Part 1: Database Concepts |
|
1 | (70) |
|
Chapter 1 Database Systems |
|
|
2 | (33) |
|
|
3 | (1) |
|
1-2 Data versus Information |
|
|
4 | (2) |
|
1-3 Introducing the Database |
|
|
6 | (5) |
|
1-3a Role and Advantages of the DBMS |
|
|
6 | (2) |
|
|
8 | (3) |
|
1-4 Why Database Design is Important |
|
|
11 | (3) |
|
1-5 Evolution of File System Data Processing |
|
|
14 | (4) |
|
|
14 | (1) |
|
1-5b Computerized File Systems |
|
|
15 | (2) |
|
1-5c File System Redux: Modern End-User Productivity Tools |
|
|
17 | (1) |
|
1-6 Problems with File System Data Processing |
|
|
18 | (3) |
|
1-6a Structural and Data Dependence |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (7) |
|
1-7a The Database System Environment |
|
|
22 | (2) |
|
|
24 | (4) |
|
1-7c Managing the Database System: A Shift in Focus |
|
|
28 | (1) |
|
1-8 Preparing for Your Database Professional Career |
|
|
28 | (2) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (3) |
|
|
35 | (36) |
|
2-1 Data Modeling and Data Models |
|
|
36 | (1) |
|
2-2 The Importance of Data Models |
|
|
37 | (1) |
|
2-3 Data Model Basic Building Blocks |
|
|
37 | (2) |
|
|
39 | (2) |
|
2-4a Discovering Business Rules |
|
|
39 | (1) |
|
2-4b Translating Business Rules into Data Model Components |
|
|
40 | (1) |
|
|
41 | (1) |
|
2-5 The Evolution of Data Models |
|
|
41 | (16) |
|
2-5a Hierarchical and Network Models |
|
|
41 | (2) |
|
2-5b The Relational Model |
|
|
43 | (2) |
|
2-5c The Entity Relationship Model |
|
|
45 | (3) |
|
2-5d The Object-Oriented (00) Model |
|
|
48 | (1) |
|
2-5e Object/Relational and XML |
|
|
49 | (1) |
|
2-5f Emerging Data Models: Big Data and NoSQL |
|
|
50 | (6) |
|
2-5g Data Models: A Summary |
|
|
56 | (1) |
|
2-6 Degrees of Data Abstraction |
|
|
57 | (7) |
|
|
60 | (1) |
|
2-6b The Conceptual Model |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (5) |
Part 2: Design Concepts |
|
71 | (174) |
|
Chapter 3 The Relational Database Model |
|
|
72 | (45) |
|
3-1 A Logical View of Data |
|
|
73 | (3) |
|
3-1a Tables and Their Characteristics |
|
|
73 | (3) |
|
|
76 | (4) |
|
|
76 | (1) |
|
|
77 | (3) |
|
|
80 | (2) |
|
|
82 | (9) |
|
3-4a Formal Definitions and Terminology |
|
|
82 | (1) |
|
3-4b Relational Set Operators |
|
|
83 | (8) |
|
3-5 The Data Dictionary and the System Catalog |
|
|
91 | (2) |
|
3-6 Relationships within the Relational Database |
|
|
93 | (8) |
|
3-6a The 1:M Relationship |
|
|
93 | (2) |
|
3-6b The 1:1 Relationship |
|
|
95 | (2) |
|
3-6c The M:N Relationship |
|
|
97 | (4) |
|
3-7 Data Redundancy Revisited |
|
|
101 | (2) |
|
|
103 | (1) |
|
3-9 Codd's Relational Database Rules |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (3) |
|
|
110 | (7) |
|
Chapter 4 Entity Relationship (ER) Modeling |
|
|
117 | (52) |
|
4-1 The Entity Relationship Model (ERM) |
|
|
118 | (22) |
|
|
118 | (1) |
|
|
118 | (6) |
|
|
124 | (1) |
|
4-1d Connectivity and Cardinality |
|
|
125 | (1) |
|
4-1e Existence Dependence |
|
|
126 | (1) |
|
4-1f Relationship Strength |
|
|
126 | (3) |
|
|
129 | (2) |
|
4-1h Relationship Participation |
|
|
131 | (3) |
|
|
134 | (2) |
|
4-1j Recursive Relationships |
|
|
136 | (2) |
|
4-1k Associative (Composite) Entities |
|
|
138 | (2) |
|
4-2 Developing an ER Diagram |
|
|
140 | (7) |
|
4-3 Database Design Challenges: Conflicting Goals |
|
|
147 | (5) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (3) |
|
|
156 | (5) |
|
|
161 | (8) |
|
Chapter 5 Advanced Data Modeling |
|
|
169 | (32) |
|
5-1 The Extended Entity Relationship Model |
|
|
170 | (6) |
|
5-1a Entity Supertypes and Subtypes |
|
|
170 | (1) |
|
5-1b Specialization Hierarchy |
|
|
171 | (1) |
|
|
172 | (2) |
|
5-1d Subtype Discriminator |
|
|
174 | (1) |
|
5-le Disjoint and Overlapping Constraints |
|
|
174 | (1) |
|
5-1f Completeness Constraint |
|
|
175 | (1) |
|
5-1g Specialization and Generalization |
|
|
176 | (1) |
|
|
176 | (1) |
|
5-3 Entity Integrity: Selecting Primary Keys |
|
|
177 | (5) |
|
5-3a Natural Keys and Primary Keys |
|
|
178 | (1) |
|
5-3b Primary Key Guidelines |
|
|
178 | (1) |
|
5-3c When To Use Composite Primary Keys |
|
|
178 | (2) |
|
5-3d When To Use Surrogate Primary Keys |
|
|
180 | (2) |
|
5-4 Design Cases: Learning Flexible Database Design |
|
|
182 | (6) |
|
5-4a Design Case 1: Implementing 1:1 Relationships |
|
|
182 | (1) |
|
5-4b Design Case 2: Maintaining History of Time-Variant Data |
|
|
183 | (3) |
|
5-4c Design Case 3: Fan Traps |
|
|
186 | (1) |
|
5-4d Design Case 4: Redundant Relationships |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (2) |
|
|
192 | (9) |
|
Chapter 6 Normalization of Database Tables |
|
|
201 | (44) |
|
6-1 Database Tables and Normalization |
|
|
202 | (1) |
|
6-2 The Need For Normalization |
|
|
202 | (4) |
|
6-3 The Normalization Process |
|
|
206 | (9) |
|
6-3a Conversion To First Normal Form |
|
|
208 | (3) |
|
6-3b Conversion To Second Normal Form |
|
|
211 | (2) |
|
6-3c Conversion To Third Normal Form |
|
|
213 | (2) |
|
|
215 | (4) |
|
6-5 Surrogate Key Considerations |
|
|
219 | (1) |
|
6-6 Higher-Level Normal Forms |
|
|
220 | (6) |
|
6-6a The Boyce-Codd Normal Form |
|
|
221 | (3) |
|
6-6b Fourth Normal Form (4NF) |
|
|
224 | (2) |
|
6-7 Normalization and Database Design |
|
|
226 | (3) |
|
|
229 | (3) |
|
6-9 Data-Modeling Checklist |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (2) |
|
|
237 | (8) |
Part 3: Advanced Design and Implementation |
|
245 | (236) |
|
Chapter 7 Introduction to Structured Query Language (SQL) |
|
|
246 | (94) |
|
|
247 | (2) |
|
7-2 Data Definition Commands |
|
|
249 | (15) |
|
|
249 | (2) |
|
7-2b Creating The Database |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (3) |
|
7-2e Creating Table Structures |
|
|
255 | (4) |
|
|
259 | (4) |
|
|
263 | (1) |
|
7-3 Data Manipulation Commands |
|
|
264 | (7) |
|
|
264 | (2) |
|
7-3b Saving Table Changes |
|
|
266 | (1) |
|
|
266 | (2) |
|
|
268 | (1) |
|
7-3e Restoring Table Contents |
|
|
269 | (1) |
|
|
269 | (1) |
|
7-3g Inserting Table Rows with a Select Subquery |
|
|
270 | (1) |
|
|
271 | (12) |
|
7-4a Selecting Rows with Conditional Restrictions |
|
|
271 | (5) |
|
7-4b Arithmetic Operators: The Rule of Precedence |
|
|
276 | (1) |
|
7-4c Logical Operators: AND, OR, and NOT |
|
|
277 | (2) |
|
|
279 | (4) |
|
7-5 Additional Data Definition Commands |
|
|
283 | (7) |
|
7-5a Changing a Column's Data Type |
|
|
284 | (1) |
|
7-5b Changing a Column's Data Characteristics |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
7-5e Advanced Data Updates |
|
|
285 | (2) |
|
7-5f Copying Parts of Tables |
|
|
287 | (2) |
|
7-5g Adding Primary and Foreign Key Designations |
|
|
289 | (1) |
|
7-5h Deleting a Table from the Database |
|
|
290 | (1) |
|
7-6 Additional SELECT Query Keywords |
|
|
290 | (10) |
|
|
290 | (2) |
|
7-6b Listing Unique Values |
|
|
292 | (1) |
|
|
292 | (5) |
|
|
297 | (3) |
|
7-7 Joining Database Tables |
|
|
300 | (5) |
|
7-7a Joining Tables with an Alias |
|
|
303 | (1) |
|
|
303 | (2) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
307 | (24) |
|
|
331 | (9) |
|
|
340 | (99) |
|
|
341 | (8) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
345 | (2) |
|
|
347 | (2) |
|
8-2 Subqueries and Correlated Queries |
|
|
349 | (12) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
8-2d Multirow Subquery Operators: ANY and ALL |
|
|
353 | (2) |
|
|
355 | (1) |
|
8-2f Attribute List Subqueries |
|
|
356 | (2) |
|
8-2g Correlated Subqueries |
|
|
358 | (3) |
|
|
361 | (10) |
|
8-3a Date and Time Functions |
|
|
361 | (5) |
|
|
366 | (1) |
|
|
366 | (2) |
|
8-3d Conversion Functions |
|
|
368 | (3) |
|
8-4 Relational Set Operators |
|
|
371 | (6) |
|
|
371 | (2) |
|
|
373 | (1) |
|
|
373 | (2) |
|
|
375 | (2) |
|
|
377 | (1) |
|
8-5 Virtual Tables: Creating a View |
|
|
377 | (5) |
|
|
379 | (3) |
|
|
382 | (5) |
|
|
387 | (23) |
|
|
392 | (9) |
|
|
401 | (6) |
|
8-7c PL/SQL Processing with Cursors |
|
|
407 | (2) |
|
8-7d PL/SQL Stored Functions |
|
|
409 | (1) |
|
|
410 | (5) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
418 | (17) |
|
|
435 | (4) |
|
Chapter 9 Database Design |
|
|
439 | (42) |
|
9-1 The Information System |
|
|
440 | (2) |
|
9-2 The Systems Development Life Cycle |
|
|
442 | (3) |
|
|
442 | (1) |
|
|
443 | (1) |
|
9-2c Detailed Systems Design |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
445 | (1) |
|
9-3 The Database Life Cycle |
|
|
445 | (12) |
|
9-3a The Database Initial Study |
|
|
445 | (5) |
|
|
450 | (1) |
|
9-3c Implementation and Loading |
|
|
451 | (3) |
|
9-3d Testing and Evaluation |
|
|
454 | (2) |
|
|
456 | (1) |
|
9-3f Maintenance and Evolution |
|
|
457 | (1) |
|
|
457 | (10) |
|
9-4a Data Analysis and Requirements |
|
|
459 | (2) |
|
9-4b Entity Relationship Modeling and Normalization |
|
|
461 | (3) |
|
9-4c Data Model Verification |
|
|
464 | (3) |
|
9-4d Distributed Database Design |
|
|
467 | (1) |
|
9-5 DBMS Software Selection |
|
|
467 | (1) |
|
|
468 | (3) |
|
9-6a Map the Conceptual Model to the Logical Model |
|
|
468 | (2) |
|
9-6b Validate the Logical Model Using Normalization |
|
|
470 | (1) |
|
9-6c Validate Logical Model Integrity Constraints |
|
|
470 | (1) |
|
9-6d Validate the Logical Model Against User Requirements |
|
|
471 | (1) |
|
|
471 | (2) |
|
9-7a Define Data Storage Organization |
|
|
472 | (1) |
|
9-7b Define Integrity and Security Measures |
|
|
472 | (1) |
|
9-7c Determine Performance Measures |
|
|
473 | (1) |
|
9-8 Database Design Strategies |
|
|
473 | (1) |
|
9-9 Centralized Versus Decentralized Design |
|
|
474 | (3) |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
478 | (3) |
Part 4: Advanced Database Concepts |
|
481 | (198) |
|
Chapter 10 Transaction Management and Concurrency Control |
|
|
482 | (33) |
|
10-1 What Is a Transaction? |
|
|
483 | (7) |
|
10-1a Evaluating Transaction Results |
|
|
484 | (3) |
|
10-1b Transaction Properties |
|
|
487 | (1) |
|
10-1c Transaction Management with SQL |
|
|
488 | (1) |
|
10-1d The Transaction Log |
|
|
489 | (1) |
|
|
490 | (5) |
|
|
490 | (1) |
|
|
491 | (1) |
|
10-2c Inconsistent Retrievals |
|
|
492 | (1) |
|
|
493 | (2) |
|
10-3 Concurrency Control with Locking Methods |
|
|
495 | (7) |
|
|
496 | (2) |
|
|
498 | (2) |
|
10-3c Two-Phase Locking to Ensure Serializability |
|
|
500 | (1) |
|
|
500 | (2) |
|
10-4 Concurrency Control with Time Stamping Methods |
|
|
502 | (1) |
|
10-4a Wait/Die and Wound/Wait Schemes |
|
|
502 | (1) |
|
10-5 Concurrency Control with Optimistic Methods |
|
|
503 | (1) |
|
10-6 ANSI Levels of Transaction Isolation |
|
|
504 | (2) |
|
10-7 Database Recovery Management |
|
|
506 | (4) |
|
10-7a Transaction Recovery |
|
|
506 | (4) |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
512 | (3) |
|
Chapter 11 Database Performance Tuning and Query Optimization |
|
|
515 | (38) |
|
11-1 Database Performance-Tuning Concepts |
|
|
516 | (6) |
|
11-1a Performance Tuning: Client and Server |
|
|
517 | (1) |
|
|
518 | (2) |
|
11-1c Database Query Optimization Modes |
|
|
520 | (1) |
|
11-1d Database Statistics |
|
|
521 | (1) |
|
|
522 | (4) |
|
|
523 | (1) |
|
11-2b SQL Execution Phase |
|
|
524 | (1) |
|
|
525 | (1) |
|
11-2d Query Processing Bottlenecks |
|
|
525 | (1) |
|
11-3 Indexes and Query Optimization |
|
|
526 | (2) |
|
|
528 | (3) |
|
11-4a Using Hints to Affect Optimizer Choices |
|
|
530 | (1) |
|
11-5 SQL Performance Tuning |
|
|
531 | (3) |
|
|
531 | (2) |
|
11-5b Conditional Expressions |
|
|
533 | (1) |
|
|
534 | (2) |
|
11-7 DBMS Performance Tuning |
|
|
536 | (2) |
|
11-8 Query Optimization Example |
|
|
538 | (8) |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (5) |
|
Chapter 12 Distributed Database Management Systems |
|
|
553 | (36) |
|
12-1 The Evolution of Distributed Database Management Systems |
|
|
554 | (2) |
|
12-2 DDBMS Advantages and Disadvantages |
|
|
556 | (1) |
|
12-3 Distributed Processing and Distributed Databases |
|
|
556 | (3) |
|
12-4 Characteristics of Distributed Database Management Systems |
|
|
559 | (1) |
|
|
560 | (1) |
|
12-6 Levels of Data and Process Distribution |
|
|
561 | (3) |
|
12-6a Single-Site Processing, Single-Site Data |
|
|
561 | (1) |
|
12-6b Multiple-Site Processing, Single-Site Data |
|
|
562 | (1) |
|
12-6c Multiple-Site Processing, Multiple-Site Data |
|
|
563 | (1) |
|
12-7 Distributed Database Transparency Features |
|
|
564 | (1) |
|
12-8 Distribution Transparency |
|
|
565 | (3) |
|
12-9 Transaction Transparency |
|
|
568 | (5) |
|
12-9a Distributed Requests and Distributed Transactions |
|
|
568 | (3) |
|
12-9b Distributed Concurrency Control |
|
|
571 | (1) |
|
12-9c Two-Phase Commit Protocol |
|
|
571 | (2) |
|
12-10 Performance and Failure Transparency |
|
|
573 | (2) |
|
12-11 Distributed Database Design |
|
|
575 | (6) |
|
12-11a Data Fragmentation |
|
|
575 | (3) |
|
|
578 | (2) |
|
|
580 | (1) |
|
|
581 | (2) |
|
12-13 C.J. Date's 12 Commandments for Distributed Databases |
|
|
583 | (1) |
|
|
584 | (1) |
|
|
585 | (1) |
|
|
585 | (1) |
|
|
586 | (3) |
|
Chapter 13 Business Intelligence and Data Warehouses |
|
|
589 | (59) |
|
13-1 The Need for Data Analysis |
|
|
590 | (1) |
|
13-2 Business Intelligence |
|
|
590 | (12) |
|
13-2a Business Intelligence Architecture |
|
|
592 | (6) |
|
13-2b Business Intelligence Benefits |
|
|
598 | (1) |
|
13-2c Business Intelligence Evolution |
|
|
598 | (3) |
|
13-2d Business Intelligence Technology Trends |
|
|
601 | (1) |
|
13-3 Decision Support Data |
|
|
602 | (5) |
|
13-3a Operational Data Versus Decision Support Data |
|
|
602 | (3) |
|
13-3b Decision Support Database Requirements |
|
|
605 | (2) |
|
|
607 | (3) |
|
|
610 | (1) |
|
13-4b Twelve Rules That Define a Data Warehouse |
|
|
610 | (1) |
|
|
610 | (11) |
|
|
611 | (1) |
|
|
611 | (1) |
|
|
612 | (2) |
|
13-5d Attribute Hierarchies |
|
|
614 | (2) |
|
13-5e Star Schema Representation |
|
|
616 | (1) |
|
13-5f Performance-Improving Techniques for the Star Schema |
|
|
617 | (4) |
|
13-6 Online Analytical Processing |
|
|
621 | (8) |
|
13-6a Multidimensional Data Analysis Techniques |
|
|
621 | (2) |
|
13-6b Advanced Database Support |
|
|
623 | (1) |
|
13-6c Easy-to-Use End-User Interfaces |
|
|
623 | (1) |
|
|
623 | (3) |
|
|
626 | (2) |
|
13-6f Multidimensional CLAP |
|
|
628 | (1) |
|
13-6g Relational versus Multidimensional OLAP |
|
|
628 | (1) |
|
13-7 SQL Extensions for OLAP |
|
|
629 | (7) |
|
13-7a The ROLLUP Extension |
|
|
630 | (1) |
|
|
631 | (2) |
|
|
633 | (3) |
|
|
636 | (1) |
|
|
637 | (1) |
|
|
637 | (2) |
|
|
639 | (9) |
|
Chapter 14 Big Data Analytics and NoSQL |
|
|
648 | (31) |
|
|
649 | (6) |
|
|
651 | (1) |
|
|
652 | (1) |
|
|
653 | (1) |
|
14-1d Other Characteristics |
|
|
654 | (1) |
|
|
655 | (7) |
|
|
655 | (3) |
|
|
658 | (2) |
|
|
660 | (2) |
|
|
662 | (8) |
|
14-3a Key-Value Databases |
|
|
663 | (1) |
|
|
664 | (1) |
|
14-3c Column-Oriented Databases |
|
|
665 | (3) |
|
|
668 | (1) |
|
|
669 | (1) |
|
|
670 | (5) |
|
|
671 | (2) |
|
14-4b Predictive Analytics |
|
|
673 | (2) |
|
|
675 | (1) |
|
|
676 | (1) |
|
|
677 | (2) |
Part 5: Databases and the Internet |
|
679 | (42) |
|
Chapter 15 Database Connectivity and Web Technologies |
|
|
680 | (41) |
|
15-1 Database Connectivity |
|
|
681 | (11) |
|
15-1a Native SQL Connectivity |
|
|
682 | (1) |
|
|
683 | (2) |
|
|
685 | (2) |
|
|
687 | (4) |
|
15-1e Java Database Connectivity (JDBC) |
|
|
691 | (1) |
|
15-2 Database Internet Connectivity |
|
|
692 | (10) |
|
15-2a Web-to-Database Middleware: Server-Side Extensions |
|
|
693 | (2) |
|
15-2b Web Server Interfaces |
|
|
695 | (1) |
|
|
696 | (1) |
|
15-2d Client-Side Extensions |
|
|
697 | (1) |
|
15-2e Web Application Servers |
|
|
698 | (1) |
|
15-2f Web Database Development |
|
|
699 | (3) |
|
15-3 Extensible Markup Language (XML) |
|
|
702 | (7) |
|
15-3a Document Type Definitions (DTD) and XML Schemas |
|
|
704 | (2) |
|
|
706 | (2) |
|
|
708 | (1) |
|
15-4 Cloud Computing Services |
|
|
709 | (8) |
|
15-4a Cloud Implementation Types |
|
|
712 | (1) |
|
15-4b Characteristics of Cloud Services |
|
|
712 | (1) |
|
15-4c Types of Cloud Services |
|
|
713 | (1) |
|
15-4d Cloud Services: Advantages and Disadvantages |
|
|
714 | (2) |
|
|
716 | (1) |
|
|
717 | (1) |
|
|
718 | (1) |
|
|
718 | (1) |
|
|
719 | (2) |
Part 6: Database Administration |
|
721 | (48) |
|
Chapter 16 Database Administration and Security |
|
|
722 | (47) |
|
16-1 Data as a Corporate Asset |
|
|
723 | (1) |
|
16-2 The Need for a Database and its Role in an Organization |
|
|
724 | (2) |
|
16-3 Introduction of a Database: Special Considerations |
|
|
726 | (1) |
|
16-4 The Evolution of Database Administration |
|
|
727 | (4) |
|
16-5 The Database Environment's Human Component |
|
|
731 | (14) |
|
16-5a The DBA's Managerial Role |
|
|
733 | (5) |
|
16-5b The DBA's Technical Role |
|
|
738 | (7) |
|
|
745 | (4) |
|
|
746 | (1) |
|
16-6b Security Vulnerabilities |
|
|
746 | (2) |
|
|
748 | (1) |
|
16-7 Database Administration Tools |
|
|
749 | (6) |
|
16-7a The Data Dictionary |
|
|
750 | (2) |
|
|
752 | (3) |
|
16-8 Developing a Data Administration Strategy |
|
|
755 | (1) |
|
16-9 The DBA's Role in the Cloud |
|
|
756 | (1) |
|
16-10 The DBA at Work: Using Oracle for Database Administration |
|
|
757 | (8) |
|
16-10a Oracle Database Administration Tools |
|
|
758 | (1) |
|
16-10b Ensuring that the RDBMS Starts Automatically |
|
|
758 | (2) |
|
16-10c Creating Tablespaces and Datafiles |
|
|
760 | (2) |
|
16-10d Managing Users and Establishing Security |
|
|
762 | (1) |
|
16-10e Customizing the Database Initialization Parameters |
|
|
763 | (2) |
|
|
765 | (1) |
|
|
766 | (1) |
|
|
767 | (2) |
Glossary |
|
769 | (14) |
Index |
|
783 | |