This module covers the creation, execution and deployment of an ETL project …
This module covers the creation, execution and deployment of an ETL project using the SQL Server Integration Services (SSIS). Several examples were provided to show how data from different sources can be Extracted from the source, Transformed into meaningful forms and Loaded to the data warehouse.
Reports are integral part especially of any database-driven application. Data, regardless of …
Reports are integral part especially of any database-driven application. Data, regardless of volume, need to be processed and retrieved from a variety of sources and later presented to the desired users in various forms. Out of these reports, appropriate actions are normally carried out by the respective users.
This resource introduces the Reporting Services which is one of the Business Intelligence projects under the umbrella of SQL Server technologies. It walks you through the creation, deployment and subscription of server-side report whose deployment and data-driven subscription are made possible through SQL Server Reporting Services (SSRS).
Database Security is the utmost key part for any type of database, …
Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.
Database Security is the utmost key part for any type of database, …
Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.
Database Security is the utmost key part for any type of database, …
Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.
This Lecturer notes explain data warehousing architecture design and how it is …
This Lecturer notes explain data warehousing architecture design and how it is implemented using oracle. The main objective of lecture notes is student can print and use in easier way.
This covers the implementation of database clustering through Open Source technologies. It …
This covers the implementation of database clustering through Open Source technologies. It is designed to teach the students on how to get, install and configure the required software and eventually set-up the cluster. It also provides an example on how a web application connects randomly to any database server in the cluster and still gets the same data. Through this example, high data availability solution is clearly demonstrated in the sense that if and when one database server in the cluster is down, the other database server can continue providing the needed data.
This resource created for student to understand ETL process in the data …
This resource created for student to understand ETL process in the data warehousing. Mainly using tool is open source software as Pentaho data Integration called Spoon
This tutorial explain step -by- step how to develop visual basic .net …
This tutorial explain step -by- step how to develop visual basic .net 2012 application. The Lecturer notes has complete coding part of the tutorial is available. Using lecturer notes the viewer can try themselves modify the code and improve their skills. Each unit designed based on lesson plan
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.