Logo

Database Fundamentals by Neeraj Sharma, at al.

Small book cover: Database Fundamentals

Database Fundamentals
by

Publisher: IBM Corporation
Number of pages: 282

Description:
Data is one of the most valuable assets a company has. Relational and hierarchical databases have been used in the industry for decades. This book teaches you the fundamentals of databases, including relational database theory, logical and physical database design, and the SQL language. Advanced topics include using functions, stored procedures and XML.

Download or read it online for free here:
Download link
(5.1MB, PDF)

Similar books

Book cover: Storage Basics: An Introduction to the Fundamentals of Storage TechnologyStorage Basics: An Introduction to the Fundamentals of Storage Technology
- Fujitsu Siemens Computers
This book is an introduction to storage technologies and storage networks. It also provides an overview of the storage product portfolio of Fujitsu Siemens Computers which is the basis for solutions that help you manage the growing flood of data.
(13569 views)
Book cover: Refining the Concept of Scientific Inference When Working with Big DataRefining the Concept of Scientific Inference When Working with Big Data
- National Academies Press
Using big data analytics to identify complex patterns hidden inside volumes of data that have never been combined could accelerate the rate of scientific discovery and lead to the development of beneficial technologies and products.
(2099 views)
Book cover: Data Mining in Medical and Biological ResearchData Mining in Medical and Biological Research
by - InTech
This book brings together the most recent advances of data mining research in the promising areas of medicine and biology. It consists of seventeen chapters which describe interesting applications, motivating progress and worthwhile results.
(16407 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(14495 views)