|
|
|
|
3 | (1) |
|
Chapter 1 Database Systems |
|
|
4 | (30) |
|
|
5 | (1) |
|
|
5 | (2) |
|
1.3 Introducing the Database |
|
|
7 | (4) |
|
1.3.1 Role and Advantages of the DBMS |
|
|
7 | (2) |
|
|
9 | (2) |
|
1.4 Why Database Design is Important |
|
|
11 | (3) |
|
1.5 Evolution of File System Data Processing |
|
|
14 | (4) |
|
1.5.1 Manual File Systems |
|
|
14 | (1) |
|
1.5.2 Computerized File Systems |
|
|
14 | (3) |
|
1.5.3 File System Redux: Modern End-User Productivity Tools |
|
|
17 | (1) |
|
1.6 Problems with File System Data Processing |
|
|
18 | (3) |
|
1.6.1 Structural and Data Dependence |
|
|
19 | (1) |
|
|
19 | (2) |
|
1.6.3 Lack of Design and Data-Modeling Skills |
|
|
21 | (1) |
|
|
21 | (7) |
|
1.7.1 The Database System Environment |
|
|
22 | (2) |
|
|
24 | (3) |
|
1.7.3 Managing the Database System: A Shift in Focus |
|
|
27 | (1) |
|
1.8 Preparing for Your Database Professional Career |
|
|
28 | (6) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
34 | (35) |
|
2.1 Data Modeling and Data Models |
|
|
35 | (1) |
|
2.2 The Importance of Data Models |
|
|
35 | (1) |
|
2.3 Data Model Basic Building Blocks |
|
|
36 | (1) |
|
|
37 | (2) |
|
2.4.1 Discovering Business Rules |
|
|
38 | (1) |
|
2.4.2 Translating Business Rules into Data Model Components |
|
|
38 | (1) |
|
|
39 | (1) |
|
2.5 The Evolution of Data Models |
|
|
39 | (17) |
|
2.5.1 Hierarchical and Network Models |
|
|
40 | (1) |
|
2.5.2 The Relational Model |
|
|
41 | (2) |
|
2.5.3 The Entity Relationship Model |
|
|
43 | (3) |
|
2.5.4 The Object-Oriented (OO) Model |
|
|
46 | (2) |
|
2.5.5 Object/Relational and XML |
|
|
48 | (1) |
|
2.5.6 Emerging Data Models: Big Data and NoSQL |
|
|
48 | (5) |
|
2.5.7 Data Models: A Summary |
|
|
53 | (3) |
|
2.6 Degrees of Data Abstraction |
|
|
56 | (13) |
|
|
57 | (2) |
|
2.6.2 The Conceptual Model |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (5) |
|
|
|
|
69 | (1) |
|
Chapter 3 The Relational Database Model |
|
|
70 | (44) |
|
3.1 A Logical View of Data |
|
|
71 | (3) |
|
3.1.1 Tables and Their Characteristics |
|
|
71 | (3) |
|
|
74 | (3) |
|
|
74 | (1) |
|
|
75 | (2) |
|
|
77 | (2) |
|
|
79 | (9) |
|
3.4.1 Formal Definitions and Terminology |
|
|
79 | (1) |
|
3.4.2 Relational Set Operators |
|
|
80 | (8) |
|
3.5 The Data Dictionary and the System Catalog |
|
|
88 | (2) |
|
3.6 Relationships within the Relational Database |
|
|
90 | (8) |
|
3.6.1 The I:M Relationship |
|
|
90 | (2) |
|
3.6.2 The I:I Relationship |
|
|
92 | (2) |
|
3.6.3 The M:N Relationship |
|
|
94 | (4) |
|
3.7 Data Redundancy Revisited |
|
|
98 | (3) |
|
|
101 | (1) |
|
3.9 Codd's Relational Database Rules |
|
|
102 | (12) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (3) |
|
|
108 | (6) |
|
Chapter 4 Entity Relationship (ER) Modeling |
|
|
114 | (47) |
|
4.1 The Entity Relationship Model (ERM) |
|
|
115 | (22) |
|
|
115 | (1) |
|
|
116 | (5) |
|
|
121 | (1) |
|
4.1.4 Connectivity and Cardinality |
|
|
122 | (1) |
|
4.1.5 Existence Dependence |
|
|
123 | (1) |
|
4.1.6 Relationship Strength |
|
|
123 | (3) |
|
|
126 | (2) |
|
4.1.8 Relationship Participation |
|
|
128 | (3) |
|
4.1.9 Relationship Degree |
|
|
131 | (2) |
|
4.1.10 Recursive Relationships |
|
|
133 | (2) |
|
4.1.11 Associative (Composite) Entities |
|
|
135 | (2) |
|
4.2 Developing an ER Diagram |
|
|
137 | (8) |
|
4.3 Database Design Challenges: Conflicting Goals |
|
|
145 | (16) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (2) |
|
|
152 | (3) |
|
|
155 | (6) |
|
Chapter 5 Advanced Data Modeling |
|
|
161 | (29) |
|
5.1 The Extended Entity Relationship Model |
|
|
162 | (6) |
|
5.1.1 Entity Supertypes and Subtypes |
|
|
162 | (1) |
|
5.1.2 Specialization Hierarchy |
|
|
163 | (1) |
|
|
164 | (1) |
|
5.1.4 Subtype Discriminator |
|
|
165 | (1) |
|
5.1.5 Disjoint and Overlapping Constraints |
|
|
165 | (2) |
|
5.1.6 Completeness Constraint |
|
|
167 | (1) |
|
5.1.7 Specialization and Generalization |
|
|
168 | (1) |
|
|
168 | (2) |
|
5.3 Entity Integrity: Selecting Primary Keys |
|
|
170 | (4) |
|
5.3.1 Natural Keys and Primary Keys |
|
|
170 | (1) |
|
5.3.2 Primary Key Guidelines |
|
|
170 | (1) |
|
5.3.3 When to Use Composite Primary Keys |
|
|
171 | (1) |
|
5.3.4 When to Use Surrogate Primary Keys |
|
|
172 | (2) |
|
5.4 Design Cases: Learning Flexible Database Design |
|
|
174 | (16) |
|
5.4.1 Design Case 1: Implementing I:I Relationships |
|
|
174 | (1) |
|
5.4.2 Design Case 2: Maintaining History of Time-Variant Data |
|
|
175 | (3) |
|
5.4.3 Design Case 3: Fan Traps |
|
|
178 | (2) |
|
5.4.4 Design Case 4: Redundant Relationships |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (6) |
|
Chapter 6 Normalization of Database Tables |
|
|
190 | (45) |
|
6.1 Database Tables and Normalization |
|
|
191 | (1) |
|
6.2 The Need for Normalization |
|
|
191 | (4) |
|
6.3 The Normalization Process |
|
|
195 | (8) |
|
6.3.1 Conversion to First Normal Form |
|
|
196 | (4) |
|
6.3.2 Conversion to Second Normal Form |
|
|
200 | (1) |
|
6.3.3 Conversion to Third Normal Form |
|
|
201 | (2) |
|
|
203 | (4) |
|
6.5 Surrogate Key Considerations |
|
|
207 | (1) |
|
6.6 Higher-Level Normal Forms |
|
|
208 | (5) |
|
6.6.1 The Boyce-Codd Normal Form |
|
|
208 | (3) |
|
6.6.2 Fourth Normal Form (4NF) |
|
|
211 | (2) |
|
6.7 Normalization and Database Design |
|
|
213 | (4) |
|
|
217 | (3) |
|
6.9 Data-Modeling Checklist |
|
|
220 | (15) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (11) |
|
PART III ADVANCED DESIGN AND IMPLEMENTATION |
|
|
|
|
235 | (1) |
|
Chapter 7 Introduction to Structured Query Language (SQL) |
|
|
236 | (86) |
|
|
237 | (2) |
|
7.2 Data Definition Commands |
|
|
239 | (15) |
|
|
239 | (2) |
|
7.2.2 Creating the Database |
|
|
241 | (1) |
|
7.2.3 The Database Schema |
|
|
241 | (1) |
|
|
242 | (3) |
|
7.2.5 Creating Table Structures |
|
|
245 | (4) |
|
|
249 | (3) |
|
|
252 | (2) |
|
7.3 Data Manipulation Commands |
|
|
254 | (6) |
|
|
254 | (1) |
|
7.3.2 Saving Table Changes |
|
|
255 | (1) |
|
|
256 | (1) |
|
7.3.4 Updating Table Rows |
|
|
257 | (1) |
|
7.3.5 Restoring Table Contents |
|
|
258 | (1) |
|
7.3.6 Deleting Table Rows |
|
|
258 | (1) |
|
7.3.7 Inserting Table Rows with a Select Subquery |
|
|
259 | (1) |
|
|
260 | (11) |
|
7.4.1 Selecting Rows with Conditional Restrictions |
|
|
260 | (5) |
|
7.4.2 Arithmetic Operators: The Rule of Precedence |
|
|
265 | (1) |
|
7.4.3 Logical Operators: AND, OR, and NOT |
|
|
265 | (2) |
|
|
267 | (4) |
|
7.5 Additional Data Definition Commands |
|
|
271 | (6) |
|
7.5.1 Changing a Column's Data Type |
|
|
271 | (1) |
|
7.5.2 Changing a Column's Data Characteristics |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
7.5.5 Advanced Data Updates |
|
|
273 | (2) |
|
7.5.6 Copying Parts of Tables |
|
|
275 | (1) |
|
7.5.7 Adding Primary and Foreign Key Designations |
|
|
276 | (1) |
|
7.5.8 Deleting a Table from the Database |
|
|
277 | (1) |
|
7.6 Additional Select Query Keywords |
|
|
277 | (10) |
|
|
277 | (2) |
|
7.6.2 Listing Unique Values |
|
|
279 | (1) |
|
7.6.3 Aggregate Functions |
|
|
279 | (5) |
|
|
284 | (3) |
|
7.7 Joining Database Tables |
|
|
287 | (35) |
|
7.7.1 Joining Tables with an Alias |
|
|
290 | (2) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (17) |
|
|
311 | (11) |
|
|
322 | (90) |
|
|
323 | (9) |
|
|
324 | (1) |
|
|
325 | (2) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (3) |
|
8.2 Subqueries and Correlated Queries |
|
|
332 | (13) |
|
|
334 | (2) |
|
|
336 | (1) |
|
|
336 | (1) |
|
8.2.4 Multirow Subquery Operators: ANY and ALL |
|
|
337 | (1) |
|
|
338 | (1) |
|
8.2.6 Attribute List Subqueries |
|
|
339 | (2) |
|
8.2.7 Correlated Subqueries |
|
|
341 | (4) |
|
|
345 | (9) |
|
8.3.1 Date and Time Functions |
|
|
345 | (4) |
|
|
349 | (1) |
|
|
349 | (2) |
|
8.3.4 Conversion Functions |
|
|
351 | (3) |
|
8.4 Relational Set Operators |
|
|
354 | (7) |
|
|
354 | (2) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
358 | (1) |
|
8.4.5 Syntax Alternatives |
|
|
359 | (2) |
|
8.5 Virtual Tables: Creating a View |
|
|
361 | (4) |
|
|
362 | (3) |
|
|
365 | (4) |
|
|
369 | (25) |
|
|
374 | (11) |
|
|
385 | (6) |
|
8.7.3 PL/SQL Processing with Cursors |
|
|
391 | (3) |
|
8.7.4 PL/SQL Stored Functions |
|
|
394 | (1) |
|
|
394 | (18) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (9) |
|
|
410 | (2) |
|
Chapter 9 Database Design |
|
|
412 | (41) |
|
9.1 The Information System |
|
|
413 | (1) |
|
9.2 The Systems Development Life Cycle |
|
|
414 | (4) |
|
|
415 | (1) |
|
|
416 | (1) |
|
9.2.3 Detailed Systems Design |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
417 | (1) |
|
9.3 The Database Life Cycle |
|
|
418 | (12) |
|
9.3.1 The Database Initial Study |
|
|
418 | (4) |
|
|
422 | (1) |
|
9.3.3 Implementation and Loading |
|
|
423 | (3) |
|
9.3.4 Testing and Evaluation |
|
|
426 | (3) |
|
|
429 | (1) |
|
9.3.6 Maintenance and Evolution |
|
|
429 | (1) |
|
|
430 | (9) |
|
9.4.1 Data Analysis and Requirements |
|
|
431 | (2) |
|
9.4.2 Entity Relationship Modeling and Normalization |
|
|
433 | (3) |
|
9.4.3 Data Model Verification |
|
|
436 | (3) |
|
9.4.4 Distributed Database Design |
|
|
439 | (1) |
|
9.5 DBMS Software Selection |
|
|
439 | (1) |
|
|
440 | (3) |
|
9.6.1 Map the Conceptual Model to the Logical Model |
|
|
440 | (2) |
|
9.6.2 Validate the Logical Model Using Normalization |
|
|
442 | (1) |
|
9.6.3 Validate Logical Model Integrity Constraints |
|
|
442 | (1) |
|
9.6.4 Validate the Logical Model Against User Requirements |
|
|
443 | (1) |
|
|
443 | (2) |
|
9.7.1 Define Data Storage Organization |
|
|
443 | (1) |
|
9.7.2 Define Integrity and Security Measures |
|
|
444 | (1) |
|
9.7.3 Determine Performance Measures |
|
|
444 | (1) |
|
9.8 Database Design Strategies |
|
|
445 | (1) |
|
9.9 Centralized vs. Decentralized Design |
|
|
446 | (7) |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
450 | (3) |
|
PART IV ADVANCED DATABASE CONCEPTS |
|
|
|
|
453 | (1) |
|
Chapter 10 Transaction Management and Concurrency Control |
|
|
454 | (32) |
|
10.1 What Is a Transaction? |
|
|
455 | (6) |
|
10.1.1 Evaluating Transaction Results |
|
|
456 | (3) |
|
10.1.2 Transaction Properties |
|
|
459 | (1) |
|
10.1.3 Transaction Management with SQL |
|
|
460 | (1) |
|
10.1.4 The Transaction Log |
|
|
460 | (1) |
|
|
461 | (5) |
|
|
462 | (1) |
|
|
463 | (1) |
|
10.2.3 Inconsistent Retrievals |
|
|
464 | (1) |
|
|
465 | (1) |
|
10.3 Concurrency Control with Locking Methods |
|
|
466 | (7) |
|
|
467 | (3) |
|
|
470 | (1) |
|
10.3.3 Two-Phase Locking to Ensure Serializability |
|
|
471 | (1) |
|
|
472 | (1) |
|
10.4 Concurrency Control with Time Stamping Methods |
|
|
473 | (2) |
|
10.4.1 Wait/Die and Wound/Wait Schemes |
|
|
474 | (1) |
|
10.5 Concurrency Control with Optimistic Methods |
|
|
475 | (1) |
|
10.6 ANSI Levels of Transaction Isolation |
|
|
475 | (2) |
|
10.7 Database Recovery Management |
|
|
477 | (9) |
|
10.7.1 Transaction Recovery |
|
|
477 | (4) |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
483 | (3) |
|
Chapter 11 Database Performance Tuning and Query Optimization |
|
|
486 | (36) |
|
11.1 Database Performance-Tuning Concepts |
|
|
487 | (6) |
|
11.1.1 Performance Tuning: Client and Server |
|
|
488 | (1) |
|
|
489 | (1) |
|
11.1.3 Database Query Optimization Modes |
|
|
490 | (1) |
|
11.1.4 Database Statistics |
|
|
491 | (2) |
|
|
493 | (3) |
|
|
494 | (1) |
|
11.2.2 SQL Execution Phase |
|
|
495 | (1) |
|
11.2.3 SQL Fetching Phase |
|
|
495 | (1) |
|
11.2.4 Query Processing Bottlenecks |
|
|
495 | (1) |
|
11.3 Indexes and Query Optimization |
|
|
496 | (2) |
|
|
498 | (3) |
|
11.4.1 Using Hints to Affect Optimizer Choices |
|
|
500 | (1) |
|
11.5 SQL Performance Tuning |
|
|
501 | (3) |
|
|
501 | (1) |
|
11.5.2 Conditional Expressions |
|
|
502 | (2) |
|
|
504 | (1) |
|
11.7 DBMS Performance Tuning |
|
|
505 | (2) |
|
11.8 Query Optimization Example |
|
|
507 | (15) |
|
|
516 | (1) |
|
|
517 | (1) |
|
|
517 | (1) |
|
|
518 | (4) |
|
Chapter 12 Distributed Database Management Systems |
|
|
522 | (37) |
|
12.1 The Evolution of Distributed Database Management Systems |
|
|
523 | (2) |
|
12.2 DDBMS Advantages and Disadvantages |
|
|
525 | (1) |
|
12.3 Distributed Processing and Distributed Databases |
|
|
526 | (1) |
|
12.4 Characteristics of Distributed Database Management Systems |
|
|
527 | (2) |
|
|
529 | (1) |
|
12.6 Levels of Data and Process Distribution |
|
|
530 | (3) |
|
12.6.1 Single-Site Processing, Single-Site Data |
|
|
530 | (1) |
|
12.6.2 Multiple-Site Processing, Single-Site Data |
|
|
531 | (1) |
|
12.6.3 Multiple-Site Processing, Multiple-Site Data |
|
|
532 | (1) |
|
12.7 Distributed Database Transparency Features |
|
|
533 | (1) |
|
12.8 Distribution Transparency |
|
|
534 | (2) |
|
12.9 Transaction Transparency |
|
|
536 | (5) |
|
12.9.1 Distributed Requests and Distributed Transactions |
|
|
536 | (4) |
|
12.9.2 Distributed Concurrency Control |
|
|
540 | (1) |
|
12.9.3 Two-Phase Commit Protocol |
|
|
540 | (1) |
|
12.10 Performance and Failure Transparency |
|
|
541 | (2) |
|
12.11 Distributed Database Design |
|
|
543 | (6) |
|
12.11.1 Data Fragmentation |
|
|
543 | (4) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
12.13 Hadoop Distributed File System |
|
|
550 | (2) |
|
12.14 C.J. Date's 12 Commandments for Distributed Databases |
|
|
552 | (7) |
|
|
554 | (1) |
|
|
555 | (1) |
|
|
555 | (1) |
|
|
556 | (3) |
|
Chapter 13 Business Intelligence and Data Warehouses |
|
|
559 | (66) |
|
13.1 The Need for Data Analysis |
|
|
560 | (1) |
|
13.2 Business Intelligence |
|
|
560 | (11) |
|
13.2.1 Business Intelligence Architecture |
|
|
562 | (5) |
|
13.2.2 Business Intelligence Benefits |
|
|
567 | (1) |
|
13.2.3 Business Intelligence Evolution |
|
|
567 | (3) |
|
13.2.4 Business Intelligence Technology Trends |
|
|
570 | (1) |
|
13.3 Decision Support Data |
|
|
571 | (5) |
|
13.3.1 Operational Data vs. Decision Support Data |
|
|
571 | (3) |
|
13.3.2 Decision Support Database Requirements |
|
|
574 | (2) |
|
|
576 | (4) |
|
|
578 | (1) |
|
13.4.2 Twelve Rules That Define a Data Warehouse |
|
|
579 | (1) |
|
|
580 | (10) |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
581 | (1) |
|
13.5.4 Attribute Hierarchies |
|
|
582 | (2) |
|
13.5.5 Star Schema Representation |
|
|
584 | (3) |
|
13.5.6 Performance-Improving Techniques for the Star Schema |
|
|
587 | (3) |
|
|
590 | (4) |
|
|
590 | (3) |
|
13.6.2 Predictive Analytics |
|
|
593 | (1) |
|
13.7 Online Analytical Processing |
|
|
594 | (9) |
|
13.7.1 Multidimensional Data Analysis Techniques |
|
|
594 | (2) |
|
13.7.2 Advanced Database Support |
|
|
596 | (1) |
|
13.7.3 Easy-to-Use End-User Interfaces |
|
|
596 | (1) |
|
|
597 | (2) |
|
|
599 | (2) |
|
13.7.6 Multidimensional OLAP |
|
|
601 | (1) |
|
13.7.7 Relational vs. Multidimensional OLAP |
|
|
602 | (1) |
|
13.8 SQL Extensions for OLAP |
|
|
603 | (22) |
|
13.8.1 The ROLLUP Extension |
|
|
604 | (1) |
|
13.8.2 The CUBE Extension |
|
|
605 | (1) |
|
13.8.3 Materialized Views |
|
|
606 | (5) |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
612 | (1) |
|
|
613 | (12) |
|
PART V DATABASES AND THE INTERNET |
|
|
|
|
625 | (1) |
|
Chapter 14 Database Connectivity and Web Technologies |
|
|
626 | (43) |
|
14.1 Database Connectivity |
|
|
627 | (11) |
|
14.1.1 Native SQL Connectivity |
|
|
627 | (1) |
|
14.1.2 ODBC, DAO, and RDO |
|
|
628 | (3) |
|
|
631 | (3) |
|
|
634 | (2) |
|
14.1.5 Java Database Connectivity (JDBC) |
|
|
636 | (2) |
|
14.2 Database Internet Connectivity |
|
|
638 | (10) |
|
14.2.1 Web-to-Database Middleware: Server-Side Extensions |
|
|
639 | (2) |
|
14.2.2 Web Server Interfaces |
|
|
641 | (1) |
|
|
642 | (1) |
|
14.2.4 Client-Side Extensions |
|
|
643 | (1) |
|
14.2.5 Web Application Servers |
|
|
644 | (1) |
|
14.2.6 Web Database Development |
|
|
644 | (4) |
|
14.3 Extensible Markup Language (XML) |
|
|
648 | (8) |
|
14.3.1 Document Type Definitions (DTD) and XML Schemas |
|
|
650 | (3) |
|
|
653 | (2) |
|
|
655 | (1) |
|
14.4 Cloud Computing Services |
|
|
656 | (13) |
|
14.4.1 Cloud Implementation Types |
|
|
658 | (1) |
|
14.4.2 Characteristics of Cloud Services |
|
|
659 | (1) |
|
14.4.3 Types of Cloud Services |
|
|
660 | (1) |
|
14.4.4 Cloud Services: Advantages and Disadvantages |
|
|
661 | (2) |
|
|
663 | (1) |
|
|
664 | (1) |
|
|
665 | (1) |
|
|
665 | (2) |
|
|
667 | (2) |
|
PART VI DATABASE ADMINISTRATION |
|
|
|
|
669 | (1) |
|
Chapter 15 Database Administration and Security |
|
|
670 | (45) |
|
15.1 Data as a Corporate Asset |
|
|
671 | (1) |
|
15.2 The Need for a Database and Its Role in an Organization |
|
|
672 | (2) |
|
15.3 Introduction of a Database: Special Considerations |
|
|
674 | (1) |
|
15.4 The Evolution of Database Administration |
|
|
675 | (3) |
|
15.5 The Database Environment's Human Component |
|
|
678 | (13) |
|
15.5.1 The DBA's Managerial Role |
|
|
680 | (4) |
|
15.5.2 The DBA's Technical Role |
|
|
684 | (6) |
|
15.5.3 The DBA's Role in the Cloud |
|
|
690 | (1) |
|
|
691 | (4) |
|
|
692 | (1) |
|
15.6.2 Security Vulnerabilities |
|
|
692 | (2) |
|
|
694 | (1) |
|
15.7 Database Administration Tools |
|
|
695 | (5) |
|
15.7.1 The Data Dictionary |
|
|
695 | (3) |
|
|
698 | (2) |
|
15.8 Developing a Data Administration Strategy |
|
|
700 | (2) |
|
15.9 The DBA at Work: Using Oracle for Database Administration |
|
|
702 | (13) |
|
15.9.1 Oracle Database Administration Tools |
|
|
702 | (1) |
|
15.9.2 Ensuring that the RDBMS Starts Automatically |
|
|
703 | (1) |
|
15.9.3 Creating Tablespaces and Datafiles |
|
|
704 | (2) |
|
15.9.4 Managing Users and Establishing Security |
|
|
706 | (3) |
|
15.9.5 Customizing the Database Initialization Parameters |
|
|
709 | (2) |
|
|
711 | (1) |
|
|
712 | (1) |
|
|
712 | (3) |
Glossary |
|
715 | (20) |
Index |
|
735 | |