Article Network

Techniques for Creating a Multimedia Database

by Marcelle Kratochvil | May 2013 | Enterprise Articles Oracle

This article by Marcelle Kratochvil author of Managing Multimedia and Unstructured Data in the Oracle Database, covers the technical aspects of setting up a database to use Oracle Multimedia. It contains tips, codes, and useful techniques for setting up and managing an Oracle Database and covers the core storage capabilities of the Oracle Database. The goal is to enable the database administrator to make correctly informed decisions about the physical structure of database storage objects, in particular tablespaces, datafiles, and database capabilities.

Read Techniques for Creating a Multimedia Database in full

Techniques for Creating a Multimedia Database

by Marcelle Kratochvil | May 2013 | Enterprise Articles Oracle

This article by Marcelle Kratochvil author of Managing Multimedia and Unstructured Data in the Oracle Database, covers the technical aspects of setting up a database to use Oracle Multimedia. It contains tips, codes, and useful techniques for setting up and managing an Oracle Database and covers the core storage capabilities of the Oracle Database. The goal is to enable the database administrator to make correctly informed decisions about the physical structure of database storage objects, in particular tablespaces, datafiles, and database capabilities.

Read Techniques for Creating a Multimedia Database in full

Telecommunications and Network Security Concepts for CISSP Exam

by M. L. Srinivasan | December 2009 | Networking & Telephony

The telecommunication and network security domain deals with the security of voice and data communications through local area, wide area, and remote access networking. The focus is to understand the networking models such as Open Systems Interconnect (OSI) and TCP/IP models, which are the most important models that follow a layered approach to networking, as well as the security mechanisms for Internet, Intranet, and Extranet in terms of firewalls, routers, and intrusion detection and protection systems.

The telecommunication and network security domain is one of the 10 domains of the Certified Information Systems Security Professional (CISSP) exam.

In this article by M.L.Srinivasan, we will discuss the following topics:

  • Different protocols that are in transport layer, network/internet layer, and link layer in the TCP/IP model
  • Some threats and vulnerabilities that are prevalent to such protocols
  • Common attacks and possible countermeasures
  • Important technologies and the security issues associated with them
Read Telecommunications and Network Security Concepts for CISSP Exam in full

Ten IPython essentials

by Cyrille Rossant | May 2013 | Open Source

In this article by Cyrille Rossant, author of Learning IPython for Interactive Computing and Data Visualization, we will take a quick tour of IPython by introducing 10 essential features of this powerful tool. Although brief, this hands-on visit will cover a wide range of IPython functionalities.

Read Ten IPython essentials in full

Term Extraction Tasks in SQL Server Integration Services

by Dr.Jay Krishnaswamy | March 2008 | .NET Microsoft

Microsoft SQL Server's SQL Server Integration Services is a comprehensive, full featured tool for processing data in the back-end storage locations. Extraction of attributes in a body of text is an important task while mining data and the SSIS provides just the required transformation - Term Extraction, to accomplish this task. SSIS looks through the presented text document and sorts out terms. By terms are meant specifically nouns, noun phrases, and both nouns and noun phrases. You also have the flexibility of limiting extracted terms based on their frequency of occurrence. For example you could configure the task in such a way that you can capture terms that are repeated in the body of text a certain number of times.

This tutorial by Jayaram Krishnaswamy shows a simple example of extracting terms from a body of text.

Read Term Extraction Tasks in SQL Server Integration Services in full

Terms and Concepts Related to MDX

by Tomislav Piasevoli | August 2011 | Enterprise Articles Microsoft

MDX is a powerful, yet complex language. Many terms and concepts need to be understood well enough if you want to master it. In order to help you in that mission, this article will provide with a short explanation of all important terms related to MDX.

In this article by Tomislav Piasevoli, author of MDX with Microsoft SQL Server 2008 R2 Analysis Services Cookbook, we start by explaining what MDX queries are made of, followed by the terms and concepts specific to the execution of MDX queries. The middle part of the article covers the most important things related to dimension design, cube design, and MDX script. Next, we explain terms related to query optimization and finally finish the article with types of queries that can be used with SQL Server Analysis Services.

Read Terms and Concepts Related to MDX in full

Test

by | January 2011 |

 

Buy It Now

Read Test in full

test

by | February 2012 |
Read test in full

Test Microsoft Monday Campaign

by | January 2011 |
 

To celebrate the publication of six new Microsoft books on Monday, 24th January 2011 Packt has a special offer on all the latest Microsoft books

Purchase 2 or more Microsoft books and get 25% off each book throughout January

There is also the chance to win one year's free subscription to PacktLib (worth $220) every Monday by entering Packt's Microsoft Monday Competition

 

Read Test Microsoft Monday Campaign in full

test page

by | January 2011 |
Read test page in full

Test Page

by | February 2011 |

Python Month

 

 

 

 

WordPress is a flexible and powerful tool that's ideal for creating both blog and non-blog websites. You can customize the features, incorporate your own design, and even write your own plugins with ease. Its versatility and ease of use have attracted a large, enthusiastic, and helpful community of users.

To celebrate the publication of the WordPress 3.0 Complete book, Packt is offering a series of attractive discounts on all WordPress books for a period of 10 days.

    * Buy any WordPress print book and get 20% off
    * Buy any WordPress eBook and get 30% off

This offer will last for a 10 day period starting from 18th February and ending 28th February 2011. Grab your copy now !

 

Read Test Page in full

test- December Campaign

by | November 2010 |
<p><br mce_bogus="1"></p> Read test- December Campaign in full

test-article

by Nipun Jaswal | July 2014 | Open Source

In this article, by Nipun Jaswal, the author of Mastering Metasploit, we will cover the basics of Ruby programming and understand the various syntaxes and semantics of it. This article will also make it easy for you to write Metasploit modules. We will see how we can design and fabricate various custom Metasploit modules.

Read test-article in full

Test-New

by | January 2011 | Open Source
<p>Test</p> Read Test-New in full

Test: Article 1

by | March 2011 |

Article 1

Read Test: Article 1 in full

Test: Article 2

by | March 2011 |

Article 2

Read Test: Article 2 in full

Test: Article 3

by | March 2011 |

Article 3

Read Test: Article 3 in full

Test: Article 4

by | March 2011 |

Article 4

Read Test: Article 4 in full

Testing a Camel application

by Evgeniy Sharapov | September 2013 | Open Source

In this article by Evgeniy Sharapov, author of the book Instant Apache Camel Messaging System, we will learn about testing a Camel application. Of course, it is very easy to start your application and see how it works while it is small. Once the application starts growing, it will become impossible to check that it works correctly. Furthermore, Camel is both concurrent, which makes it even more complex, and an integration framework, so one would expect inputs and outputs to come and go from and to other systems, which might make things very tedious for the person doing quality assurance. Well, a long time ago, software developers came up with an idea to automate testing. Since then, plenty of good frameworks and libraries facilitating automatic testing have emerged. One of the approaches is unit testing—testing an application's functionality piece by piece or unit by unit. In the Java world, there are two options for unit testing: JUnit and TestNG. Even though Apache Camel supports both, here we will use only JUnit.

Read Testing a Camel application in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software