spring文档4.3.x版本
spring 4.3.x版本,官方文档,pdf格式。
目前spring已经主推spring boot,推荐使用
The Art Of Assembly Language
ACKNOWLEDGMENTS
This book has literally taken over a decade to create. It started out as "How to Program the IBM PC, Using 8088 Assembly Language" way back in 1989. I originally wrote this book for the students in my assembly language course at Cal Poly Pomona and UC Riverside. Over the years, hundreds of students have made small and large contributions (it's amazing how a little extra credit can motivate some students). I've also received thousands of comments via the Internet after placing an early, 16-bit edition of this book on my website at UC Riverside. I owe everyone who has contributed to this effort my gratitude.
I would also like to specifically thank Mary Phillips, who spent several months helping me proofread much of the 16-bit edition upon which I've based this book. Mary is a wonderful person and a great friend.
I also owe a deep debt of gratitude to William Pollock at No Starch Press, who rescued this book from obscurity. He is the one responsible for convincing me to spend some time beating on this book to create a publishable entity from it. I would also like to thank Karol Jurado for shepherding this project from its inception — it's been a long, hard road. Thanks, Karol.
network programming for microsoft windows
Welcome to Network Programming for Microsoft Windows, Second Edition! The second edition covers the same topics as the first edition and even more as well. This book primarily focuses on the Winsock network programming technology. In particular, we've added a chapter on writing high-performance, scalable Winsock applications and a chapter devoted to Winsock programming in the C# programming language using the exciting new .NET Application Frameworks library. In addition, we've completely updated the chapter on the Windows Service Provider Interface (SPI), and we cover additional protocols (such as IPv6 and reliable multicasting) and reveal functionality that is new to Windows XP.
This book covers a wide variety of networking functions available in Windows 95, Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Windows XP, and Windows CE. The majority of the text covers intermediate and advanced networking topics, but we retooled the Winsock section so that it is more accessible to programmers of all levels.
UNIX Shells by Example 4th Edition
The world's #1 shell programming book—now fully updated for Linux and more!
UNIX Shells by Example is the world's #1 shell programming book, from the world's #1 shell programming instructor: Ellie Quigley. In UNIX Shells by Example, Fourth Edition, Quigley has thoroughly updated her classic and delivers the information today's shell programmers need most—including comprehensive coverage of Linux shell programming with bash!
Drawing on 20 years' experience as a shell programming instructor, Quigley guides you through every facet of programming all leading UNIX/Linux shells: bourne, bash, korn, C, and tcsh. Quigley illuminates each concept with up-to-date, classroom-tested code examples designed to help you jump-start your own projects. She also systematically introduces awk, sed, and grep for both UNIX and GNU/Linux . . . making this the only shell programming book you'll ever need!
New in this edition:
Comprehensive coverage of Linux shell programming with bash
Shell Programming QuickStart: makes first-time shell programmers productive in just 15 pages
Complete, practical debugging chapter
Updated coverage of the latest UNIX and GNU/Linux versions of awk, sed, and grep
Shell programming for sysadmins: walks you through key UNIX and Linux system shell scripts
Completely updated:
Shell programming fundamentals: what shells are, what they do, how they work
Choosing the right shell for any application
Nearly 50,000 UNIX/Linux sysadmins, developers, and power users have used previous editions of UNIX Shells by Example to become expert shell programmers. With UNIX Shells by Example, Fourth Edition, you can, too—even if you're completely new to shell programming. Then, once you're an expert, you'll turn to this book constantly as the best source for reliable answers, solutions, and code.
Unix Systems Programming
This completely updated classic (originally titled Practical UNIX Programming) demonstrates how to design complex software to get the most from the UNIX operating system. UNIX Systems Programming provides a clear and easy-to-understand introduction tothe essentials of UNIX programming. Starting with short code snippetsthat illustrate how to use system calls, Robbins and Robbins movequickly to hands-on projects that help readers expand their skill levels.
This practical guide thoroughly explores communication, concurrency,and multithreading. Known for its comprehensive and lucid explanations of complicated topics such as signals and concurrency, the book features practical examples, exercises, reusable code, and simplified libraries for use in network communication applications.
A self-contained reference that relies on the latest UNIX standards,UNIX Systems Programming provides thorough coverage of files, signals,semaphores, POSIX threads, and client-server communication. Thisedition features all-new chapters on the Web, UDP, and server performance. The sample material has been tested extensively in theclassroom.
real world linux security
Linux is a solid operating system. It is easy to use and install, has very powerful capabilities, runs fast on almost any hardware, and rarely crashes. It has few bugs and its widespread support from a cast of thousands ensures that any remaining bugs get fixed as soon as they are discovered. It is highly versatile and can be made as secure as any UNIX system.
Unfortunately, UNIX and Linux machines are broken into every day, not because they are inherently insecure, but because the steps required to expose a system to the real world safely梩he modern Internet梐re not always so obvious. The single goal of this book is to teach any Linux or UNIX system administrator how to secure his systems, keep them secure, and feel confident that all necessary steps have been taken.
unix system crash dump analysis
UNIX systems crash. It's a fact of life. Until now, little information has been available regarding system crashes. Panic! is the first book to concentrate solely on system crashes and hangs, explaining what triggers them and what to do when they occur. Panic! guides you through system crash dump postmortem analysis towards problem resolution.
Analysis of system crash dumps usually requires the skills and resources of a UNIX guru,including a wide set of programming skills, an indepth knowledge of UNIX internals, and access to source code. However, by following the advice and "tricks of the trade" presented in Panic!, you will be able to establish what killed your system.
Unix Backup and Recovery
This book is divided into six parts:
Part I, Introduction
This part of this book contains just enough information to whet your backup and recovery
appetite.
Chapter 1, Preparing for the Worst, contains the six steps that you must go through to create
and maintain a disaster recovery plan, one part of which will be a good backup and recovery
system.
Chapter 2, Backing It All Up, goes into detail about the essential elements of a good backup
and recovery system.
Part II, Freely Available Filesystem Backup & Recovery Utilities
This section covers the freely available utilities that you can use to back up your systems if you
can't afford a commercial backup package.
Chapter 3, Native Backup & Recovery Utilities, covers Unix's native backup and recovery
utilities in detail, including dump, tar, GNU tar, cpio, GNU cpio, and dd.
Chapter 4, Free Backup Utilities, starts with some simple tools to assist you in your backups,
and contains a complete overview of the popular AMANDA utility, which is used to back up
many small to medium-sized Unix installations around the world.
Part III, Commercial Filesystem Backup & Recovery Utilities
If you have outgrown the capabilities of free utilities, or would just like to take advantage of
new backup and recovery technologies, you'll need to look at a commercial product.
Chapter 5, Commercial Backup Utilities, is your guide to the hundreds of features available in
the over 50 commercial backup products available on the market today, allowing you to make
an educated purchase decision.
Page xvii
Chapter 6, High Availability, details how, when backups just aren't fast enough, a high
availability system is designed to keep you from ever needing to use your backups.
Part IV, Bare-Metal Backup & Recovery Methods
A bare-metal recovery is the fastest way to bring a dead system back to life, even if its root
drive is completely destroyed.
Chapter 7, SunOS/Solaris, contains an in-depth description of the "homegrown" bare-metal
recovery procedure that can also be used to back up Linux, Compaq, HP-UX, and IRIX, as
well as a detailed Solaris-based example of bare-metal recovery.
Chapter 8, Linux, detail how you can perform a bare-metal recovery of a Linux system with a
floppy, a backup device, pax, and lilo.
Chapter 9, Compaq True-64 Unix, covers both Compaq True-64 Unix's bare-metal recovery
tool and the Compaq version of the homegrown procedure covered in Chapter 7.
Chapter 10, HP-UX, covers the make_recovery tool, which now comes with HP-UX to
perform bare-metal recoveries, along with the HP version of the homegrown procedure.
Chapter 11, IRIX, explains how the different versions of IRIX's Backup and Restore scripts
work, as well as the IRIX version of the homegrown procedure.
Chapter 12, AIX, discusses AIX, a procedure that does not support the homegrown procedure
discussed in Chapter 7, but does use mksysb, probably one of the oldest and best-known
bare-metal recovery tools.
Part V, Database Backup & Recovery
This section explains in plain language an area that presents some of the greatest backup and
recovery challenges that a system administrator or database administrator will face-backing up
and recovering databases.
Chapter 13, Backing Up Databases, is a chapter that will be your friend if you're an SA who's
afraid of databases or a DBA learning a new database. It explains database architecture in
plain language, while relating each architectural element to the appropriate term in Informix,
Oracle, and Sybase.
Chapter 14, Informix Backup & Recovery, explains both the older ontape and the newer
onbar, after which it provides a logically flowcharted recovery procedure that can be used
with either utility.
Page xviii
Chapter 15, Oracle Backup & Recovery, explains how to perform Oracle hot backups whether
you are using Oracle's native utilities, EBU, or RMAN, and then provides a detailed flowchart
guiding you through even a difficult recovery.
Chapter 16, Sybase Backup & Recovery, shows exactly how to use the Backup Server utility,
including another flow chart to guide you through Sybase recoveries.
Part VI, Backup & Recovery Potpourri
The information contained in this part of the book is by no means unimportant; it simply
wouldn't fit anywhere else!
Chapter 17, ClearCase Backup & Recovery, explains in detail the unique backup and recovery
challenges presented by ClearCase.
Chapter 18, Backup Hardware, explains the many different types of backup hardware
available today, as well as providing criteria that you may use to decide which type of backup
drive is right for you.
Chapter 19, Miscellanea, covers everything from the oft-debated "live filesystem dumps"
question to a few jokes that I found about backup and recovery!
UNIX Network Programming
"Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I've already enjoyed and learned from reading this book, and surely you will too."
-Sam Leffler
The classic guide to UNIX networking APIs... now completely updated!
To build today's highly distributed, networked applications and services, you need deep mastery of sockets and other key networking APIs. One book delivers comprehensive, start-to-finish guidance for building robust, high-performance networked systems in any environment: UNIX Network Programming, Volume 1, Third Edition.
Building on the legendary work of W. Richard Stevens, this edition has been fully updated by two leading network programming experts to address today's most crucial standards, implementations, and techniques. New topics include:
POSIX Single UNIX Specification Version 3
IPv6 APIs (including updated guidance on IPv6/IPv4 interoperability)
The new SCTP transport protocol
IPsec-based Key Management Sockets
FreeBSD 4.8/5.1, Red Hat Linux 9.x, Solaris 9, AIX 5.x, HP-UX, and Mac OS X implementations
New network program debugging techniques
Source Specific Multicast API, the key enabler for widespread IP multicast deployment
The authors also update and extend Stevens' definitive coverage of these crucial UNIX networking standards and techniques:
TCP and UDP transport
Sockets: elementary, advanced, routed, and raw
I/O: multiplexing, advanced functions, nonblocking, and signal-driven
Daemons and inetd
UNIX domain protocols
ioctl operations
Broadcasting and multicasting
Threads
Streams
Design: TCP iterative, concurrent, preforked, and prethreaded servers
Since 1990, network programmers have turned to one source for the insights and techniques they need: W. Richard Stevens' UNIX Network Programming. Now, there's an edition specifically designed for today's challenges-and tomorrow's.
Understanding The Linux Kernel
In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks.
The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.
This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:
Memory management, including file buffering, process swapping, and Direct memory Access (DMA)
The Virtual Filesystem layer and the Second and Third Extended Filesystems
Process creation and scheduling
Signals, interrupts, and the essential interfaces to device drivers
Timing
Synchronization within the kernel
Interprocess Communication (IPC)
Program execution
Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.
Squid The Definitive Guide
Squid is the most popular Web caching software in use today, and it works on a variety of
platforms including Linux, FreeBSD, and Windows. Written by Duane Wessels, the creator of
Squid, Squid: The Definitive Guide will help you configure and tune Squid for your particular
situation. Newcomers to Squid will learn how to download, compile, and install code. Seasoned
users of Squid will be interested in the later chapters, which tackle advanced topics such as
high-performance storage options, rewriting requests, HTTP server acceleration, monitoring,
debugging, and troubleshooting Squid.
Wireless Sensor Networks: Architectures and Protocols
This informative text describes how to build wireless sensor networks from the layers of the communication protocol through the design of network nodes. It also describes the design features of the wireless devices themselves.
TCP/IP Illustrated, Volume 2: The Implementation
TCP/IP Illustrated, Volume 2 contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide.
NetFlow Export Datagram Format
NetFlow exports flow information in UDP datagrams in one of four formats:
• Version 1
• Version 5
• Version 7
• Version 8
The Version 1 (V1) format is the original format supported in the initial NetFlow releases. The
Version 5 (V5) format is an enhancement that adds Border Gateway Protocol (BGP) autonomous
system information and flow sequence numbers. The Version 7 (V7) format is an enhancement that
exclusively supports NetFlow with Cisco Catalyst 5000 series switches equipped with a NetFlow
feature card (NFFC). V7 is not compatible with Cisco routers. The Version 8 (V8) format is an
enhancement that adds router-based aggregation schemes. Versions 2, 3, 4, and 6 either were not
released or are not supported by FlowCollector.
In Versions 1, 5, and 7, the datagram consists of a header and one or more flow records. The first
field of the header contains the version number of the export datagram. Typically, a receiving
application that accepts any of the format versions allocates a buffer large enough for the largest
possible datagram from any of the format versions and then uses the header to determine how to
interpret the datagram. The second field in the header contains the number of records in the datagram
and should be used to search through the records.
All fields described in the format version tables are in network byte order. Table B-1 and Table B-2
describe the V1 header and flow record format, respectively. Table B-3 and Table B-4 describe the
V5 header and flow record format, respectively. Table B-5 and Table B-6 describe the V7 header and
flow record format, respectively. Table B-7 describes the V8 header format. Table B-8 describes the
V8 RouterAS flow record format. Table B-9 describes the V8 RouterProtoPort flow record.
Table B-10 describes the V8 RouterDstPrefix flow record. Table B-11 describes the RouterSrcPrefix
flow record, and Table B-12 describes the RouterPrefix flow record.
Mobile Location Services The Definitive Guide
Tomorrow's mobile applications must be smarter than ever, accessing and intelligently using a wide range of location data. In Mobile Location Services, leading mobile application consultant Andrew Jagoe presents the first end-to-end solutions guide to building and deploying location-based services and applications. Jagoe addresses every key development challenge and presents insightful case studies and interviews with key industry leaders.
Mobile location servers and the components of an end-to-end location-based solution
Spatial analysis: digital mapping, geocoding, routing, map image generation, and point-of-interest searches
Mobile positioning: using and augmenting GPS technology
Authentication and security in location-based applications
Personalization, profiling, and privacy
Mobile location clients: platform, protocols, languages, and localization issues
Key applications: navigation, emergency assistance, travel services, advertising/marketing, and more
Includes detailed appendices on the Geography Markup Language (GML), the Location Interoperability Forum's Mobile Location Protocol, and P3P privacy standards
Morgan Kaufmann - Location-Based Services
There is an explosion of technologies to communicate with mobile
and occasionally-connected devices and sensors. Wireless networking
(WiFi), cellular telephone (GSM), packet radio, radio frequency
identifiers (RFID), smart personal object technology (SPOT), global
positioning systems (GPS), and sensor networks are already with us.
Many completely new communication innovations are on the horizon.
These technologies enable new applications. They allow mobile users
to query their environment and they allow applications to monitor and
track remote objects. People can ask about nearby services – for example a
restaurant, and how to get there from here. Police, hospital, and taxi
dispatchers can send the closest vehicle to where it is needed. Conversely,
monitoring systems can track the flow of goods and monitor
environmental parameters. Railroads, airfreight, wholesalers, retailers,
and other transportation industries can track goods from their source
to their final destination on the retail shelf. Environmental systems can
monitor air quality, noise, streamflow, and other environmental
parameters.
c for dummies 2nd edition
Most programming books start out by assuming that you don’t know anything. The author may remember that for, oh, maybe two or three chapters. Then, after that initial pressure is off, there he goes! Chapter 4 is written not to teach you how to program, but, rather, to impress the author’s programming buddies back at college. So your learning journey ends with a whimper. You will not find that problem in this book.
The best way to learn something is one piece at a time. With programming, I prefer to show you things by using small programs, tiny models, and quick-to-type examples. That way, you’re not overwhelmed with an initial program that’s three pages long, and you don’t get lost after a few chapters. That’s because the pace stays the same throughout the book. I insist on it!
This book also gets you started right away. When researching other books, I noticed that often the first program you have to type is not only several dozen lines long, but also nearly 50 pages into the book on average! In this book, you get started right away with a program example on Page 13. That quick!
Core JSTL
Using JSTL, software developers and Web page authors can create robust, flexible Web applications more quickly and easily than ever before. Now, best-selling author and JSTL expert David Geary presents the definitive guide to JSTL: its built-in tags, powerful expression language, and extensibility. Through practical examples and extensive sample code, Geary demonstrates how JSTL simplifies, streamlines, and standardizes a wide range of common Web development tasks and helps you build Web applications far more easily than JavaServer Pages technology alone.
Java Servlet Programming
The second edition of this popular book has been completely updated to add the new features of the Java Servlet API Version 2.2, and new chapters on servlet security and advanced communication. In addition to completely covering the 2.2 specification, we have included bonus material on the new 2.3 version of the specification.
Java Servlet And JSP Cookbook
With literally hundreds of examples and thousands of lines of code, the Java Servlet and JSP Cookbook yields tips and techniques that any Java web developer who uses JavaServer Pages or servlets will use every day, along with full-fledged solutions to significant web application development problems that developers can insert directly into their own applications
Professional Servlets and JSP The J2EE Web Tier
Servlets and JavaServer Pages is the first complete guide to building dynamic Java-based
Web applications using the new JavaServer Pages 2.0 and Servlets 2.4. Servlets and
JavaServer Pages (JSP) provide a robust solution to developing large, complex Web
applications, including multiserver projects. In addition to built-in security, portability, and a
Web server, they offer developers the freedom to work with any operating system that
supports Java—be it Linux, Windows, OSX, or Solaris.
Understand Java ClassLoader
Java ClassLoader 是一个重要的、但又常常被人忽略的 Java 运行时系统组件。它是负责在运行时查找和装入类文件的类。创建自己的 ClassLoader 可以以实用且有趣的方式定制 JVM,这样可以让您彻底重新定义如何将类文件引入系统。
本教程概述了 Java ClassLoader,并指导您构造在装入代码之前自动编译代码的示例 ClassLoader。您将完全了解 ClassLoader 的功能以及创建自己的 ClassLoader 需要执行的操作。
在学习本教程前,需了解一些 Java 编程的基本知识,包括创建、编译和执行简单的命令行 Java 程序的技能,以及掌握一些类文件范例的知识。
XHTML™ 1.0 The Extensible HyperText Markup Language (Second Edition)
This specification defines the Second Edition of XHTML 1.0, a reformulation of HTML 4 as an
XML 1.0 application, and three DTDs corresponding to the ones defined by HTML 4. The
semantics of the elements and their attributes are defined in the W3C Recommendation for
HTML 4. These semantics provide the foundation for future extensibility of XHTML. Compatibility
with existing HTML user agents is possible by following a small set of guidelines.
HTML 4.01 Specification
This specification defines the HyperText Markup Language (HTML), the publishing
language of the World Wide Web. This specification defines HTML 4.01, which is a
subversion of HTML 4. In addition to the text, multimedia, and hyperlink features of
the previous versions of HTML (HTML 3.2 [HTML32] [p.356] and HTML 2.0
[RFC1866] [p.356] ), HTML 4 supports more multimedia options, scripting
languages, style sheets, better printing facilities, and documents that are more
accessible to users with disabilities. HTML 4 also takes great strides towards the
internationalization of documents, with the goal of making the Web truly World Wide.
CSSFilter2.0
本手册是 Rainer's DHTML Library 产品的一部分。
本手册针对的是已有一定网页设计制作经验的读者。其目的是提供完整清晰的样式滤镜的快速索引及进阶帮助。所以对于网页制作和样式表的基础知识,仅简单介绍,恕不赘述。
本手册以浏览器的事实标准—— Internet Explorer 为主。
手册中为所有的滤镜,除了基本的语法示范外,都度身制作了可以对照源代码即时察看运行演示的实例。
本手册的升级信息与版权声明请参阅关于本书页面。
本书中涉及到的所有HTML对象(Object,Element),HTML属性(Attributes)和特性(Properties)请参阅我的相关著作。
CSS 2.1 Specification
This specification defines Cascading Style Sheets, level 2 revision 1 (CSS 2.1).
CSS 2.1 is a style sheet language that allows authors and users to attach style (e.g.,
fonts and spacing) to structured documents (e.g., HTML documents and XML applications).
By separating the presentation style of documents from the content of
documents, CSS 2.1 simplifies Web authoring and site maintenance.
CSS2.0_DOC
本手册是 Rainer's DHTML Library 产品的一部分。
本手册针对的是已有一定网页设计制作经验的读者。其目的是提供完整清晰的样式表内容的快速索引及进阶帮助。所以对于网页制作和样式表的基础知识,仅简单介绍,恕不赘述。
ECMAScript Language Specification
This ECMA Standard is based on several originating technologies, the most well known being JavaScript
(Netscape) and JScript (Microsoft). The language was invented by Brendan Eich at Netscape and first appeared in
that company’s Navigator 2.0 browser. It has appeared in all subsequent browsers from Netscape and in all
browsers from Microsoft starting with Internet Explorer 3.0.
ECMAScript Edition 4 Draft
This Standard defines the ECMAScript Edition 4 scripting language
JavaScript Professional Projects
If you've purchased this book (or are standing in the bookstore thinking about purchasing it), you've probably already made up your mind to start integrating JavaScript into your Web projects—or at least you're interested in the multifaceted applications you can build with it. That said, this book is not beginner-level "basic tutorial," but a more advanced exploration of a real-world project that will show you how to implement JavaScript in actual applications. This book begins where most other tutorials leave off—by showing you how to pull together the basic operations of a software application in order to actually build practical and viable Web site for your organization.
Tapestry In Action
My involvement with Tapestry began in the autumn of 2001. I read about the
framework in an article in ONJava magazine. At the same time, our company
was poised to begin several new web projects, and we were looking for a way to
avoid the problems inherent in building complex web pages and forms with
the standard tools. We analyzed a large number of frameworks, but Tapestry
immediately attracted our attention, with its unique development method and
its helpful community.
Quartz_Job_Scheduling_Framework
Quartz 是什么,大概不需多加说明,简单讲就是一个纯 Java 实现的作业调度工具,相当于数据库中的 Job、Windows 的计划
任务、Unix/Linux 下的 Cron,但 Quartz 可以把排程控制的更精细。也许大多数人听说 Quartz 是在学习或使用 Spring 的时
候,也就是 Spring 整合了 Quartz。而我也不例外,同样是在春天里得悉了这块石
JavaServer Faces in Action
As I write this foreword, I am collaborating with four leading user interface
(UI) component vendors on a presentation for the 2004 JavaOneSM conference.
In our presentation, the vendors will show how they leverage JavaServerTM
Faces technology in their products. While developing the presentation, I am
learning some things about the work we’ve been doing on JavaServer Faces for
the past three years. The vendors have their own set of concerns unique to
adapting their product for JavaServer Faces, but they all voice one opinion
loud and clear: they are very relieved to finally have a standard for web-based
user interfaces.
SQL in a Nutshell 2nd Edition
This essential desktop reference drills down and documents every SQL command and how to use it in both commercial (Oracle, DB2, and Microsoft SQL Server) and open source implementations (PostgreSQL, and MySQL). It includes the command syntax (by vendor, if the syntax differs across implementations), a description, and practical examples. And it also explains how the leading commercial and open sources database product implement SQL. This wealth of information is packed into a succinct, comprehensive, and extraordinarily easy-to-use format.
PostgreSQL8.1_DOC_CN
PostgreSQL是以加州大学伯克利分校计算机系开发的 POSTGRES,版本 4.2为基础的对象关系型数据库管理系统(ORDBMS)。 POSTGRES 领先的许多概念只是在非常迟的时候才出现在商业数据库中。
MySQL5.1_DOC_CN
这是MySQL参考手册的翻译版本,关于MySQL参考手册,请访问dev.mysql.com。 原始参考手册为英文版,与英文版参考手册相比,本翻译版可能不是最新的。
数据挖掘入门
数据挖掘 基础知识 数据挖掘入门 入门必读
Principles of Data Mining
The science of extracting useful information from large data sets or databases is known
as data mining. It is a new discipline, lying at the intersection of statistics, machine
learning, data management and databases, pattern recognition, artificial intelligence, and
other areas. All of these are concerned with certain aspects of data analysis, so they
have much in common—but each also has its own distinct flavor, emphasizing particular
problems and types of solution.
managing data mining advice
In response to increasingly high customer demands and formidable
competition, today’s organizations have implemented new technologies
that generate and collect massive volumes of data. However, a large
majority of the data collected goes to waste or becomes obsolete.
Inconsistency, repetition, time-sensitivity, disparate data sources and data
overkill are just a few of the problems overwhelming many decision
makers.
Perl 6 Essentials
Perl 6 Essentials is the first book that offers a peek into the next major version of the Perl language. Written by members of the Perl 6 core development team, the book covers the development not only of Perl 6 syntax but also Parrot, the language-independent interpreter developed as part of the Perl 6 design strategy. This book is essential reading for anyone interested in the future of Perl. It will satisfy their curiosity and show how changes in the language will make it more powerful and easier to use.