Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >  |  Displaying page 15 of 16, items 561 to 600 of 625.
The SQL Programming Language : Complex Queries and Join Queries (part 2)
Projection refers to the idea that you might want to see only a limited number of columns in the results of a query. It is very useful for join queries, which can lead to a very large number of columns in the results.
The SQL Programming Language : Complex Queries and Join Queries (part 1)
In a correctly designed database, for every kind of entity there is a separate table, and the information about one instance of the entity is stored in a row of the table. The information in a database consists of both the information stored in individual tables and the relationships between entries in different tables.
SQL Server 2008 : Implementing Objects - Viewing and Modifying Data
A view is a database object that represents a saved SELECT statement. Views are also referred to as virtual or logical tables. Views can be queried in the same way as tables, and some types of views can be updated, too
SQL Server 2008 : Implementing Objects - Understanding DDL and DML Language Elements
Transact-SQL is the language used to create objects and access data in SQL Server. Data Manipulation Language, (DML) is part of the Transact-SQL language that allows you to insert, modify, and delete data in SQL Server tables
SQL Server : Reporting Services - Report Access and Delivery
Several methods are available for delivering reports to users on demand or by subscription. Most popular is the Report Manager interface described earlier. You can embed reports in SharePoint Portal using the included Web parts.
SQL Server : Reporting Services - Report Server Architecture
Reporting Services combines a mix of Microsoft technologies to create a scalable server-based reporting architecture. You can view this as a middle-tier server in your enterprise planning scenarios. It is one part Web server and one part database server, with a dash of .NET managed code to bring all the pieces together
SQL Programming Language : Ordering, Calculating, and Grouping in Queries
Not only is the information retrieved from a database important, but how the results are presented to users is also important. Although tables themselves are not allowed to have duplicate rows, query results can easily contain duplicates.
Automating Blind SQL Injection Exploitation
The techniques we've discussed in this article regarding blind SQL injection enable the extraction and retrieval of database contents in a highly automated manner using either inference techniques or alternative channels.
Blind SQL Injection Exploitation : Using Alternative Channels
We will discuss four separate alternative channels for blind SQL injection: database connections, DNS, e-mail, and HTTP. The basic idea is to package the results of an SQL query in such a way that they can be carried back to the attacker using one of the three alternative channels.
Blind SQL Injection Exploitation : Using Response-Based Techniques
Just as we used request timing to infer information about a particular byte, we can also infer state by carefully examining all data in the response, including content and headers. You can infer state either by the text contained in the response or by forcing errors when particular values are under examination.
SQL Server 2008 : Using the CLR - Understanding Permission Sets
When registering an assembly with SQL Server, code within that assembly may adversely affect or compromise the system. To help protect against these events, SQL Server allows you to restrict the operations the assembly is able to perform.
Registering CLR Assemblies for Use with SQL Server
Assemblies are physical units of deployment that contain managed code. This managed code can be called by CLR stored procedures, CLR functions, CLR triggers, CLR user-defined aggregates, and CLR user-defined data types. Assemblies are stored externally from SQL Server and thus can be used by other applications.
SQL Server 2008 : What Is the Base Class Library?
The .NET Framework provides a rich library of commonly used functionality to developers creating applications using managed code. This library is known as the Base Class Library.
Exploring the T-SQL Enhancements in SQL Server 2005 : The WAITFOR Command
The WAITFOR command has also been enhanced in SQL Server 2005. In the past, WAITFOR waited for a specified duration or a supplied datetime value. Now, as with the TOP enhancements, you can use WAITFOR with an SQL expression.
Exploring the T-SQL Enhancements in SQL Server 2005 : New Data Types
QL Server 2005 has several cool new data types. The most useful are varchar(max) and xml.
Exploring the T-SQL Enhancements in SQL Server 2005 : Exception Handling in Transactions
SQL Server 2005 offers major improvements in error handling inside T-SQL transactions. You can now catch T-SQL and transaction abort errors using the TRY/CATCH model without any loss of the transaction context.
The SQL Server 2008 Configuration Manager
In SQL Server 2005, The Surface Area Configuration Tool was used to manage SQL Server features such as Database mail and xp_cmdshell. In SQL Server 2008, the Surface Area Configuration Tool no longer exists
SQL Server 2008 : Managing Security - Auditing
Available in SQL Server 2008 Enterprise, automatic auditing can be set up by using SQL Server Audit. The Audit object can capture activity in the database server and save it to a log. Audit information can be stored in a File, Windows Application Log, or Windows Security Log.
Cloud Application Architectures : Database Management
The trickiest part of managing a cloud infrastructure is the management of your persistent data. Persistent data is essentially any data that needs to survive the destruction of your cloud environment. Because you can easily reconstruct your operating system, software, and simple configuration files, they do not qualify as persistent data. Only the data that cannot be reconstituted qualify.
SQL Server 2005 : Transactions and Exceptions
No discussion of exceptions in SQL Server can be complete without mentioning the interplay between transactions and exceptions. This is a fairly simple area, but one that often confuses developers who don't quite understand the role that transactions play.
SQL Server 2005 : Exception Handling
Understanding when, why, and how SQL Server throws exceptions is great, but the real goal is to actually do something when an exception occurs. Exception handling refers to the ability to catch an exception when it occurs, rather than simply letting it bubble up to the next level of scope.
SQL Server 2005 : How Exceptions Work in SQL Server
The first step in understanding how to handle errors and exceptions in SQL Server is to take a look at how the server itself deals with error conditions. Unlike many other programming languages, SQL Server has an exception model that involves different behaviors for different types of exceptions.
Exploring the T-SQL Enhancements in SQL Server 2005 : Ranking Functions
Databases hold data. Users sometimes want to perform simple calculations or algorithms on that data to rank the results in a specific order—like gold, silver, and bronze medals in the Olympics or the top 10 customers by region.
Exploring the T-SQL Enhancements in SQL Server 2005 : TOP Enhancements
In earlier versions of SQL Server, TOP allows you to limit the number of rows returned as a number or a percentage in SELECT queries. With SQL Server 2005, you can use TOP in DELETE, UPDATE, and INSERT queries and can also specify the number of rows (or percent) by using variables or any valid numeric returning expression (such as a subquery).
Blind SQL Injection Exploitation : Using Time-Based Techniques
Now that we have covered a little background theory on both classes of techniques it is time to dig into the actual exploits. When covering the various methods for inferring data there was an explicit assumption that an inference mechanism existed that enabled us to use either a binary search method or a bit-by-bit method to retrieve the value of a byte
Finding and Confirming Blind SQL Injection
To exploit a blind SQL injection vulnerability you must first locate a potentially vulnerable point in the target application and verify that SQL injection is possible.
SQL Server 2008 : Configuration Options
With SQL Server 2008, many options may affect the performance of individual SQL statements or the overall performance of a SQL Server instance.
SQL Server 2008 Instance Architecture
When you fire up a SQL Server instance, two main areas are allocated: the code area and memory pool area. The code area is mostly static executable code of the SQL Server kernel; SQL Server .NET Library DLLs
SQL Server 2008 : Using the CLR - CLR Integration
As SQL Server became more widely used, database professionals and developers demanded the ability to incorporate advanced logic and functionality into their database objects.
SQL Server 2008 : Using the CLR - CLR and Managed Code Explained
The CLR is the execution environment provided by the Microsoft .NET Framework. It is likely that you had to install the .NET Framework at one time or another, usually as a prerequisite for installing an application.
SQL Azure : Database Growth-Management Strategies
When your data is on-premises, you can manage your SQL Server database's growth by adding more storage capacity. Typically, an on-premises storage area network is shared across multiple databases and applications, and it's only a matter of acquiring an extra block of storage from the company's storage-management team. Even though a cost is associated with the storage, you still have control over how you distribute your database growth.
SQL Azure : Database-Migration Strategies
The data definition refers to the design of your database schema, which may include storage-specific objects like tables, views, indexes, constraints, and so on. The data definition is tightly coupled to the type of data stored in the database to achieve optimal performance.
SQL Server 2005 : Implementing Service Broker
Service Broker is an inter-application messaging agent that provides queuing and messaging within a single instance of SQL Server or between multiple instances. Database applications can use Service Broker to utilize an asynchronous programming model.
SQL Server 2005 : Importing and Exporting Data
There are several ways of moving large amounts of data either within a single server or between servers. Importing and exporting tasks vary in SQL Server, and each task has an appropriate implementation.
Understanding Snapshot Isolation
The default transaction isolation level in SQL Server is READ COMMITTED, which prevents statements from reading data that has been modified by another transaction, but not committed.
SQL Server 2008 : Programming Objects - Implementing Triggers
A trigger is a T-SQL routine stored on the server that is executed automatically in response to an event within SQL Server. You can use triggers to evaluate data before or after a manipulation, to maintain data integrity, to control server operations and access, to audit a server, and to implement business logic.
SQL Server 2008 : Programming Objects - Implementing Stored Procedures
The favorite programming objects used by the database developers so far, stored procedures, are compiled SQL routines that are stored in a database and act like an independent program within SQL Server when called.
SQL Server 2008 Command-Line Utilities : The sqlservr Command-Line Utility
The sqlservr executable is the program that runs when SQL Server is started. You can use the sqlservr executable to start SQL Server from a command prompt. When you do that, all the startup messages are displayed at the command prompt, and the command prompt session becomes dedicated to the execution of SQL Server.
SQL Server 2008 Command-Line Utilities : The sqldiag Command-Line Utility
sqldiag is a diagnostic tool that you can use to gather diagnostic information about various SQL Server services. It is intended for use by Microsoft support engineers, but you might also find the information it gathers useful in troubleshooting a problem.
SQL Server 2008 Command-Line Utilities : The bcp Command-Line Utility
You use the bcp (bulk copy program) tool to address the bulk movement of data. This utility is bidirectional, allowing for the movement of data into and out of a SQL Server database.
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us