|
|
|
|
3 | (1) |
|
Chapter 1 Database Systems |
|
|
4 | (28) |
|
|
5 | (1) |
|
|
5 | (2) |
|
1.3 Introducing the Database |
|
|
7 | (4) |
|
1.3.1 Role and Advantages of the DBMS |
|
|
7 | (2) |
|
|
9 | (2) |
|
1.4 Why Database Design is Important |
|
|
11 | (2) |
|
1.5 Evolution of File System Data Processing |
|
|
13 | (4) |
|
1.5.1 Manual File Systems |
|
|
13 | (1) |
|
1.5.2 Computerized File Systems |
|
|
14 | (2) |
|
1.5.3 File System Redux: Modern End-User Productivity Tools |
|
|
16 | (1) |
|
1.6 Problems with File System Data Processing |
|
|
17 | (3) |
|
1.6.1 Structural and Data Dependence |
|
|
18 | (1) |
|
|
18 | (1) |
|
1.6.3 Lack of Design and Data-Modeling Skills |
|
|
19 | (1) |
|
|
20 | (6) |
|
1.7.1 The Database System Environment |
|
|
21 | (2) |
|
|
23 | (3) |
|
1.7.3 Managing the Database System: A Shift in Focus |
|
|
26 | (1) |
|
1.8 Preparing for Your Database Professional Career |
|
|
26 | (6) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (2) |
|
|
32 | (31) |
|
2.1 Data Modeling and Data Models |
|
|
33 | (1) |
|
2.2 The Importance of Data Models |
|
|
33 | (1) |
|
2.3 Data Model Basic Building Blocks |
|
|
34 | (1) |
|
|
35 | (2) |
|
2.4.1 Discovering Business Rules |
|
|
36 | (1) |
|
2.4.2 Translating Business Rules into Data Model Components |
|
|
36 | (1) |
|
|
37 | (1) |
|
2.5 The Evolution of Data Models |
|
|
37 | (15) |
|
2.5.1 Hierarchical and Network Models |
|
|
38 | (1) |
|
2.5.2 The Relational Model |
|
|
39 | (2) |
|
2.5.3 The Entity Relationship Model |
|
|
41 | (3) |
|
2.5.4 The Object-Oriented (OO) Model |
|
|
44 | (1) |
|
2.5.5 Object/Relational and XML |
|
|
45 | (1) |
|
2.5.6 Emerging Data Models: Big Data and NoSQL |
|
|
46 | (3) |
|
2.5.7 Data Models: A Summary |
|
|
49 | (3) |
|
2.6 Degrees of Data Abstraction |
|
|
52 | (11) |
|
|
52 | (2) |
|
2.6.2 The Conceptual Model |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (4) |
|
|
|
|
63 | (1) |
|
Chapter 3 The Relational Database Model |
|
|
64 | (41) |
|
3.1 A Logical View of Data |
|
|
65 | (3) |
|
3.1.1 Tables and Their Characteristics |
|
|
65 | (3) |
|
|
68 | (3) |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
71 | (2) |
|
3.4 Relational Set Operators |
|
|
73 | (6) |
|
3.5 The Data Dictionary and the System Catalog |
|
|
79 | (2) |
|
3.6 Relationships within the Relational Database |
|
|
81 | (8) |
|
3.6.1 The I:M Relationship |
|
|
81 | (2) |
|
3.6.2 The I:I Relationship |
|
|
83 | (2) |
|
3.6.3 The M:N Relationship |
|
|
85 | (4) |
|
3.7 Data Redundancy Revisited |
|
|
89 | (3) |
|
|
92 | (1) |
|
3.9 Codd's Relational Database Rules |
|
|
93 | (12) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (2) |
|
|
98 | (7) |
|
Chapter 4 Entity Relationship (ER) Modeling |
|
|
105 | (47) |
|
4.1 The Entity Relationship Model (ERM) |
|
|
106 | (23) |
|
|
106 | (1) |
|
|
107 | (5) |
|
|
112 | (1) |
|
4.1.4 Connectivity and Cardinality |
|
|
113 | (1) |
|
4.1.5 Existence Dependence |
|
|
114 | (1) |
|
4.1.6 Relationship Strength |
|
|
114 | (2) |
|
|
116 | (3) |
|
4.1.8 Relationship Participation |
|
|
119 | (3) |
|
4.1.9 Relationship Degree |
|
|
122 | (1) |
|
4.1.10 Recursive Relationships |
|
|
123 | (4) |
|
4.1.11 Associative (Composite) Entities |
|
|
127 | (2) |
|
4.2 Developing an ER Diagram |
|
|
129 | |
|
4.3 Database Design Challenges: Conflicting Goals J |
|
|
36 | (116) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (2) |
|
|
143 | (3) |
|
|
146 | (6) |
|
Chapter 5 Advanced Data Modeling |
|
|
152 | (28) |
|
5.1 The Extended Entity Relationship Model |
|
|
153 | (6) |
|
5.1.1 Entity Supertypes and Subtypes |
|
|
153 | (1) |
|
5.1.2 Specialization Hierarchy |
|
|
154 | (1) |
|
|
155 | (1) |
|
5.1.4 Subtype Discriminator |
|
|
156 | (1) |
|
5.1.5 Disjoint and Overlapping Constraints |
|
|
156 | (2) |
|
5.1.6 Completeness Constraint |
|
|
158 | (1) |
|
5.1.7 Specialization and Generalization |
|
|
159 | (1) |
|
|
159 | (1) |
|
5.3 Entity Integrity: Selecting Primary Keys |
|
|
160 | (4) |
|
5.3.1 Natural Keys and Primary Keys |
|
|
161 | (1) |
|
5.3.2 Primary Key Guidelines |
|
|
161 | (1) |
|
5.3.3 When to Use Composite Primary Keys |
|
|
161 | (2) |
|
5.3.4 When to Use Surrogate Primary Keys |
|
|
163 | (1) |
|
5.4 Design Cases: Learning Flexible Database Design |
|
|
164 | (16) |
|
5.4.1 Design Case I: Implementing I:I Relationships |
|
|
165 | (1) |
|
5.4.2 Design Case 2: Maintaining History of Time-Variant Data |
|
|
166 | (2) |
|
5.4.3 Design Case 3: Fan Traps |
|
|
168 | (2) |
|
5.4.4 Design Case 4: Redundant Relationships |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (6) |
|
Chapter 6 Normalization of Database Tables |
|
|
180 | (45) |
|
6.1 Database Tables and Normalization |
|
|
181 | (1) |
|
6.2 The Need for Normalization |
|
|
181 | (4) |
|
6.3 The Normalization Process |
|
|
185 | (8) |
|
6.3.1 Conversion to First Normal Form |
|
|
186 | (4) |
|
6.3.2 Conversion to Second Normal Form |
|
|
190 | (1) |
|
6.3.3 Conversion to Third Normal Form |
|
|
191 | (2) |
|
|
193 | (4) |
|
6.5 Surrogate Key Considerations |
|
|
197 | (1) |
|
6.6 Higher-Level Normal Forms |
|
|
198 | (5) |
|
6.6.1 The Boyce-Codd Normal Form |
|
|
198 | (3) |
|
6.6.2 Fourth Normal Form (4NF) |
|
|
201 | (2) |
|
6.7 Normalization and Database Design |
|
|
203 | (4) |
|
|
207 | (3) |
|
6.9 Data-Modeling Checklist |
|
|
210 | (15) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (11) |
|
PART III ADVANCED DESIGN AND IMPLEMENTATION |
|
|
|
|
225 | (1) |
|
Chapter 7 Introduction to Structured query Language (SQL) |
|
|
226 | (84) |
|
|
227 | (2) |
|
7.2 Data Definition Commands |
|
|
229 | (14) |
|
|
229 | (2) |
|
7.2.2 Creating the Database |
|
|
231 | (1) |
|
7.2.3 The Database Schema |
|
|
231 | (1) |
|
|
232 | (2) |
|
7.2.5 Creating Table Structures |
|
|
234 | (4) |
|
|
238 | (3) |
|
|
241 | (2) |
|
7.3 Data Manipulation Commands |
|
|
243 | (5) |
|
|
243 | (1) |
|
7.3.2 Saving Table Changes |
|
|
244 | (1) |
|
|
244 | (2) |
|
7.3.4 Updating Table Rows |
|
|
246 | (1) |
|
7.3.5 Restoring Table Contents |
|
|
246 | (1) |
|
7.3.6 Deleting Table Rows |
|
|
247 | (1) |
|
7.3.7 Inserting Table Rows with a Select Subquery |
|
|
248 | (1) |
|
|
248 | (11) |
|
7.4.1 Selecting Rows with Conditional Restrictions |
|
|
248 | (5) |
|
7.4.2 Arithmetic Operators: The Rule of Precedence |
|
|
253 | (1) |
|
7.4.3 Logical Operators: AND, OR, and NOT |
|
|
253 | (2) |
|
|
255 | (4) |
|
7.5 Additional Data Definition Commands |
|
|
259 | (6) |
|
7.5.1 Changing a Column's Data Type |
|
|
259 | (1) |
|
7.5.2 Changing a Column's Data Characteristics |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
7.5.5 Advanced Data Updates |
|
|
261 | (2) |
|
7.5.6 Copying Parts of Tables |
|
|
263 | (1) |
|
7.5.7 Adding Primary and Foreign Key Designations |
|
|
264 | (1) |
|
7.5.8 Deleting a Table from the Database |
|
|
265 | (1) |
|
7.6 Additional Select Query Keywords |
|
|
265 | (10) |
|
|
265 | (2) |
|
7.6.2 Listing Unique Values |
|
|
267 | (1) |
|
7.6.3 Aggregate Functions |
|
|
267 | (5) |
|
|
272 | (3) |
|
7.7 Joining Database Tables |
|
|
275 | (35) |
|
7.7.1 Joining Tables with an Alias |
|
|
278 | (1) |
|
|
278 | (2) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (17) |
|
|
299 | (11) |
|
|
310 | (85) |
|
|
311 | (8) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (3) |
|
8.2 Subqueries and Correlated Queries |
|
|
319 | (13) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
8.2.4 Multirow Subquery Operators: ANY and ALL |
|
|
324 | (1) |
|
|
325 | (1) |
|
8.2.6 Attribute List Subqueries |
|
|
326 | (2) |
|
8.2.7 Correlated Subqueries |
|
|
328 | (4) |
|
|
332 | (6) |
|
8.3.1 Date and Time Functions |
|
|
332 | (3) |
|
|
335 | (1) |
|
|
335 | (1) |
|
8.3.4 Conversion Functions |
|
|
336 | (2) |
|
8.4 Relational Set Operators |
|
|
338 | (8) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
342 | (2) |
|
8.4.5 Syntax Alternatives |
|
|
344 | (2) |
|
8.5 Virtual Tables: Creating a View |
|
|
346 | (5) |
|
|
348 | (3) |
|
|
351 | (3) |
|
|
354 | (23) |
|
|
359 | (9) |
|
|
368 | (6) |
|
8.7.3 PL/SQL Processing with Cursors |
|
|
374 | (3) |
|
8.7.4 PL/SQL Stored Functions |
|
|
377 | (1) |
|
|
377 | (18) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (9) |
|
|
393 | (2) |
|
Chapter 9 Database design |
|
|
395 | (41) |
|
9.1 The Information System |
|
|
396 | (1) |
|
9.2 The Systems Development Life Cycle |
|
|
397 | (4) |
|
|
398 | (1) |
|
|
399 | (1) |
|
9.2.3 Detailed Systems Design |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
9.3 The Database Life Cycle |
|
|
401 | (12) |
|
9.3.1 The Database Initial Study |
|
|
401 | (4) |
|
|
405 | (2) |
|
9.3.3 Implementation and Loading |
|
|
407 | (2) |
|
9.3.4 Testing and Evaluation |
|
|
409 | (3) |
|
|
412 | (1) |
|
9.3.6 Maintenance and Evolution |
|
|
412 | (1) |
|
|
413 | (9) |
|
9.4.1 Data Analysis and Requirements |
|
|
414 | (2) |
|
9.4.2 Entity Relationship Modeling and Normalization |
|
|
416 | (3) |
|
9.4.3 Data Model Verification |
|
|
419 | (3) |
|
9.4.4 Distributed Database Design |
|
|
422 | (1) |
|
9.5 DBMS Software Selection |
|
|
422 | (1) |
|
|
423 | (3) |
|
9.6.1 Map the Conceptual Model to the Logical Model |
|
|
423 | (2) |
|
9.6.2 Validate the Logical Model Using Normalization |
|
|
425 | (1) |
|
9.6.3 Validate Logical Model Integrity Constraints |
|
|
425 | (1) |
|
9.6.4 Validate the Logical Model Against User Requirements |
|
|
426 | (1) |
|
|
426 | (2) |
|
9.7.1 Define Data Storage Organization |
|
|
426 | (1) |
|
9.7.2 Define Integrity and Security Measures |
|
|
427 | (1) |
|
9.7.3 Determine Performance Measures |
|
|
427 | (1) |
|
9.8 Database Design Strategies |
|
|
428 | (1) |
|
9.9 Centralized vs. Decentralized Design |
|
|
429 | (7) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
433 | (2) |
|
|
435 | (1) |
|
PART IV ADVANCED DATABASE CONCEPTS |
|
|
|
Chapter 10 Transaction Management and Concurrency Control |
|
|
436 | (31) |
|
10.1 What is a Transaction? |
|
|
437 | (6) |
|
10.1.1 Evaluating Transaction Results |
|
|
438 | (3) |
|
10.1.2 Transaction Properties |
|
|
441 | (1) |
|
10.1.3 Transaction Management with SQL |
|
|
442 | (1) |
|
10.1.4 The Transaction Log |
|
|
442 | (1) |
|
|
443 | (5) |
|
|
444 | (1) |
|
|
445 | (1) |
|
10.2.3 Inconsistent Retrievals |
|
|
446 | (1) |
|
|
447 | (1) |
|
10.3 Concurrency Control with Locking Methods |
|
|
448 | (7) |
|
|
449 | (3) |
|
|
452 | (1) |
|
10.3.3 Two-Phase Locking to Ensure Serializability |
|
|
453 | (1) |
|
|
454 | (1) |
|
10.4 Concurrency Control with Timestamping Methods |
|
|
455 | (2) |
|
10.4.1 Wait/Die and Wound/Wait Schemes |
|
|
456 | (1) |
|
10.5 Concurrency Control with Optimistic Methods |
|
|
457 | (1) |
|
10.6 Database Recovery Management |
|
|
457 | (10) |
|
10.6.1 Transaction Recovery |
|
|
458 | (4) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
464 | (3) |
|
Chapter 11 Database Performance Tuning and Query Optimization |
|
|
467 | (36) |
|
11.1 Database Performance-Tuning Concepts |
|
|
468 | (6) |
|
11.1.1 Performance Tuning: Client and Server |
|
|
469 | (1) |
|
|
469 | (2) |
|
11.1.3 Database Query Optimization Modes |
|
|
471 | (1) |
|
11.1.4 Database Statistics |
|
|
472 | (2) |
|
|
474 | (3) |
|
|
475 | (1) |
|
11.2.2 SQL Execution Phase |
|
|
476 | (1) |
|
11.2.3 SQL Fetching Phase |
|
|
476 | (1) |
|
11.2.4 Query Processing Bottlenecks |
|
|
476 | (1) |
|
11.3 Indexes and Query Optimization |
|
|
477 | (2) |
|
|
479 | (3) |
|
11.4.1 Using Hints to Affect Optimizer Choices |
|
|
481 | (1) |
|
11.5 SQL Performance Tuning |
|
|
482 | (3) |
|
|
482 | (1) |
|
11.5.2 Conditional Expressions |
|
|
483 | (2) |
|
|
485 | (1) |
|
11.7 DBMS Performance Tuning |
|
|
486 | (2) |
|
11.8 Query Optimization Example |
|
|
488 | (15) |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
499 | (4) |
|
Chapter 12 Distributed Database Management Systems |
|
|
503 | (36) |
|
12.1 The Evolution of Distributed Database Management Systems |
|
|
504 | (2) |
|
12.2 DDBMS Advantages and Disadvantages |
|
|
506 | (1) |
|
12.3 Distributed Processing and Distributed Databases |
|
|
507 | (1) |
|
12.4 Characteristics of Distributed Database Management Systems |
|
|
508 | (2) |
|
|
510 | (1) |
|
12.6 Levels of Data and Process Distribution |
|
|
511 | (3) |
|
12.6.1 Single-Site Processing, Single-Site Data |
|
|
512 | (1) |
|
12.6.2 Multiple-Site Processing, Single-Site Data |
|
|
512 | (2) |
|
12.6.3 Multiple-Site Processing, Multiple-Site Data |
|
|
514 | (1) |
|
12.7 Distributed Database Transparency Features |
|
|
514 | (1) |
|
12.8 Distribution Transparency |
|
|
515 | (3) |
|
12.9 Transaction Transparency |
|
|
518 | (5) |
|
12.9.1 Distributed Requests and Distributed Transactions |
|
|
518 | (3) |
|
12.9.2 Distributed Concurrency Control |
|
|
521 | (1) |
|
12.9.3 Two-Phase Commit Protocol |
|
|
522 | (1) |
|
12.10 Performance and Failure Transparency |
|
|
523 | (2) |
|
12.11 Distributed Database Design |
|
|
525 | (7) |
|
12.11.1 Data Fragmentation |
|
|
525 | (4) |
|
|
529 | (2) |
|
|
531 | (1) |
|
|
532 | (1) |
|
12.13 C.J. Date's 12 Commandments for Distributed Databases |
|
|
533 | (6) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
536 | (3) |
|
Chapter 13 Business Intelligence And Data Warehouses |
|
|
539 | (58) |
|
13.1 The Need for Data Analysis |
|
|
540 | (1) |
|
13.2 Business Intelligence |
|
|
540 | (10) |
|
13.2.1 Business Intelligence Architecture |
|
|
542 | (4) |
|
13.2.2 Business Intelligence Benefits |
|
|
546 | (1) |
|
13.2.3 Business Intelligence Evolution |
|
|
546 | (3) |
|
13.2.4 Business Intelligence Technology Trends |
|
|
549 | (1) |
|
13.3 Decision Support Data |
|
|
550 | (5) |
|
13.3.1 Operational Data vs. Decision Support Data |
|
|
550 | (3) |
|
13.3.2 Decision Support Database Requirements |
|
|
553 | (2) |
|
|
555 | (3) |
|
|
557 | (1) |
|
13.4.2 Twelve Rules That Define a Data Warehouse |
|
|
558 | (1) |
|
|
558 | (11) |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
559 | (3) |
|
13.5.4 Attribute Hierarchies |
|
|
562 | (1) |
|
13.5.5 Star Schema Representation |
|
|
563 | (3) |
|
13.5.6 Performance-Improving Techniques for the Star Schema |
|
|
566 | (3) |
|
|
569 | (4) |
|
|
569 | (3) |
|
13.6.2 Predictive Analytics |
|
|
572 | (1) |
|
13.7 Online Analytical Processing |
|
|
573 | (9) |
|
13.7.1 Multidimensional Data Analysis Techniques |
|
|
573 | (2) |
|
13.7.2 Advanced Database Support |
|
|
575 | (1) |
|
13.7.3 Easy-to-Use End-User Interfaces |
|
|
575 | (1) |
|
|
576 | (2) |
|
|
578 | (2) |
|
13.7.6 Multidimensional OLAP |
|
|
580 | (1) |
|
13.7.7 Relational vs. Multidimensional OLAP |
|
|
581 | (1) |
|
13.8 SQL Extensions for OLAP |
|
|
582 | (15) |
|
13.8.1 The ROLLUP Extension |
|
|
583 | (1) |
|
13.8.2 The CUBE Extension |
|
|
584 | (1) |
|
13.8.3 Materialized Views |
|
|
585 | (5) |
|
|
590 | (1) |
|
|
590 | (1) |
|
|
591 | (1) |
|
|
592 | (5) |
|
PART V DATABASES AND THE INTERNET |
|
|
|
|
597 | (1) |
|
Chapter 14 Database Connectivity and Web Technologies |
|
|
598 | (43) |
|
14.1 Database Connectivity |
|
|
599 | (11) |
|
14.1.1 Native SQL Connectivity |
|
|
599 | (1) |
|
14.1.2 ODBC, DAO, and RDO |
|
|
600 | (3) |
|
|
603 | (3) |
|
|
606 | (2) |
|
14.1.5 Java Database Connectivity (JDBC) |
|
|
608 | (2) |
|
14.2 Database Internet Connectivity |
|
|
610 | (10) |
|
14.2.1 Web-to-Database Middleware: Server-Side Extensions |
|
|
611 | (2) |
|
14.2.2 Web Server Interfaces |
|
|
613 | (1) |
|
|
614 | (1) |
|
14.2.4 Client-Side Extensions |
|
|
615 | (1) |
|
14.2.5 Web Application Servers |
|
|
616 | (1) |
|
14.2.6 Web Database Development |
|
|
616 | (4) |
|
14.3 Extensible Markup Language (XML) |
|
|
620 | (8) |
|
14.3.1 Document Type Definitions (DTD) and XML Schemas |
|
|
622 | (3) |
|
|
625 | (2) |
|
|
627 | (1) |
|
14.4 Cloud Computing Services |
|
|
628 | (13) |
|
14.4.1 Cloud Implementation Types |
|
|
631 | (1) |
|
14.4.2 Characteristics of Cloud Services |
|
|
631 | (1) |
|
14.4.3 Types of Cloud Services |
|
|
632 | (1) |
|
14.4.4 Cloud Services: Advantages and Disadvantages |
|
|
633 | (2) |
|
|
635 | (1) |
|
|
636 | (1) |
|
|
637 | (1) |
|
|
637 | (2) |
|
|
639 | (2) |
|
PART VI DATABASE ADMINISTRATION |
|
|
|
|
641 | (1) |
|
Chapter 15 Database Administration and Security |
|
|
642 | (45) |
|
15.1 Data as a Corporate Asset |
|
|
643 | (1) |
|
15.2 The Need for a Database and Its Role in an Organization |
|
|
644 | (2) |
|
15.3 Introduction of a Database: Special Considerations |
|
|
646 | (1) |
|
15.4 The Evolution of Database Administration |
|
|
647 | (3) |
|
15.5 The Database Environment's Human Component |
|
|
650 | (13) |
|
15.5.1 The DBA's Managerial Role |
|
|
652 | (4) |
|
15.5.2 The DBA's Technical Role |
|
|
656 | (6) |
|
15.5.3 The DBA's Role in the Cloud |
|
|
662 | (1) |
|
|
663 | (4) |
|
|
663 | (1) |
|
15.6.2 Security Vulnerabilities |
|
|
664 | (2) |
|
|
666 | (1) |
|
15.7 Database Administration Tools |
|
|
667 | (5) |
|
15.7.1 The Data Dictionary |
|
|
667 | (3) |
|
|
670 | (2) |
|
15.8 Developing a Data Administration Strategy |
|
|
672 | (2) |
|
15.9 The DBA at Work: Using Oracle for Database Administration |
|
|
674 | (13) |
|
15.9.1 Oracle Database Administration Tools |
|
|
674 | (1) |
|
|
675 | (1) |
|
15.9.3 Ensuring that the RDBMS Starts Automatically |
|
|
676 | (1) |
|
15.9.4 Creating Tablespaces and Datafiles |
|
|
677 | (2) |
|
15.9.5 Managing the Database Objects: Tables, Views, Triggers, and Procedures |
|
|
679 | (1) |
|
15.9.6 Managing Users and Establishing Security |
|
|
680 | (2) |
|
15.9.7 Customizing the Database Initialization Parameters |
|
|
682 | (2) |
|
|
684 | (1) |
|
|
685 | (1) |
|
|
685 | (2) |
Glossary |
|
687 | (19) |
Index |
|
706 | |