Oracle PL/SQL Programming


Book Description

The authors have revised and updated this bestseller to include both the Oracle8i and new Oracle9i Internet-savvy database products.




The Web Application Hacker's Handbook


Book Description

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.




IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager


Book Description

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting. In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.




A Grammar of the Homeric Dialect


Book Description

A Grammar of the Homeric Dialect by David Monro Binning, first published in 1891, is a rare manuscript, the original residing in one of the great libraries of the world. This book is a reproduction of that original, which has been scanned and cleaned by state-of-the-art publishing tools for better readability and enhanced appreciation. Restoration Editors' mission is to bring long out of print manuscripts back to life. Some smudges, annotations or unclear text may still exist, due to permanent damage to the original work. We believe the literary significance of the text justifies offering this reproduction, allowing a new generation to appreciate it.







Stable Networks and Product Graphs


Book Description

The structural and algorithmic study of stability in nonexpansive networks is based on a representation of the possible assignments of Boolean values for a network as vertices in a Boolean hypercube under the associated Hamming metric. This global view takes advantage of the median properties of the hypercube, and extends to metric networks, where individual values are now chosen from the finite metric spaces and combined by means of an additive product operation. The relationship between products of metric spaces and products of graphs then establishes a connection between isometric representation in graphs and nonexpansiveness in metric networks.




Oracle PL/SQL Best Practices


Book Description

In this book, Steven Feuerstein, widely recognized as one of the world's experts on the Oracle PL/SQL language, distills his many years of programming, writing, and teaching about PL/SQL into a set of PL/SQL language "best practices"--rules for writing code that is readable, maintainable, and efficient. Too often, developers focus on simply writing programs that run without errors--and ignore the impact of poorly written code upon both system performance and their ability (and their colleagues' ability) to maintain that code over time.Oracle PL/SQL Best Practices is a concise, easy-to-use reference to Feuerstein's recommendations for excellent PL/SQL coding. It answers the kinds of questions PL/SQL developers most frequently ask about their code: How should I format my code? What naming conventions, if any, should I use? How can I write my packages so they can be more easily maintained? What is the most efficient way to query information from the database? How can I get all the developers on my team to handle errors the same way? The book contains 120 best practices, divided by topic area. It's full of advice on the program development process, coding style, writing SQL in PL/SQL, data structures, control structures, exception handling, program and package construction, and built-in packages. It also contains a handy, pull-out quick reference card. As a helpful supplement to the text, code examples demonstrating each of the best practices are available on the O'Reilly web site.Oracle PL/SQL Best Practices is intended as a companion to O'Reilly's larger Oracle PL/SQL books. It's a compact, readable reference that you'll turn to again and again--a book that no serious developer can afford to be without.




Letters of a Peruvian Woman


Book Description

'It has taken me a long time, my dearest Aza, to fathom the cause of that contempt in which women are held in this country ...' Zilia, an Inca Virgin of the Sun, is captured by the Spanish conquistadores and brutally separated from her lover, Aza. She is rescued and taken to France by Déterville, a nobleman, who is soon captivated by her. One of the most popular novels of the eighteenth century, the Letters of a Peruvian Woman recounts Zilia's feelings on her separation from both her lover and her culture, and her experience of a new and alien society. Françoise de Graffigny's bold and innovative novel clearly appealed to the contemporary taste for the exotic and the timeless appetite for love stories. But by fusing sentimental fiction and social commentary, she also created a new kind of heroine, defined by her intellect as much as her feelings. The novel's controversial ending calls into question traditional assumptions about the role of women both in fiction and society, and about what constitutes 'civilization'. ABOUT THE SERIES: For over 100 years Oxford World's Classics has made available the widest range of literature from around the globe. Each affordable volume reflects Oxford's commitment to scholarship, providing the most accurate text plus a wealth of other valuable features, including expert introductions by leading authorities, helpful notes to clarify the text, up-to-date bibliographies for further study, and much more.







Oracle PL/SQL Programming: A Developer's Workbook


Book Description

Written by one of the world's leading experts on the Oracle PL/SQL language, this text offers extensive exercises in all skill levels covering major features of the language. Also provides a primer to the PL/SQL language.