Muutke küpsiste eelistusi

Database Processing: Fundamentals, Design, and Implementation 15th edition [Kõva köide]

  • Formaat: Hardback, 688 pages, kõrgus x laius x paksus: 279x218x30 mm, kaal: 1497 g
  • Ilmumisaeg: 06-Feb-2018
  • Kirjastus: Pearson
  • ISBN-10: 0134802748
  • ISBN-13: 9780134802749
Teised raamatud teemal:
  • Formaat: Hardback, 688 pages, kõrgus x laius x paksus: 279x218x30 mm, kaal: 1497 g
  • Ilmumisaeg: 06-Feb-2018
  • Kirjastus: Pearson
  • ISBN-10: 0134802748
  • ISBN-13: 9780134802749
Teised raamatud teemal:

For undergraduate database management courses.

 

Getting straight to the point of database processing

Database Processing: Fundamentals, Design, and Implementation, 15th Edition, is a thorough and modern look at database processing fundamentals that’s designed to get readers straight to the point. This 40th anniversary edition has been refined and updated to reflect contemporary teaching and professional workplace environments and methods, address the latest software, and expand upon new and emerging developments in the database processing field – such as cloud computing and Big Data.

Foreword to the 40th Anniversary Edition xvii
Preface xxv
Part 1 Getting Started 1(144)
Chapter 1 Introduction
2(36)
Objectives
2(1)
The Importance of Databases in the Internet and Smartphone World
3(2)
The Characteristics of Databases
5(5)
A Note on Naming Conventions
7(1)
A Database Has Data and Relationships
7(2)
Databases Create Information
9(1)
Database Examples
10(1)
Single-User Database Applications
10(1)
Multiuser Database Applications
10(1)
E-Commerce Database Applications
11(1)
Reporting and Data Mining Database Applications
11(1)
The Components of a Database System
11(7)
Database Applications and SQL
12(3)
The DBMS
15(1)
The Database
16(2)
Personal Versus Enterprise-Class Database Systems
18(3)
What Is Microsoft Access?
18(1)
What Is an Enterprise-Class Database System?
19(2)
Database Design
21(3)
Database Design from Existing Data
21(2)
Database Design for New Systems Development
23(1)
Database Redesign
23(1)
What You Need to Learn
24(1)
A Brief History of Database Processing
25(5)
The Early Years
25(2)
The Emergence and Dominance of the Relational Model
27(1)
Postrelational Developments
28(2)
Summary
30(1)
Key Terms
31(1)
Review Questions
32(2)
Exercises
34(4)
Chapter 2 Introduction to Structured Query Language
38(107)
Objectives
38(1)
Cape Codd Outdoor Sports
39(1)
Business Intelligence Systems and Data Warehouses
40(7)
The Cape Codd Outdoor Sports Extracted Retail Sales Data Database
41(3)
The RETAIL_ORDER Table
44(1)
The ORDER_ITEM Table
44(1)
The SKU_DATA Table
45(1)
The BUYER Table
45(1)
The CATALOG_SKU_20## Tables
46(1)
The Complete Cape Codd Data Extract Schema
46(1)
Data Extracts Are Common
47(1)
SQL Background
47(2)
The SQL SELECT/FROM/WHERE Framework
49(3)
Reading Specified Columns from a Single Table
49(2)
Specifying Column Order in SQL Queries from a Single Table
51(1)
Submitting SQL Statements to the DBMS
52(14)
Using SQL in Microsoft Access 2016
52(6)
Using SQL in Microsoft SQL Server 2017
58(3)
Using SQL in Oracle Database
61(2)
Using SQL in Oracle MySQL 5.7
63(3)
SQL Enhancements for Querying a Single Table
66(14)
Reading Specified Rows from a Single Table
66(4)
Reading Specified Columns and Rows from a Single Table
70(1)
Sorting the SQL Query Results
70(3)
SQL WHERE Clause Options
73(7)
Performing Calculations in SQL Queries
80(8)
Using SQL Built-in Aggregate Functions
81(4)
SQL Expressions in SQL SELECT Statements
85(3)
Grouping Rows in SQL SELECT Statements
88(5)
Querying Two or More Tables with SQL
93(22)
Querying Multiple Tables with Subqueries
93(3)
Querying Multiple Tables with Joins
96(6)
Comparing Subqueries and Joins
102(1)
The SQL JOIN ON Syntax
102(4)
SQL Queries on Recursive Relationships
106(1)
Outer Joins
107(4)
Using SQL Set Operators
111(4)
Summary
115(1)
Key Terms
116(1)
Review Questions
117(7)
Exercises
124(5)
Case Questions
129(4)
The Queen Anne Curiosity Shop Project Questions
133(7)
Morgan Importing Project Questions
140(5)
Part 2 Database Design 145(178)
Chapter 3 The Relational Model and Normalization
146(45)
Objectives
146(2)
Relational Model Terminology
148(13)
Relations
148(1)
Characteristics of Relations
149(2)
Alternative Terminology
151(1)
To Key, or Not to Key-That Is the Question!
152(1)
Functional Dependencies
152(2)
Finding Functional Dependencies
154(3)
Keys
157(4)
Normal Forms
161(20)
Modification Anomalies
161(1)
A Short History of Normal Forms
162(1)
Normalization Categories
163(1)
From First Normal Form to Boyce-Codd Normal Form Step by Step
164(3)
Eliminating Anomalies from Functional Dependencies with BCNF
167(10)
Eliminating Anomalies from Multivalued Dependencies
177(4)
Fifth Normal Form
181(1)
Domain/Key Normal Form
181(1)
Summary
181(1)
Key Terms
182(1)
Review Questions
183(2)
Exercises
185(1)
Case Questions
186(1)
The Queen Anne Curiosity Shop Project Questions
187(2)
Morgan Importing Project Questions
189(2)
Chapter 4 Database Design Using Normalization
191(21)
Objectives
191(1)
Assess Table Structure
192(1)
Designing Updatable Databases
193(4)
Advantages and Disadvantages of Normalization
193(1)
Functional Dependencies
194(1)
Normalizing with SQL
194(2)
Choosing Not to Use BCNF
196(1)
Multivalued Dependencies
196(1)
Designing Read-Only Databases
197(3)
Denormalization
197(1)
Customized Duplicated Tables
198(2)
Common Design Problems
200(5)
The Multivalue, Multicolumn Problem
200(2)
Inconsistent Values
202(1)
Missing Values
203(1)
The General-Purpose Remarks Column
204(1)
Summary
205(1)
Key Terms
206(1)
Review Questions
206(2)
Exercises
208(1)
Case Questions
209(1)
The Queen Anne Curiosity Shop Project Questions
209(1)
Morgan Importing Project Questions
210(2)
Chapter 5 Data Modeling with the Entity-Relationship Model
212(55)
Objectives
212(1)
The Purpose of a Data Model
213(1)
The Entity-Relationship Model
213(14)
Entities
214(1)
Attributes
214(1)
Identifiers
214(1)
Relationships
215(2)
Maximum Cardinality
217(1)
Minimum Cardinality
218(1)
Entity-Relationship Diagrams and Their Versions
219(1)
Variations of the E-R Model
219(1)
E-R Diagrams Using the IE Crow's Foot Model
220(2)
Strong Entities and Weak Entities
222(1)
ID-Dependent Entities
222(1)
Non-ID-Dependent Weak Entities
223(1)
The Ambiguity of the Weak Entity
224(1)
Subtype Entities
225(2)
Patterns in Forms, Reports, and E-R Models
227(18)
Strong Entity Relationship Patterns
228(3)
ID-Dependent Relationship Patterns
231(7)
Mixed Identifying and Nonidentifying Relationship Patterns
238(3)
The For-Use-By Subtype Pattern
241(1)
Recursive Relationship Patterns
242(3)
The Data Modeling Process
245(7)
The College Report
246(1)
The Department Report
247(2)
The Department/Major Report
249(1)
The Student Acceptance Letter
249(3)
Summary
252(1)
Key Terms
253(1)
Review Questions
253(3)
Exercises
256(6)
Case Questions
262(3)
The Queen Anne Curiosity Shop Project Questions
265(1)
Morgan Importing Project Questions
265(2)
Chapter 6 Transforming Data Models into Database Designs
267(56)
Objectives
267(1)
The Purpose of a Database Design
268(1)
Create a Table for Each Entity
268(11)
Selecting the Primary Key
268(3)
Specifying Alternate Keys
271(1)
Specifying Column Properties
271(7)
Verify Normalization
278(1)
Create Relationships
279(17)
Relationships Between Strong Entities
279(4)
Relationships Using ID-Dependent Entities
283(4)
Relationships with a Weak Non-ID-Dependent Entity
287(1)
Relationships in Mixed Entity Designs
288(1)
Relationships Between Supertype and Subtype Entities
289(1)
Recursive Relationships
290(2)
Representing Ternary and Higher-Order Relationships
292(3)
Relational Representation of the Highline University Data Model
295(1)
Design for Minimum Cardinality
296(9)
Actions when the Parent Is Required
297(2)
Actions when the Child Is Required
299(1)
Implementing Actions for M-O Relationships
300(1)
Implementing Actions for O-M Relationships
301(1)
Implementing Actions for M-M Relationships
301(1)
Designing Special Case M-M Relationships
302(1)
Documenting the Minimum Cardinality Design
302(2)
An Additional Complication
304(1)
Summary of Minimum Cardinality Design
304(1)
The View Ridge Gallery Database
305(8)
View Ridge Gallery Database Summary of Requirements
305(1)
The View Ridge Data Model
306(1)
Database Design with Data Keys
307(1)
Minimum Cardinality Enforcement for Required Parents
308(2)
Minimum Cardinality Enforcement for the Required Child
310(1)
Column Properties for the View Ridge Database Design Tables
311(2)
Summary
313(3)
Key Terms
316(1)
Review Questions
316(2)
Exercises
318(1)
Case Questions
319(2)
The Queen Anne Curiosity Shop Project Questions
321(1)
Morgan Importing Project Questions
321(2)
Part 3 Database Implementation 323(130)
Chapter 7 SQL for Database Construction and Application Processing
324(100)
Objectives
324(1)
The Importance of Working with an Installed DBMS Product
325(1)
The View Ridge Gallery Database
325(1)
SQL DDL and DML
325(2)
Managing Table Structure with SQL DDL
327(15)
Creating the VRG Database
327(1)
Using SQL Scripts
327(1)
Using the SQL CREATE TABLE Statement
328(1)
Variations in SQL Data Types and SQUPSM
329(1)
Creating the VRG Database ARTIST Table
329(3)
Creating the VRG Database WORK Table and the 1: N ARTIST-to-WORK Relationship
332(1)
Implementing Required Parent Rows
333(1)
Implementing 1:1 Relationships
334(1)
Casual Relationships
334(1)
Creating Default Values and Data Constraints with SQL
335(1)
Creating the VRG Database Tables
336(4)
The SQL ALTER TABLE Statement
340(1)
The SQL DROP TABLE Statement
340(1)
The SQL TRUNCATE TABLE Statement
341(1)
The SQL CREATE INDEX Statement
341(1)
SQL DML Statements
342(10)
The SQL, INSERT Statement
342(1)
Populating the VRG Database Tables
343(6)
The SQL UPDATE Statement
349(1)
The SQL MERGE Statement
350(1)
The SQL DELETE Statement
351(1)
Using SQL Views
352(10)
Using SQL Views to Hide Columns and Rows
355(1)
Using SQL Views to Display Results of Computed Columns
356(1)
Using SQL Views to Hide Complicated SQL Syntax
357(1)
Layering Built-in Functions
358(2)
Using SQL Views for Isolation, Multiple Permissions, and Multiple Triggers
360(1)
Updating SQL Views
361(1)
Embedding SQL in Program Code
362(16)
Persistent Stored Modules (SQL/PSM)
364(1)
Using SQL User-Defined Functions
364(3)
Using SQL Triggers
367(6)
Using Stored Procedures
373(3)
Comparing User-Defined Functions, Triggers, and Stored Procedures
376(2)
Summary
378(2)
Key Terms
380(1)
Review Questions
381(10)
Exercises
391(4)
Case Questions
395(14)
The Queen Anne Curiosity Shop Project Questions
409(7)
Morgan Importing Project Questions
416(8)
Chapter 8 Database Redesign
424(29)
Objectives
424(1)
The Need for Database Redesign
425(1)
SQL Statements for Checking Functional Dependencies
425(6)
What Is a Correlated Subquery?
426(5)
How Do I Analyze an Existing Database?
431(3)
Reverse Engineering
432(1)
Dependency Graphs
433(1)
Database Backup and Test Databases
433(1)
Changing Table Names and Table Columns
434(4)
Changing Table Names
434(2)
Adding and Dropping Columns
436(1)
Changing a Column Data Type or Column Constraints
437(1)
Adding and Dropping Constraints
438(1)
Changing Relationship Cardinalities
438(4)
Changing Minimum Cardinalities
438(1)
Changing Maximum Cardinalities
439(3)
Adding and Deleting Tables and Relationships
442(1)
Forward Engineering
443(1)
Summary
443(2)
Key Terms
445(1)
Review Questions
445(2)
Exercises
447(1)
Case Questions
448(1)
The Queen Anne Curiosity Shop Project Questions
449(1)
Morgan Importing Project Questions
450(3)
Part 4 Multiuser Database Processing 453(44)
Chapter 9 Managing Multiuser Databases
454(36)
Objectives
454(1)
The Importance of Working with an Installed DBMS Product
455(1)
Database Administration
455(2)
Managing the Database Structure
456(1)
Concurrency Control
457(13)
The Need for Atomic Transactions
458(3)
Resource Locking
461(2)
Optimistic Versus Pessimistic Locking
463(1)
SQL Transaction Control Language and Declaring Lock Characteristics
464(2)
Implicit and Explicit Commit Transaction
466(1)
Consistent Transactions
466(1)
Transaction Isolation Level
467(1)
SQL Cursors
468(2)
Database Security
470(5)
Processing Rights and Responsibilities
470(1)
DBMS Security
471(1)
DBMS Security Guidelines
472(2)
Application Security
474(1)
The SQL Injection Attack
475(1)
Database Backup and Recovery
475(4)
Recovery via Reprocessing
476(1)
Recovery via Rollback/Rollforward
476(3)
Managing the DBMS
479(1)
Maintaining the Data Repository
480(1)
Summary
481(1)
Key Terms
482(1)
Review Questions
483(1)
Exercises
484(1)
Case Questions
485(1)
The Queen Anne Curiosity Shop Project Questions
486(2)
Morgan Importing Project Questions
488(2)
Chapter 10 Managing Databases with Microsoft SQL Server 2017, Oracle Database, and MySQL 5.7
490(7)
Objectives
490(1)
Installing the DBMS
491(1)
Using the DBMS Database Administration and Database Development Utilities
492(1)
Creating a Database
492(1)
Creating and Running SQL Scripts
492(1)
Reviewing the Database Structure in the DBMS GUI Utility
493(1)
Creating and Populating the View Ridge Gallery VRG Database Tables
493(1)
Creating SQL Views for the View Ridge Gallery VRG Database
493(1)
Importing Microsoft Excel Data into a Database Table
493(1)
Database Application Logic and SQL/Persistent Stored Modules (SQL/PSM)
493(1)
DBMS Concurrency Control
494(1)
DBMS Security
494(1)
DBMS Database Backup and Recovery
494(1)
Other DBMS Topics Not Discussed
494(1)
Choose Your DBMS Product(s)!
495(1)
Summary
495(1)
Key Terms
496(1)
Exercises
496(1)
Chapter 10A Managing Databases with Microsoft SQL Server 2017 Online
Chapter
Chapter 10B Managing Databases with Oracle Database Online
Chapter
Chapter 10C Managing Databases with MySQL 5.7 Online
Chapter
Part 5 Database Access Standards 497(123)
Chapter 11 The Web Server Environment
498(71)
Objectives
498(2)
A Web Database Application for the View Ridge Gallery
500(1)
The Web Database Processing Environment
501(1)
Database Server Access Standards
502(1)
The ODBC Standard
503(9)
ODBC Architecture
504(1)
Conformance Levels
505(1)
Creating an ODBC Data Source Name
506(6)
The Microsoft .NET Framework and ADO.NET
512(11)
OLE DB
514(4)
ADO and ADO.NET
518(1)
The ADO.NET Object Model
518(5)
The Java Platform
523(4)
JDBC
523(2)
Java Server Pages (JSP) and Servlets
525(1)
Apache Tomcat
525(2)
Web Database Processing with PHP
527(13)
Web Database Processing with PHP and the NetBeans IDE
527(3)
Getting Started with HTML Web Pages
530(1)
The index.html Web Page
530(1)
Creating the index.html Web Page
530(3)
Using PHP
533(7)
Web Page Examples with PHP
540(15)
Example 1: Updating a Table
541(4)
Example 2: Using PHP Data Objects (PDO)
545(1)
Example 3: Invoking a Stored Procedure
546(7)
Challenges for Web Database Processing
553(1)
SQL Injection Attacks
554(1)
Extensible Markup Language (XML)
555(2)
The Importance of XML
555(1)
XML as a Markup Language
556(1)
Creating XML Documents from Database Data
557(1)
Using the SQL SELECT...FOR XML Statement
557(2)
Summary
559(2)
Key Terms
561(1)
Review Questions
562(3)
Exercises
565(2)
Case Questions
567(1)
The Queen Anne Curiosity Shop Project Questions
567(1)
Morgan Importing Project Questions
568(1)
Chapter 12 Data Warehouses, Business Intelligence Systems, and Big Data
569(51)
Objectives
569(2)
Business Intelligence Systems
571(1)
The Relationship Between Operational and BI Systems
571(1)
Reporting Systems and Data Mining Applications
571(2)
Reporting Systems
572(1)
Data Mining Applications
573(1)
Data Warehouses and Data Marts
573(13)
Components of a Data Warehouse
573(4)
Data Warehouses Versus Data Marts
577(1)
Dimensional Databases
578(8)
Reporting Systems
586(11)
RFM Analysis
586(2)
OLAP
588(9)
Data Mining
597(2)
Distributed Database Processing
599(2)
Types of Distributed Databases
599(1)
Challenges of Distributed Databases
600(1)
Object-Relational Databases
601(1)
Virtualization
602(1)
Cloud Computing
603(4)
Big Data and the Not Only SQL Movement
607(4)
Column Family Databases
608(2)
MapReduce
610(1)
Hadoop
610(1)
Summary
611(2)
Key Terms
613(1)
Review Questions
614(2)
Exercises
616(1)
Case Questions
617(1)
The Queen Anne Curiosity Shop Project Questions
618(1)
Morgan Importing Project Questions
619(1)
Online Appendices 620(1)
Bibliography 621(2)
Glossary 623(16)
Index 639
About our authors David M. Kroenke has more than 50 years of experience in the computer industry. He began as a computer programmer for the U.S. Air Force, working both in Los Angeles and at the Pentagon, where he developed one of the world's first DBMS products while part of a team that created a computer simulation of World War III. That simulation served a key role for strategic weapons studies during a 10-year period of the Cold War.

From 1973 to 1978, Kroenke taught in the College of Business at Colorado State University. In 1977 he published the first edition ofDatabase Processing,a significant and successful textbook that, more than 40 years later, you now are reading in its16th Edition. In 1978, he left Colorado State and joined Boeing Computer Services, where he managed the team that designed data-base management components of the IPAD project. After that, he joined with Steve Mitchell to form Mitchell Publishing and worked as an editor and author, developing texts, videos, and other educational products and seminars. Mitchell Publishing was acquired by Random House in 1986. During those years, he also worked as an independent consultant, primarily as a data-base disaster repairman helping companies recover from failed database projects.

In 1982, Kroenke was one of the founding directors of the Microrim Corporation. From 1984 to 1987, he served as the Vice President of Product Marketing and Development and managed the team that created and marketed the DBMS product RBASE 5000 as well as other related products.

For the next five years, Kroenke worked independently while he developed a new data modeling language called thesemantic object model.He licensed this technology to the Wall Data Corporation in 1992 and then served as the Chief Technologist for Wall Data's Salsa line of products. He was awarded three software patents on this technology.

Since 1998, Kroenke has continued consulting and writing. His current interests concern the practical applications of data mining techniques on large organizational databases. An avid sailor, he wroteKnow Your Boat: The Guide to Everything That Makes Your Boat Work,which was published by McGraw-Hill in 2002.

David J. Auer has more than 30 years of experience teaching college-level business and information systems courses and for over 20 years has worked professionally in the field of information technology. He served as a commissioned officer in the U.S. Air Force, with assignments to NORAD and the Alaskan Air Command in air defense operations. He later taught both business administration and music classes at Whatcom Community College and business courses for the Chapman College Residence Education Center at Whidbey Island Naval Air Station. He was a founder of the Puget Sound Guitar Workshop (now in its 41st year of operations). He worked as a psychotherapist and organizational development consultant for the Whatcom Counseling and Psychiatric Clinic's Employee Assistance Program and provided training for the Washington State Department of Social and Health Services. He taught for Western Washington University's College of Business and Economics from 1981 to June 2015 and served as the college's Director of Information Systems and Technology Services from 1994 to 2014. Now a Senior Instructor Emeritus at Western Washington University, he continues his writing projects.

Scott L. Vandenberg has over 27 years' experience teaching computer science to college students in computer science and business. Before completing his PhD, he worked for brief periods at Standard Oil Research, Procter & Gamble headquarters, and IBM Research. He taught for two years at the University of Massachusetts-Amherst before joining the faculty at Siena College in 1993. His main teaching interests are in the areas of database management systems and introductory computer science, with research, consulting, and publications focused on those areas as well. Some of his earlier scholarly work included development of data models, query languages, and algebras for object-oriented databases and databases involving sequential and tree-structured data. More recent research has involved applying database technology to help solve data science problems in the areas of biology and epidemiology. He has also published several papers relating to introductory computer science curricula and was a co-principal investigator on a multiyear NSF grant to develop methods to broaden participation and increase retention in computer science. Vandenberg has published over 20 papers related to his scholarly activity.