Agile Oracle Application Express shows how skilled, motivated, and self-organizing developers can realize the extraordinary commercial benefits of Application Express by coupling it with an agile software development approach.
Beginning Java EE 7 is one of the first tutorials written with definitive expertise on the Java EE 7 platform. Step by step and easy to follow, this book describes the Java EE 7 features and how to use them.
Open the door to a career as an Oracle database administrator as you learn to plan for and install the Oracle Database software and then learn the rudiments of database administration from longtime Oracle expert Iggy Fernandez.
Beginning Oracle SQL is your introduction to the interactive query tools and specific dialect of SQL used with Oracle Database. The book is a revision of the classic Mastering Oracle SQL and SQL*Plus by Lex de Haan, and has been updated to cover developments in Oracle's version of the SQL query language.
Get started with PL/SQL, the built-in language that every Oracle developer and database administrator must know, in Beginning PL/SQL, a fast-paced and example-filled tutorial. Learn from author Don Bales' extensive experience to discover the most commonly used aspects of PL/SQL, without wasting time with obscure and obsolete features.
In Cost-Based Oracle Fundamentals, the first book in a series of three, Jonathan Lewisone of the foremost authorities in this fielddescribes the most commonly used parts of the model, what the optimizer does with your statistics, and why things go wrong.
Thomas Kyte has a simple philosophy: You can treat Oracle as a black box and shove data inside of it, or you can learn how Oracle works and exploit it as a powerful computing environment. If you choose the latter, you will see there are few information management problems you cannot solve quickly and elegantly.
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them.