Preface |
|
xxxiii | |
|
|
1 | (66) |
|
Introduction to Databases |
|
|
3 | (30) |
|
|
4 | (3) |
|
Traditional File-Based Systems |
|
|
7 | (7) |
|
|
7 | (5) |
|
Limitations of the File-Based Approach |
|
|
12 | (2) |
|
|
14 | (7) |
|
|
15 | (1) |
|
The Database Management System (DBMS) |
|
|
16 | (1) |
|
(Database) Application Programs |
|
|
17 | (1) |
|
Components of the DBMS Environment |
|
|
18 | (3) |
|
Database Design: The Paradigm Shift |
|
|
21 | (1) |
|
Roles in the Database Environment |
|
|
21 | (3) |
|
Data and Database Administrators |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
History of Database Management Systems |
|
|
24 | (2) |
|
Advantages and Disadvantages of DBMSs |
|
|
26 | (7) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (34) |
|
The Three-Level ANSI-SPARC Architecture |
|
|
34 | (5) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
Schemas, Mappings, and Instances |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (4) |
|
The Data Definition Language (DDL) |
|
|
40 | (1) |
|
The Data Manipulation Language (DML) |
|
|
40 | (2) |
|
Fourth-Generation Languages (4GLs) |
|
|
42 | (1) |
|
Data Models and Conceptual Modeling |
|
|
43 | (5) |
|
|
44 | (1) |
|
|
45 | (2) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (5) |
|
|
53 | (3) |
|
Multi-User DBMS Architectures |
|
|
56 | (11) |
|
|
56 | (1) |
|
File-Server Architectures |
|
|
56 | (1) |
|
Traditional Two-Tier Client-Server Architecture |
|
|
57 | (3) |
|
Three-Tier Client-Server Architecture |
|
|
60 | (2) |
|
Transaction Processing Monitors |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (2) |
|
Part 2 The Relational Model and Languages |
|
|
67 | (212) |
|
|
69 | (19) |
|
Brief History of the Relational Model |
|
|
70 | (1) |
|
|
71 | (10) |
|
Relational Data Structure |
|
|
72 | (3) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
Representing Relational Database Schemas |
|
|
79 | (2) |
|
|
81 | (2) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (5) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
Relational Algebra and Relational Calculus |
|
|
88 | (24) |
|
|
89 | (14) |
|
|
89 | (3) |
|
|
92 | (3) |
|
|
95 | (4) |
|
|
99 | (1) |
|
Aggregation and Grouping Operations |
|
|
100 | (2) |
|
Summary of the Relational Algebra Operations |
|
|
102 | (1) |
|
|
103 | (6) |
|
Tuple Relational Calculus |
|
|
103 | (4) |
|
Domain Relational Calculus |
|
|
107 | (2) |
|
|
109 | (3) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (45) |
|
|
113 | (3) |
|
|
113 | (1) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (40) |
|
|
118 | (9) |
|
Sorting Results (Order by Clause) |
|
|
127 | (2) |
|
Using the SQL Aggregate Functions |
|
|
129 | (2) |
|
Grouping Results (Group by Clause) |
|
|
131 | (3) |
|
|
134 | (4) |
|
|
138 | (1) |
|
|
139 | (7) |
|
|
146 | (1) |
|
Combining Result Tables (Union, Intersect, Except) |
|
|
147 | (2) |
|
|
149 | (5) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (2) |
|
|
157 | (41) |
|
|
158 | (6) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (4) |
|
Integrity Enhancement Feature |
|
|
164 | (4) |
|
|
164 | (1) |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (8) |
|
|
168 | (1) |
|
Creating a Table (Create Table) |
|
|
169 | (4) |
|
Changing a Table Definition (Alter Table) |
|
|
173 | (1) |
|
Removing a Table (Drop Table) |
|
|
174 | (1) |
|
Creating an Index (Create Index) |
|
|
175 | (1) |
|
Removing an Index (Drop Index) |
|
|
176 | (1) |
|
|
176 | (11) |
|
Creating a View (Create View) |
|
|
177 | (2) |
|
Removing a View (Drop View) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (2) |
|
|
183 | (1) |
|
Advantages and Disadvantages of Views |
|
|
184 | (2) |
|
|
186 | (1) |
|
|
187 | (2) |
|
Immediate and Deferred Integrity Constraints |
|
|
189 | (1) |
|
Discretionary Access Control |
|
|
189 | (9) |
|
Granting Privileges to Other Users (Grant) |
|
|
191 | (1) |
|
Revoking Privileges from Users (Revoke) |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (3) |
|
|
198 | (27) |
|
Introduction to Microsoft Office Access Queries |
|
|
199 | (2) |
|
Building Select Queries Using QBE |
|
|
201 | (7) |
|
|
202 | (2) |
|
Creating Multi-Table Queries |
|
|
204 | (3) |
|
|
207 | (1) |
|
|
208 | (7) |
|
|
208 | (1) |
|
|
209 | (3) |
|
|
212 | (2) |
|
|
214 | (1) |
|
|
215 | (1) |
|
Changing the Content of Tables Using Action Queries |
|
|
215 | (10) |
|
|
215 | (2) |
|
|
217 | (1) |
|
|
217 | (4) |
|
|
221 | (3) |
|
|
224 | (1) |
|
Commercial RDBMSs: Office Access and Oracle |
|
|
225 | (54) |
|
Microsoft Office Access 2003 |
|
|
226 | (16) |
|
|
226 | (1) |
|
Microsoft Office Access Architecture |
|
|
227 | (1) |
|
|
228 | (5) |
|
Relationships and Referential Integrity Definition |
|
|
233 | (1) |
|
General Constraint Definition |
|
|
234 | (2) |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
239 | (3) |
|
|
242 | (1) |
|
|
242 | (37) |
|
|
244 | (1) |
|
|
245 | (7) |
|
|
252 | (3) |
|
General Constraint Definition |
|
|
255 | (1) |
|
|
255 | (6) |
|
Subprograms, Stored Procedures, Functions, and Packages |
|
|
261 | (2) |
|
|
263 | (4) |
|
Oracle Internet Developer Suite |
|
|
267 | (4) |
|
Other Oracle Functionality |
|
|
271 | (1) |
|
|
271 | (5) |
|
|
276 | (1) |
|
|
277 | (2) |
|
Part 3 Database Analysis and Design Techniques |
|
|
279 | (156) |
|
Database Planning, Design, and Administration |
|
|
281 | (33) |
|
The Information Systems Lifecycle |
|
|
282 | (1) |
|
The Database System Development Lifecycle |
|
|
283 | (2) |
|
|
285 | (1) |
|
|
286 | (2) |
|
|
287 | (1) |
|
Requirements Collection and Analysis |
|
|
288 | (3) |
|
|
289 | (1) |
|
View Integration Approach |
|
|
289 | (2) |
|
|
291 | (4) |
|
Approaches to Database Design |
|
|
291 | (1) |
|
|
292 | (1) |
|
Phases of Database Design |
|
|
293 | (2) |
|
|
295 | (4) |
|
|
296 | (3) |
|
|
299 | (4) |
|
|
300 | (1) |
|
User Interface Design Guidelines |
|
|
301 | (2) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Data Conversion and Loading |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
307 | (2) |
|
Data Administration and Database Administration |
|
|
309 | (5) |
|
|
309 | (1) |
|
|
309 | (2) |
|
Comparison of Data and Database Administration |
|
|
311 | (1) |
|
|
311 | (2) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (28) |
|
When Are Fact-Finding Techniques Used? |
|
|
315 | (1) |
|
What Facts Are Collected? |
|
|
316 | (1) |
|
|
317 | (4) |
|
|
317 | (1) |
|
|
317 | (2) |
|
Observing the Enterprise in Operation |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
Using Fact-Finding Techniques -- A Worked Example |
|
|
321 | (21) |
|
The DreamHome Case Study -- An Overview |
|
|
321 | (5) |
|
The DreamHome Case Study -- Database Planning |
|
|
326 | (5) |
|
The DreamHome Case Study -- System Definition |
|
|
331 | (1) |
|
The DreamHome Case Study -- Requirements Collection and Analysis |
|
|
332 | (8) |
|
The DreamHome Case Study -- Database Design |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
341 | (1) |
|
Entity--Relationship Modeling |
|
|
342 | (29) |
|
|
343 | (3) |
|
|
346 | (4) |
|
Degree of Relationship Type |
|
|
347 | (2) |
|
|
349 | (1) |
|
|
350 | (4) |
|
Simple and Composite Attributes |
|
|
351 | (1) |
|
Single-Valued and Multi-Valued Attributes |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (2) |
|
Strong and Weak Entity Types |
|
|
354 | (1) |
|
Attributes on Relationships |
|
|
355 | (1) |
|
|
356 | (8) |
|
One-to-One (1:1) Relationships |
|
|
357 | (1) |
|
One-to-Many (1:*) Relationships |
|
|
358 | (1) |
|
Many-to-Many (*:*) Relationships |
|
|
359 | (2) |
|
Multiplicity for Complex Relationships |
|
|
361 | (1) |
|
Cardinality and Participation Constraints |
|
|
362 | (2) |
|
|
364 | (7) |
|
|
364 | (1) |
|
|
365 | (3) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (2) |
|
Enhanced Entity--Relationship Modeling |
|
|
371 | (16) |
|
Specialization/Generalization |
|
|
372 | (11) |
|
Superclasses and Subclasses |
|
|
372 | (1) |
|
Superclass/Subclass Relationships |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (3) |
|
Constraints on Specialization/Generalization |
|
|
378 | (1) |
|
Worked Example of using Specialization/Generalization to Model the Branch View of DreamHome Case Study |
|
|
379 | (4) |
|
|
383 | (1) |
|
|
384 | (3) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (28) |
|
The Purpose of Normalization |
|
|
388 | (1) |
|
How Normalization Supports Database Design |
|
|
389 | (1) |
|
Data Redundancy and Update Anomalies |
|
|
390 | (2) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
392 | (9) |
|
Characteristics of Functional Dependencies |
|
|
393 | (4) |
|
Identifying Functional Dependencies |
|
|
397 | (2) |
|
Identifying the Primary Key for a Relation using Functional Dependencies |
|
|
399 | (2) |
|
The Process of Normalization |
|
|
401 | (2) |
|
|
403 | (4) |
|
|
407 | (1) |
|
|
408 | (3) |
|
General Definitions of 2NF and 3NF |
|
|
411 | (4) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
413 | (2) |
|
|
415 | (20) |
|
More on Functional Dependencies |
|
|
416 | (3) |
|
Inference Rules for Functional Dependencies |
|
|
416 | (2) |
|
Minimal Sets of Functional Dependencies |
|
|
418 | (1) |
|
Boyce--Codd Normal Form (BCNF) |
|
|
419 | (3) |
|
Definition of Boyce--Codd Normal Form |
|
|
419 | (3) |
|
Review of Normalization up to BCNF |
|
|
422 | (6) |
|
|
428 | (2) |
|
|
428 | (2) |
|
Definition of Fourth Normal Form |
|
|
430 | (1) |
|
|
430 | (5) |
|
|
430 | (1) |
|
Definition of Fifth Normal Form |
|
|
431 | (2) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
433 | (2) |
|
|
435 | (104) |
|
Methodology -- Conceptual Database Design |
|
|
437 | (24) |
|
Introduction to the Database Design Methodology |
|
|
438 | (2) |
|
What is a Design Methodology? |
|
|
438 | (1) |
|
Conceptual, Logical, and Physical Database Design |
|
|
439 | (1) |
|
Critical Success Factors in Database Design |
|
|
440 | (1) |
|
Overview of the Database Design Methodology |
|
|
440 | (2) |
|
Conceptual Database Design Methodology |
|
|
442 | (19) |
|
Step 1 Build Conceptual Data Model |
|
|
442 | (16) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
Methodology -- Logical Database Design for the Relational Model |
|
|
461 | (33) |
|
Logical Database Design Methodology for the Relational Model |
|
|
462 | (32) |
|
Step 2 Build and Validate Logical Data Model |
|
|
462 | (28) |
|
|
490 | (1) |
|
|
491 | (1) |
|
|
492 | (2) |
|
Methodology -- Physical Database Design for Relational Databases |
|
|
494 | (25) |
|
Comparison of Logical and Physical Database Design |
|
|
495 | (1) |
|
Overview of Physical Database Design Methodology |
|
|
496 | (1) |
|
The Physical Database Design Methodology for Relational Databases |
|
|
497 | (22) |
|
Step 3 Translate Logical Data Model for Target DBMS |
|
|
497 | (4) |
|
Step 4 Design File Organizations and Indexes |
|
|
501 | (14) |
|
|
515 | (1) |
|
Step 6 Design Security Mechanisms |
|
|
516 | (1) |
|
|
517 | (1) |
|
|
517 | (1) |
|
|
518 | (1) |
|
Methodology -- Monitoring and Tuning the Operational System |
|
|
519 | (20) |
|
Denormalizing and Introducing Controlled Redundancy |
|
|
519 | (13) |
|
Step 7 Consider the Introduction of Controlled Redundancy |
|
|
519 | (13) |
|
Monitoring the System to Improve Performance |
|
|
532 | (7) |
|
Step 8 Monitor and Tune the Operational System |
|
|
532 | (5) |
|
|
537 | (1) |
|
|
537 | (1) |
|
|
537 | (2) |
|
Part 5 Selected Database Issues |
|
|
539 | (146) |
|
|
541 | (31) |
|
|
542 | (3) |
|
|
543 | (2) |
|
Countermeasures -- Computer-Based Controls |
|
|
545 | (10) |
|
|
546 | (1) |
|
|
547 | (3) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
RAID (Redundant Array of Independent Disks) |
|
|
552 | (3) |
|
Security in Microsoft Office Access DBMS |
|
|
555 | (3) |
|
|
558 | (4) |
|
|
562 | (10) |
|
|
563 | (1) |
|
|
563 | (1) |
|
Message Digest Algorithms and Digital Signatures |
|
|
564 | (1) |
|
|
564 | (1) |
|
|
565 | (1) |
|
Secure Sockets Layer and Secure HTTP |
|
|
565 | (1) |
|
Secure Electronic Transactions and Secure Transaction Technology |
|
|
566 | (1) |
|
|
566 | (3) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
571 | (1) |
|
|
572 | (58) |
|
|
573 | (4) |
|
Properties of Transactions |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
577 | (28) |
|
The Need for Concurrency Control |
|
|
577 | (3) |
|
Serializability and Recoverability |
|
|
580 | (7) |
|
|
587 | (7) |
|
|
594 | (3) |
|
|
597 | (3) |
|
Multiversion Timestamp Ordering |
|
|
600 | (1) |
|
|
601 | (1) |
|
Granularity of Data Items |
|
|
602 | (3) |
|
|
605 | (10) |
|
|
606 | (1) |
|
Transactions and Recovery |
|
|
607 | (2) |
|
|
609 | (3) |
|
|
612 | (3) |
|
Recovery in a Distributed DBMS |
|
|
615 | (1) |
|
Advanced Transaction Models |
|
|
615 | (7) |
|
|
616 | (2) |
|
|
618 | (1) |
|
Multilevel Transaction Model |
|
|
619 | (1) |
|
|
620 | (1) |
|
|
621 | (1) |
|
Concurrency Control and Recovery in Oracle |
|
|
622 | (8) |
|
Oracle's Isolation Levels |
|
|
623 | (1) |
|
Multiversion Read Consistency |
|
|
623 | (2) |
|
|
625 | (1) |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
627 | (1) |
|
|
628 | (2) |
|
|
630 | (55) |
|
Overview of Query Processing |
|
|
631 | (4) |
|
|
635 | (4) |
|
Heuristical Approach to Query Optimization |
|
|
639 | (7) |
|
Transformation Rules for the Relational Algebra Operations |
|
|
640 | (5) |
|
Heuristical Processing Strategies |
|
|
645 | (1) |
|
Cost Estimation for the Relational Algebra Operations |
|
|
646 | (19) |
|
|
646 | (1) |
|
|
647 | (7) |
|
|
654 | (8) |
|
|
662 | (2) |
|
The Relational Algebra Set Operations |
|
|
664 | (1) |
|
Enumeration of Alternative Execution Strategies |
|
|
665 | (8) |
|
|
665 | (1) |
|
|
666 | (1) |
|
Physical Operators and Execution Strategies |
|
|
667 | (1) |
|
Reducing the Search Space |
|
|
668 | (1) |
|
Enumerating Left-Deep Trees |
|
|
669 | (2) |
|
Semantic Query Optimization |
|
|
671 | (1) |
|
Alternative Approaches to Query Optimization |
|
|
672 | (1) |
|
Distributed Query Optimization |
|
|
672 | (1) |
|
Query Optimization in Oracle |
|
|
673 | (12) |
|
Rule-Based and Cost-Based Optimization |
|
|
673 | (4) |
|
|
677 | (1) |
|
Viewing the Execution Plan |
|
|
678 | (2) |
|
|
680 | (1) |
|
|
681 | (1) |
|
|
681 | (4) |
|
Part 6 Distributed DBMSs and Replication |
|
|
685 | (116) |
|
Distributed DBMSs -- Concepts and Design |
|
|
687 | (47) |
|
|
688 | (11) |
|
|
689 | (4) |
|
Advantages and Disadvantages of DDBMSs |
|
|
693 | (4) |
|
Homogeneous and Heterogeneous DDBMSs |
|
|
697 | (2) |
|
|
699 | (4) |
|
Functions and Architectures of a DDBMS |
|
|
703 | (5) |
|
|
703 | (1) |
|
Reference Architecture for a DDBMS |
|
|
704 | (1) |
|
Reference Architecture for a Federated MDBS |
|
|
705 | (1) |
|
Component Architecture for a DDBMS |
|
|
706 | (2) |
|
Distributed Relational Database Design |
|
|
708 | (11) |
|
|
709 | (1) |
|
|
710 | (9) |
|
Transparencies in a DDBMS |
|
|
719 | (10) |
|
Distribution Transparency |
|
|
719 | (3) |
|
|
722 | (3) |
|
|
725 | (3) |
|
|
728 | (1) |
|
Summary of Transparencies in a DDBMS |
|
|
728 | (1) |
|
Date's Twelve Rules for a DDBMS |
|
|
729 | (5) |
|
|
731 | (1) |
|
|
732 | (1) |
|
|
732 | (2) |
|
Distributed DBMSs -- Advanced Concepts |
|
|
734 | (46) |
|
Distributed Transaction Management |
|
|
735 | (1) |
|
Distributed Concurrency Control |
|
|
736 | (5) |
|
|
736 | (1) |
|
Distributed Serializability |
|
|
737 | (1) |
|
|
738 | (2) |
|
|
740 | (1) |
|
Distributed Deadlock Management |
|
|
741 | (3) |
|
Distributed Database Recovery |
|
|
744 | (14) |
|
Failures in a Distributed Environment |
|
|
744 | (1) |
|
How Failures Affect Recovery |
|
|
745 | (1) |
|
|
746 | (6) |
|
|
752 | (4) |
|
|
756 | (2) |
|
The X/Open Distributed Transaction Processing Model |
|
|
758 | (3) |
|
Distributed Query Optimization |
|
|
761 | (11) |
|
|
762 | (4) |
|
|
766 | (1) |
|
|
767 | (5) |
|
|
772 | (8) |
|
Oracle's DDBMS Functionality |
|
|
772 | (5) |
|
|
777 | (1) |
|
|
778 | (1) |
|
|
778 | (2) |
|
Replication and Mobile Databases |
|
|
780 | (21) |
|
Introduction to Database Replication |
|
|
781 | (1) |
|
Benefits of Database Replication |
|
|
781 | (2) |
|
Applications of Replication |
|
|
783 | (1) |
|
Basic Components of Database Replication |
|
|
783 | (1) |
|
Database Replication Environments |
|
|
784 | (4) |
|
Synchronous Versus Asynchronous Replication |
|
|
784 | (1) |
|
|
784 | (4) |
|
|
788 | (4) |
|
Replication Server Functionality |
|
|
788 | (1) |
|
|
789 | (3) |
|
Introduction to Mobile Databases |
|
|
792 | (2) |
|
|
794 | (1) |
|
|
794 | (7) |
|
Oracle's Replication Functionality |
|
|
794 | (5) |
|
|
799 | (1) |
|
|
800 | (1) |
|
|
800 | (1) |
|
|
801 | (190) |
|
Introduction to Object DBMSs |
|
|
803 | (44) |
|
Advanced Database Applications |
|
|
804 | (5) |
|
|
809 | (5) |
|
|
814 | (11) |
|
Abstraction, Encapsulation, and Information Hiding |
|
|
814 | (1) |
|
|
815 | (1) |
|
|
816 | (2) |
|
|
818 | (1) |
|
|
819 | (1) |
|
Subclasses, Superclasses, and Inheritance |
|
|
820 | (2) |
|
Overriding and Overloading |
|
|
822 | (1) |
|
Polymorphism and Dynamic Binding |
|
|
823 | (1) |
|
|
824 | (1) |
|
Storing Objects in a Relational Database |
|
|
825 | (3) |
|
Mapping Classes to Relations |
|
|
826 | (1) |
|
Accessing Objects in the Relational Database |
|
|
827 | (1) |
|
Next-Generation Database Systems |
|
|
828 | (2) |
|
Object-Oriented Database Design |
|
|
830 | (6) |
|
Comparison of Object-Oriented Data Modeling and Conceptual Data Modeling |
|
|
830 | (1) |
|
Relationships and Referential Integrity |
|
|
831 | (3) |
|
|
834 | (2) |
|
Object-Oriented Analysis and Design with UML |
|
|
836 | (11) |
|
|
837 | (5) |
|
Usage of UML in the Methodology for Database Design |
|
|
842 | (2) |
|
|
844 | (1) |
|
|
845 | (1) |
|
|
846 | (1) |
|
Object-Oriented DBMSs -- Concepts |
|
|
847 | (41) |
|
Introduction to Object-Oriented Data Models and OODBMSs |
|
|
849 | (11) |
|
Definition of Object-Oriented DBMSs |
|
|
849 | (1) |
|
|
850 | (4) |
|
Persistent Programming Languages |
|
|
854 | (3) |
|
The Object-Oriented Database System Manifesto |
|
|
857 | (2) |
|
Alternative Strategies for Developing an OODBMS |
|
|
859 | (1) |
|
|
860 | (7) |
|
Pointer Swizzling Techniques |
|
|
862 | (3) |
|
|
865 | (2) |
|
|
867 | (4) |
|
|
868 | (1) |
|
|
869 | (2) |
|
|
871 | (10) |
|
|
871 | (1) |
|
|
872 | (1) |
|
|
873 | (3) |
|
|
876 | (2) |
|
|
878 | (3) |
|
Advantages and Disadvantages of OODBMSs |
|
|
881 | (7) |
|
|
881 | (2) |
|
|
883 | (2) |
|
|
885 | (1) |
|
|
886 | (1) |
|
|
887 | (1) |
|
Object-Oriented DBMSs -- Standards and Systems |
|
|
888 | (47) |
|
|
889 | (8) |
|
|
889 | (2) |
|
The Common Object Request Broker Architecture |
|
|
891 | (3) |
|
|
894 | (3) |
|
Model-Driven Architecture |
|
|
897 | (1) |
|
Object Data Standard ODMG 3.0, 1999 |
|
|
897 | (24) |
|
Object Data Management Group |
|
|
897 | (3) |
|
|
900 | (8) |
|
The Object Definition Language |
|
|
908 | (3) |
|
The Object Query Language |
|
|
911 | (6) |
|
Other Parts of the ODMG Standard |
|
|
917 | (3) |
|
Mapping the Conceptual Design to a Logical (Object-Oriented) Design |
|
|
920 | (1) |
|
|
921 | (14) |
|
|
921 | (3) |
|
Building an ObjectStore Application |
|
|
924 | (2) |
|
Data Definition in ObjectStore |
|
|
926 | (3) |
|
Data Manipulation in ObjectStore |
|
|
929 | (3) |
|
|
932 | (2) |
|
|
934 | (1) |
|
|
934 | (1) |
|
|
935 | (56) |
|
Introduction to Object-Relational Database Systems |
|
|
936 | (3) |
|
The Third-Generation Database Manifesto |
|
|
939 | (4) |
|
The Third-Generation Database System Manifesto |
|
|
940 | (1) |
|
|
940 | (3) |
|
Postgres -- An Early ORDBMS |
|
|
943 | (3) |
|
|
943 | (1) |
|
|
943 | (1) |
|
Relations and Inheritance |
|
|
944 | (2) |
|
|
946 | (1) |
|
|
946 | (28) |
|
|
947 | (1) |
|
|
948 | (3) |
|
|
951 | (2) |
|
|
953 | (2) |
|
|
955 | (1) |
|
Reference Types and Object Identity |
|
|
956 | (1) |
|
|
957 | (3) |
|
|
960 | (1) |
|
|
961 | (4) |
|
|
965 | (1) |
|
Persistent Stored Modules |
|
|
966 | (1) |
|
|
967 | (4) |
|
|
971 | (1) |
|
|
972 | (2) |
|
Query Processing and Optimization |
|
|
974 | (4) |
|
|
977 | (1) |
|
Object-Oriented Extensions in Oracle |
|
|
978 | (8) |
|
|
978 | (6) |
|
Manipulating Object Tables |
|
|
984 | (1) |
|
|
985 | (1) |
|
|
986 | (1) |
|
Comparison of ORDBMS and OODBMS |
|
|
986 | (5) |
|
|
988 | (1) |
|
|
988 | (1) |
|
|
989 | (2) |
|
|
991 | (156) |
|
|
993 | (72) |
|
Introduction to the Internet and Web |
|
|
994 | (4) |
|
|
996 | (1) |
|
e-Commerce and e-Business |
|
|
997 | (1) |
|
|
998 | (13) |
|
HyperText Transfer Protocol |
|
|
999 | (2) |
|
HyperText Markup Language |
|
|
1001 | (1) |
|
Uniform Resource Locators |
|
|
1002 | (2) |
|
Static and Dynamic Web Pages |
|
|
1004 | (1) |
|
|
1004 | (1) |
|
Requirements for Web--DBMS Integration |
|
|
1005 | (1) |
|
Advantages and Disadvantages of the Web--DBMS Approach |
|
|
1006 | (5) |
|
Approaches to Integrating the Web and DBMSs |
|
|
1011 | (1) |
|
|
1011 | (3) |
|
|
1012 | (1) |
|
|
1012 | (1) |
|
|
1013 | (1) |
|
|
1014 | (5) |
|
Passing Information to a CGI Script |
|
|
1016 | (2) |
|
Advantages and Disadvantages of CGI |
|
|
1018 | (1) |
|
|
1019 | (1) |
|
|
1020 | (1) |
|
Comparison of CGI and API |
|
|
1021 | (1) |
|
|
1021 | (22) |
|
|
1025 | (5) |
|
|
1030 | (1) |
|
Comparison of JDBC and SQLJ |
|
|
1030 | (1) |
|
Container-Managed Persistence (CMP) |
|
|
1031 | (4) |
|
|
1035 | (5) |
|
|
1040 | (1) |
|
|
1041 | (1) |
|
|
1042 | (1) |
|
|
1043 | (12) |
|
|
1045 | (1) |
|
Active Server Pages and ActiveX Data Objects |
|
|
1046 | (3) |
|
|
1049 | (1) |
|
Comparison of ASP and JSP |
|
|
1049 | (1) |
|
|
1050 | (4) |
|
|
1054 | (1) |
|
Microsoft Office Access and Web Page Generation |
|
|
1054 | (1) |
|
|
1055 | (10) |
|
Oracle Application Server (OracleAS) |
|
|
1056 | (6) |
|
|
1062 | (1) |
|
|
1063 | (1) |
|
|
1064 | (1) |
|
Semistructured Data and XML |
|
|
1065 | (82) |
|
|
1066 | (7) |
|
Object Exchange Model (OEM) |
|
|
1068 | (1) |
|
|
1069 | (4) |
|
|
1073 | (9) |
|
|
1076 | (2) |
|
Document Type Definitions (DTDs) |
|
|
1078 | (4) |
|
|
1082 | (9) |
|
|
1082 | (1) |
|
|
1083 | (1) |
|
|
1084 | (1) |
|
XPath (XML Path Language) |
|
|
1085 | (1) |
|
XPointer (XML Pointer Language) |
|
|
1085 | (1) |
|
XLink (XML Linking Language) |
|
|
1086 | (1) |
|
|
1087 | (1) |
|
Simple Object Access Protocol (SOAP) |
|
|
1087 | (1) |
|
Web Services Description Language (WSDL) |
|
|
1088 | (1) |
|
Universal Discovery, Description and Integration (UDDI) |
|
|
1088 | (3) |
|
|
1091 | (9) |
|
Resource Description Framework (RDF) |
|
|
1098 | (2) |
|
|
1100 | (28) |
|
Extending Lore and Lorel to Handle XML |
|
|
1100 | (1) |
|
|
1101 | (2) |
|
XQuery - A Query Language for XML |
|
|
1103 | (11) |
|
|
1114 | (1) |
|
XQuery 1.0 and XPath 2.0 Data Model |
|
|
1115 | (6) |
|
|
1121 | (7) |
|
|
1128 | (11) |
|
|
1129 | (3) |
|
|
1132 | (5) |
|
|
1137 | (2) |
|
|
1139 | (8) |
|
|
1142 | (2) |
|
|
1144 | (1) |
|
|
1145 | (2) |
|
Part 9 Business Intelligence |
|
|
1147 | (100) |
|
Data Warehousing Concepts |
|
|
1149 | (32) |
|
Introduction to Data Warehousing |
|
|
1150 | (6) |
|
The Evolution of Data Warehousing |
|
|
1150 | (1) |
|
Data Warehousing Concepts |
|
|
1151 | (1) |
|
Benefits of Data Warehousing |
|
|
1152 | (1) |
|
Comparison of OLTP Systems and Data Warehousing |
|
|
1153 | (1) |
|
Problems of Data Warehousing |
|
|
1154 | (2) |
|
Data Warehouse Architecture |
|
|
1156 | (5) |
|
|
1156 | (1) |
|
|
1157 | (1) |
|
|
1158 | (1) |
|
|
1158 | (1) |
|
|
1158 | (1) |
|
|
1159 | (1) |
|
Lightly and Highly Summarized Data |
|
|
1159 | (1) |
|
|
1159 | (1) |
|
|
1159 | (1) |
|
|
1160 | (1) |
|
Data Warehouse Data Flows |
|
|
1161 | (4) |
|
|
1162 | (1) |
|
|
1163 | (1) |
|
|
1164 | (1) |
|
|
1164 | (1) |
|
|
1165 | (1) |
|
Data Warehousing Tools and Technologies |
|
|
1165 | (6) |
|
Extraction, Cleansing, and Transformation Tools |
|
|
1165 | (1) |
|
|
1166 | (3) |
|
|
1169 | (2) |
|
Administration and Management Tools |
|
|
1171 | (1) |
|
|
1171 | (4) |
|
Reasons for Creating a Data Mart |
|
|
1173 | (1) |
|
|
1173 | (2) |
|
Data Warehousing Using Oracle |
|
|
1175 | (6) |
|
|
1175 | (3) |
|
|
1178 | (2) |
|
|
1180 | (1) |
|
|
1180 | (1) |
|
|
1181 | (23) |
|
Designing a Data Warehouse Database |
|
|
1182 | (1) |
|
|
1183 | (4) |
|
Comparison of DM and ER models |
|
|
1186 | (1) |
|
Database Design Methodology for Data Warehouses |
|
|
1187 | (8) |
|
Criteria for Assessing the Dimensionality of a Data Warehouse |
|
|
1195 | (1) |
|
Data Warehousing Design Using Oracle |
|
|
1196 | (8) |
|
Oracle Warehouse Builder Components |
|
|
1197 | (1) |
|
Using Oracle Warehouse Builder |
|
|
1198 | (4) |
|
|
1202 | (1) |
|
|
1203 | (1) |
|
|
1203 | (1) |
|
|
1204 | (28) |
|
Online Analytical Processing |
|
|
1205 | (1) |
|
|
1206 | (1) |
|
|
1206 | (3) |
|
|
1208 | (1) |
|
Representation of Multi-Dimensional Data |
|
|
1209 | (2) |
|
|
1211 | (6) |
|
Codd's Rules for OLAP Tools |
|
|
1211 | (3) |
|
|
1214 | (3) |
|
OLAP Extensions to the SQL Standard |
|
|
1217 | (7) |
|
Extended Grouping Capabilities |
|
|
1218 | (4) |
|
Elementary OLAP Operators |
|
|
1222 | (2) |
|
|
1224 | (8) |
|
|
1225 | (1) |
|
Platform for Business Intelligence Applications |
|
|
1225 | (1) |
|
|
1226 | (2) |
|
|
1228 | (1) |
|
|
1229 | (1) |
|
|
1229 | (1) |
|
|
1230 | (1) |
|
|
1230 | (1) |
|
|
1231 | (1) |
|
|
1231 | (1) |
|
|
1232 | (15) |
|
|
1233 | (1) |
|
|
1233 | (6) |
|
|
1235 | (1) |
|
|
1236 | (1) |
|
|
1237 | (1) |
|
|
1238 | (1) |
|
|
1239 | (2) |
|
|
1239 | (2) |
|
|
1241 | (1) |
|
Data Mining and Data Warehousing |
|
|
1242 | (1) |
|
|
1242 | (5) |
|
|
1242 | (1) |
|
Enabling Data Mining Applications |
|
|
1243 | (1) |
|
|
1243 | (1) |
|
Oracle Data Mining Environment |
|
|
1243 | (2) |
|
|
1245 | (1) |
|
|
1246 | (1) |
|
|
1246 | (1) |
|
|
1247 | (85) |
|
A Users' Requirements Specification for DreamHome Case Study |
|
|
1249 | (6) |
|
A.1 Branch User Views of DreamHome |
|
|
1249 | (1) |
|
|
1249 | (2) |
|
A.1.2 Transaction Requirements (Sample) |
|
|
1251 | (1) |
|
A.2 Staff User Views of DreamHome |
|
|
1252 | (1) |
|
|
1252 | (1) |
|
A.2.2 Transaction Requirements (Sample) |
|
|
1253 | (2) |
|
|
1255 | (13) |
|
B.1 The University Accommodation Office Case Study |
|
|
1255 | (1) |
|
|
1255 | (2) |
|
B.1.2 Query Transactions (Sample) |
|
|
1257 | (1) |
|
B.2 The EasyDrive School of Motoring Case Study |
|
|
1258 | (1) |
|
|
1258 | (1) |
|
B.2.2 Query Transactions (Sample) |
|
|
1259 | (1) |
|
B.3 The Wellmeadows Hospital Case Study |
|
|
1260 | (1) |
|
|
1260 | (6) |
|
B.3.2 Transaction Requirements (Sample) |
|
|
1266 | (2) |
|
C File Organizations and Indexes |
|
|
1268 | (25) |
|
|
1269 | (1) |
|
|
1270 | (1) |
|
|
1271 | (1) |
|
|
1272 | (3) |
|
|
1275 | (1) |
|
C.4.2 Limitations of Hashing |
|
|
1276 | (1) |
|
|
1277 | (1) |
|
|
1277 | (1) |
|
C.5.2 Indexed Sequential Files |
|
|
1278 | (1) |
|
|
1279 | (1) |
|
|
1280 | (1) |
|
|
1280 | (3) |
|
|
1283 | (1) |
|
|
1284 | (2) |
|
C.6 Clustered and Non-Clustered Tables |
|
|
1286 | (1) |
|
|
1286 | (1) |
|
|
1287 | (1) |
|
C.7 Guidelines for Selecting File Organizations |
|
|
1288 | (3) |
|
|
1291 | (2) |
|
D When is a DBMS Relational? |
|
|
1293 | (5) |
|
|
1298 | (22) |
|
|
1299 | (1) |
|
E.1.1 Simple Embedded SQL Statements |
|
|
1299 | (2) |
|
E.1.2 SQL Communications Area |
|
|
1301 | (2) |
|
E.1.3 Host Language Variables |
|
|
1303 | (1) |
|
E.1.4 Retrieving Data Using Embedded SQL and Cursors |
|
|
1304 | (6) |
|
E.1.5 Using Cursors to Modify Data |
|
|
1310 | (1) |
|
E.1.6 ISO Standard for Embedded SQL |
|
|
1311 | (1) |
|
|
1312 | (1) |
|
E.3 The Open Database Connectivity (ODBC) Standard |
|
|
1313 | (1) |
|
E.3.1 The ODBC Architecture |
|
|
1314 | (1) |
|
E.3.2 ODBC Conformance Levels |
|
|
1315 | (3) |
|
|
1318 | (1) |
|
|
1319 | (1) |
|
|
1319 | (1) |
|
F Alternative ER Modeling Notations |
|
|
1320 | (6) |
|
F.1 ER Modeling Using the Chen Notation |
|
|
1320 | (1) |
|
F.2 ER Modeling Using the Crow's Feet Notation |
|
|
1320 | (6) |
|
G Summary of the Database Design Methodology for Relational Databases |
|
|
1326 | (6) |
References |
|
1332 | (13) |
Further Reading |
|
1345 | (11) |
Index |
|
1356 | |