Muutke küpsiste eelistusi

Administrator's Guide to Sybase ASE 12.5: The Official Guide [Pehme köide]

  • Formaat: Paperback / softback, 474 pages, kõrgus x laius: 235x190 mm, kaal: 1059 g, b/w illus
  • Sari: Wordware Database Library
  • Ilmumisaeg: 25-Mar-2003
  • Kirjastus: Wordware Publishing Inc.
  • ISBN-10: 1556223072
  • ISBN-13: 9781556223075
Teised raamatud teemal:
  • Pehme köide
  • Hind: 69,39 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 474 pages, kõrgus x laius: 235x190 mm, kaal: 1059 g, b/w illus
  • Sari: Wordware Database Library
  • Ilmumisaeg: 25-Mar-2003
  • Kirjastus: Wordware Publishing Inc.
  • ISBN-10: 1556223072
  • ISBN-13: 9781556223075
Teised raamatud teemal:
After reading this book, you should be able to perform any task that encompasses the creation or maintenance of a sever.
Foreword xiv
Preface xv
Acknowledgments xvi
Introduction xvii
Systems Administration Overview
1(10)
Architecture Overview
1(1)
Responsibilities of the Sybase Systems Administrator
1(6)
Installing the Sybase Adaptive Server
2(1)
Establishing Connectivity Between Clients and Servers
2(1)
Installing and Maintaining User Databases
3(1)
Establishing Security for Adaptive Server Enterprise
4(1)
Maintaining and Troubleshooting the ASE
5(1)
Establishing Disaster Recovery Procedures
5(1)
Monitoring ASE
6(1)
Use of Utilities
6(1)
Databases
7(1)
System Tables Overview
8(2)
System Tables in Special Uses Databases
10(1)
Sybase System Stored Procedures
10(1)
Adaptive Server Installation
11(20)
Step 1: Preparation
12(3)
Logical Page Size
13(1)
Physical Devices
13(1)
Server Names
14(1)
Networking Information
14(1)
Sybase Software Asset Manager
14(1)
Step 2: File Transfer
15(1)
Step 3: Running Installation
15(8)
Interfaces File
16(2)
Runserver File
18(2)
Errorlog File
20(1)
servername.cfg --- Server Configuration File
20(1)
SSL in Adaptive Server
20(2)
Environmental Variables
22(1)
Step 4: Front-End Installation
23(1)
ODBC
24(1)
Starting the Server
24(4)
Normal UNIX Startup
24(1)
Normal NT Startup
25(1)
Manual UNIX Startup
25(1)
Manual UNIX Startup
25(1)
Automatic System Boot
26(1)
Verifying the Server is Running
26(2)
Shutting the Server Down
28(3)
Graceful Shutdowns
28(1)
Shutdown with nowait
28(1)
Maintenance Shutdowns
29(2)
Defining Physical and Sybase-Mirrored Devices to the Server
31(24)
The Need for Devices
31(1)
Logical vs. Physical Devices
31(1)
Performance Implications
32(1)
Creating and Dropping Devices
32(5)
Creating Database Devices
32(3)
Creating Default Devices
35(1)
Dropping Database Devices
36(1)
Raw vs. Filesystem
37(1)
Dsync Option
38(1)
Device Limitations and Restrictions
39(1)
Master Device Creation
39(1)
Building the Master Device
39(1)
Mirroring and Volume Management
40(6)
Sybase Mirroring
40(3)
Disabling Mirroring
43(1)
Unmirroring
44(1)
Remirroring
44(1)
Software- and Hardware-Level Mirroring
45(1)
RAID
45(1)
Volume Management
46(1)
System Info
46(4)
System Procedures
46(2)
System Tables
48(1)
Disaster Recovery
49(1)
Summary
50(1)
For Geeks Like Us
50(5)
Sysdevices
50(5)
Databases
55(16)
System Databases
56(2)
Other Sybase-Provided Databases
57(1)
Creating a Database
58(4)
The create database Command
58(1)
Who Can Create a Database
59(1)
Creating a Default Database
60(1)
Creating Database Logs on Separate Devices
61(1)
Sizing a Database
62(1)
The Alter Database Command
63(1)
Database Options
63(2)
Setting Database Options
65(1)
Accessing Database Information
65(2)
Dropping Databases
67(1)
Database Ownership
67(1)
System Tables
68(3)
sysdatabases
68(1)
sysdevices
69(1)
sysusages
69(2)
Database Logging and Recovery
71(16)
Transactions
71(7)
The Transaction Log
72(1)
Transaction Modes
72(1)
Transaction Control Statements
73(5)
Checkpoint
78(1)
Recovery
79(1)
Recovery Interval
80(1)
When the Transaction Log is Full
80(5)
Thresholds
84(1)
Suspended Transactions
85(1)
Summary
85(2)
Security
87(38)
ASE Security Levels
87(1)
Operating System-Level Security
88(1)
Server-Level Security
88(9)
sp_addlogin Parameters
89(1)
Require Digits in Password
89(1)
Special Logins/Users
90(1)
The Three Standard Roles
91(3)
Dropping Logins
94(1)
The syslogins Table
94(2)
The Kill Command
96(1)
Database-Level Security
97(8)
Guest User
98(1)
Aliases
98(1)
Information on Users and Aliases
99(1)
Access Sequence
99(1)
Database Access
100(1)
Groups
100(1)
The sysusers Table
101(2)
Transporting Databases
103(1)
System Built-in Functions
103(2)
Command Security
105(1)
Object Access
105(17)
Object Permissions
105(2)
Ownership Chains
107(2)
Displaying Permissions
109(1)
Setuser Command
109(1)
Fine-Grained Access Control (FGAC)
109(5)
The Set Proxy Command
114(1)
The System Roles
114(3)
User-Defined Roles
117(5)
Integrated Security Overview
122(1)
Summary
123(2)
Auditing
125(18)
Auditing Overview
125(1)
Installation of Auditing
126(1)
The Sybsecurity Database and Tables
127(3)
Sybsecurity Transaction Log
130(1)
Sybsecurity Stored Procedures
130(4)
sp_audit
130(1)
sp_displayaudit
131(1)
sp_addauditrecord
132(1)
sp_addaudittable
133(1)
The Audit Queue
134(1)
Audit Database Storage Requirements
134(2)
Creating Audit Tables
136(1)
Single-Table Auditing
137(1)
The Audit Table is Full, Help!
138(1)
Archiving Audit Records
138(1)
Querying the Audit Trail
139(2)
Auditing Interaction with Third-Party Software
141(1)
Additional Tips for Effective Auditing
142(1)
Summary
142(1)
Backing Up and Restoring
143(28)
Roles and Responsibilities
144(1)
How Often Should You Back Up a Database?
144(1)
Backup Types
145(1)
Backup Scenario
145(1)
Restore Scenario
146(1)
Backup Server
146(2)
Remote Backup Server
147(1)
Server Identification
148(1)
Starting a Backup Server
148(1)
Dump Devices
148(6)
sp_addumpdevice
149(1)
Dumping the Database
149(3)
Dump Compression
152(1)
Dump Database Summary
153(1)
Automatic Backups
154(1)
Load Database Command
154(2)
Loading a Corrupted Database
155(1)
Online Database
155(1)
Load Database Summary
155(1)
Creating a Database for a Restore
156(1)
Dump Transaction Command
157(3)
Dump Transaction Options
158(1)
Dump Transaction Activities
159(1)
Load Transaction
160(1)
Up-to-the-Minute Recovery
160(2)
Load Transaction
161(1)
Steps
161(1)
Point-in-Time Recovery
162(1)
sp_volchanged
162(1)
Monitoring the Log
163(1)
Last-Chance Threshold
163(1)
Free-Space Thresholds
164(1)
Aborting vs. Suspending Transactions
164(1)
Restoring the Master Database Step by Step
164(2)
Quiesce Database
166(2)
Warm Standby
167(1)
Database Recovery Scenarios
168(2)
Answers for the Scenarios
169(1)
Summary
170(1)
Resource Governor
171(12)
Enabling Resource Limits
172(1)
Time Ranges
172(3)
Adding Time Ranges
173(1)
Simplifying the Creation of Time Ranges
173(1)
Modifying Time Ranges
174(1)
Removing Time Ranges
174(1)
Creating a Limit
175(3)
Choosing a Limit Type
176(1)
Choosing the Type of Enforcement
176(1)
Choosing an Action
177(1)
Choosing a Scope
177(1)
Limit Hierarchies
178(2)
Examples of Limits
178(1)
Viewing Limits
178(1)
Changing Limits
179(1)
Removing Limits
179(1)
System Tables
180(1)
spt_limit_types Table
180(1)
systimeranges Table
180(1)
sysresourcelimits Table
180(1)
Summary
181(2)
Logical Process Manager
183(12)
What is the Logical Process Manager?
183(2)
Logical Process Manager Execution Classes
185(1)
Base Priority
185(1)
Engine Affinity
185(1)
Timeslice (Quantum)
185(1)
Logical Process Manager Objects
186(1)
Logical Process Manager Procedures
186(4)
sp_addexeclass
187(1)
sp_dropexeclass
187(1)
sp_bindexeclass
188(1)
sp_unbindexeclass
189(1)
sp_setpsexe
189(1)
sp_clearpsexe
189(1)
Engine Groups
190(3)
sp_addengine
190(1)
sp_dropengine
191(1)
More Examples
191(2)
Logical Process Manager Conflicts and Precedence
193(1)
Important Exception to the Precedence Rule
194(1)
General Recommendations
194(1)
Configuring and Tuning the Server
195(26)
Pre-12.5 Memory Management
195(1)
12.5 Memory Utilization
196(2)
Logical, Physical, and Max Memory
196(2)
Configuration System Tables
198(21)
sp_configure Output
199(11)
Displaying Configuration Values
210(1)
Configuration File
210(5)
Dynamic vs. Static Options
215(1)
Memory-Related Variables
216(1)
Recommended Configuration Settings
217(2)
Summary
219(2)
Named Cache
221(18)
Data Cache
221(1)
Tuning Cache
221(3)
Buffer Pools
224(1)
Benefits of Named Caches
224(1)
Creating a Named Cache
225(2)
Results Before Cycling the Server
226(1)
Results After Cycling the Server
226(1)
Creating Buffer Pools
227(3)
Using Buffer Pools
227(1)
Wash Area
228(2)
Binding
230(1)
Binding to a Named Cache
230(1)
Dropping Cache Bindings
230(1)
Retrieving Information on Bindings
231(1)
Transaction Performance and Named Caches
231(5)
Spinlocks
231(3)
Cache Notes
234(1)
Benefits of Assigning tempdb to Its Own Data Cache
235(1)
Creating and Configuring Caches and Pools
235(1)
Guidelines for Cache Configuration
236(1)
Tuning Ideas
236(1)
Summary
237(2)
Remote Server Management
239(14)
Remote Access
239(3)
Server Naming
240(1)
Remote Access
240(1)
Login Mapping
241(1)
CIS -- Component Integration Services
242(6)
Remote Server
243(1)
Local Storage
244(1)
Proxy Databases
245(1)
Remote Access Setup Example
246(1)
Using CIS for Remote Procedure Calls
247(1)
ASE Variable Page Size Issues
248(1)
Standard RPC vs. CIS
249(1)
Creating Tables from System Files
250(1)
File Access
251(1)
Summary
251(2)
Preventative Maintenance Regimen
253(44)
Periodic Maintenance
253(1)
Server-Level Maintenance
253(12)
Activity Monitoring
254(2)
What to Monitor
256(3)
Monitoring the System Errorlog
259(5)
Resource Verification
264(1)
Software Maintenance
264(1)
Recording Run-Time Data
265(1)
Database-Level Maintenance
265(29)
Scheduling Database Maintenance
266(1)
How to Run dbcc
267(9)
Understanding the Output from dbcc Commands
276(1)
Using dbcc checkstorage
277(5)
Planning the dbccdb Database
282(1)
Creating the dbccdb Database
282(3)
Maintaining dbccdb
285(2)
Generating Reports from dbccdb
287(5)
Database Dumps
292(1)
Disaster Recovery
292(1)
Log Management
292(1)
Space Management
293(1)
Script Maintenance
293(1)
Verifying Dumps
293(1)
Table-level Maintenance
294(1)
Updating Statistics
294(1)
The 255-byte Rule
294(1)
Monitoring Space Utilization
294(1)
Summary
295(2)
Troubleshooting
297(30)
The Server Will Not Come Up
297(1)
Some Users Claim the Server Stopped
297(1)
Server is Up, but Some Users Cannot Gain Access
298(1)
Processing Slows Down or Stops
298(1)
Some Database or Databases Cannot be Accessed
298(1)
Users Cannot Access Objects
299(1)
From the Troubleshooting Guide
299(26)
Disaster Recovery Tasks
299(7)
Avoiding Disaster through Good DBA Practices
306(4)
Online Recovery and Recovery Fault Isolation
310(3)
What to Do When Online Recovery Fails
313(1)
Restoring from Backups
313(4)
How to Manually Change Sort Order or Default Character Set
317(5)
Useful dbcc Commands
322(3)
Summary
325(2)
Tools
327(6)
bcp
327(2)
defncopy
329(1)
optdiag
329(1)
Sybase Central
330(3)
Appendix A CSPDBA Sample Test 333(6)
Appendix B CSPDBA Sample Test Answers 339(14)
Appendix C Tips 353(50)
Appendix D Other Resources 403(2)
Appendix E Tuning Sybase ASE Using Solid State Accelerators 405(8)
Appendix F Fragmentation and Database Performance 413(18)
Appendix G Disaster Recovery: A Practical Handbook 431(34)
Index 465