.NET 4 in VB 2010 : ADO.NET Fundamentals (part 5) - Direct Data Access - Updating Data
To execute an Update, Insert, or Delete statement, you need to create a Command object. You can then execute the command with the ExecuteNonQuery() method. This method returns the number of rows that were affected, which allows you to check your assumptions.
ASP.NET 4 in VB 2010 : ADO.NET Fundamentals (part 4) - Direct Data Access - The DataReader
The DataReader uses a live connection and should be used quickly and then closed. The DataReader is also extremely simple. It supports fast-forward-only read-only access to your results, which is generally all you need when retrieving information.
ASP.NET 4 in VB 2010 : ADO.NET Fundamentals (part 3) - Direct Data Access - Creating a Connection, The Select Command
The most straightforward way to interact with a database is to use direct data access. When you use direct data access, you're in charge of building a SQL command and executing it. You use commands to query, insert, update, and delete information.
ASP.NET 4 in VB 2010 : ADO.NET Fundamentals (part 2) - SQL Basics
When you interact with a data source through ADO.NET, you use SQL to retrieve, modify, and update information. In some cases, ADO.NET will hide some of the details for you or even generate required SQL statements automatically.
ASP.NET 4 in VB 2010 : ADO.NET Fundamentals (part 1) - Understanding Databases, Configuring Your Database
SQL Server Express is a scaled-down version of SQL Server that's free to distribute. SQL Server Express has certain limitations—for example, it can use only one CPU and a maximum of 1GB of RAM, and databases can't be larger than 10GB.
SQL Server 2008 : Failover clustering - Installing a clustered SQL Server instance
An integrated installation creates a single-node failover cluster, from which additional nodes (nodes on which the instance can fail over to) are added via a separate installation.
SQL Server 2008 : Failover clustering - Clustering topologies and failover rules
There are many aspects to consider when designing and planning high availability with SQL Server clustering. Chief among them is the number of dedicated passive, or standby, servers to include in the cluster for failover purposes.
SQL Server 2008 : Failover clustering - Clustering overview
As a cluster-aware application, a SQL Server instance can be installed into an existing Windows cluster, creating what's referred to as a failover clustering instance. Once installed, the instance is accessed using a network name without needing to know which of the underlying physical cluster servers the instance is currently running on.
Exploiting SQL Injection : Stealing the Password Hashes
If you manage to capture the password hashes, various tools can attempt to retrieve the original passwords that generated the hashes by means of a brute-force attack.
Exploiting SQL Injection : Escalating Privileges
All modern DBMSs provide their administrators with very granular control over the actions that users can perform. You can carefully manage and control access to the stored information by giving each user very specific rights, such as the ability to access only specific databases and perform only specific actions on it.
Exploiting SQL Injection : Enumerating the Database Schema (part 3) - Oracle
An important fact to remember when using Oracle is that you will normally be accessing only one database at a time, as databases in Oracle are normally accessed via a specific connection, and multiple databases accessed by an application will generally have different connections.
Exploiting SQL Injection : Enumerating the Database Schema (part 2) - MySQL
Also on MySQL, the technique for enumerating a database and extracting its data follows a hierarchical approach: You start extracting the names of the databases, and then proceed down to tables, columns, and finally the data itself.
Exploiting SQL Injection : Enumerating the Database Schema (part 1) - SQL Server
To mount a successful attack, and to properly assess the risk that is posed by an SQL injection vulnerability, performing a fingerprint and squeezing a few bits of information is not enough: You must show that a skilled and resourceful attacker is able to enumerate the tables that are present in the database and quickly extract the ones that he is interested in.
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
programming4us
 
 
programming4us