Preface |
|
xxxv | |
|
|
1 | (88) |
|
Introduction to Databases |
|
|
3 | (32) |
|
|
4 | (3) |
|
Traditional File-Based Systems |
|
|
7 | (7) |
|
|
7 | (5) |
|
Limitations of the File-Based Approach |
|
|
12 | (2) |
|
|
14 | (7) |
|
|
15 | (1) |
|
The Database Management System (DBMS) |
|
|
16 | (1) |
|
(Database) Application Programs |
|
|
17 | (1) |
|
Components of the DBMS Environment |
|
|
18 | (3) |
|
Database Design: The Paradigm Shift |
|
|
21 | (1) |
|
Roles in the Database Environment |
|
|
21 | (2) |
|
Data and Database Administrators |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
History of Database Management Systems |
|
|
23 | (4) |
|
Advantages and Disadvantages of DBMSs |
|
|
27 | (8) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (3) |
|
|
35 | (22) |
|
The Three-Level ANSI-SPARC Architecture |
|
|
36 | (5) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
Schemas, Mappings, and Instances |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (4) |
|
The Data Definition Language (DDL) |
|
|
42 | (1) |
|
The Data Manipulation Language (DML) |
|
|
42 | (2) |
|
Fourth-Generation Languages (4GLs) |
|
|
44 | (1) |
|
Data Models and Conceptual Modeling |
|
|
45 | (4) |
|
|
46 | (1) |
|
|
46 | (3) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (8) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (2) |
|
Database Architectures and the Web |
|
|
57 | (32) |
|
Multi-user DBMS Architectures |
|
|
58 | (11) |
|
|
58 | (1) |
|
|
59 | (1) |
|
Traditional Two-Tier Client-Server Architecture |
|
|
60 | (3) |
|
Three-Tier Client-Server Architecture |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (2) |
|
Transaction Processing Monitors |
|
|
67 | (2) |
|
Web Services and Service-Oriented Architectures |
|
|
69 | (3) |
|
|
69 | (1) |
|
Service-Oriented Architectures (SOA) |
|
|
70 | (2) |
|
|
72 | (2) |
|
|
74 | (3) |
|
|
77 | (3) |
|
|
80 | (9) |
|
Oracle's Logical Database Structure |
|
|
80 | (2) |
|
Oracle's Physical Database Structure |
|
|
82 | (4) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (2) |
|
Part 2 The Relational Model and Languages |
|
|
89 | (170) |
|
|
91 | (18) |
|
Brief History of the Relational Model |
|
|
92 | (2) |
|
|
94 | (9) |
|
Relational Data Structure |
|
|
94 | (3) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (2) |
|
|
100 | (1) |
|
Representing Relational Database Schemas |
|
|
101 | (2) |
|
|
103 | (2) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (4) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Relational Algebra and Relational Calculus |
|
|
109 | (24) |
|
|
110 | (13) |
|
|
110 | (3) |
|
|
113 | (3) |
|
|
116 | (3) |
|
|
119 | (1) |
|
Aggregation and Grouping Operations |
|
|
120 | (2) |
|
Summary of the Relational Algebra Operations |
|
|
122 | (1) |
|
|
123 | (5) |
|
Tuple Relational Calculus |
|
|
123 | (3) |
|
Domain Relational Calculus |
|
|
126 | (2) |
|
|
128 | (5) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (3) |
|
|
133 | (42) |
|
|
134 | (3) |
|
|
134 | (1) |
|
|
135 | (2) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (37) |
|
|
139 | (8) |
|
Sorting Results (Order By Clause) |
|
|
147 | (2) |
|
Using the SQL Aggregate Functions |
|
|
149 | (2) |
|
Grouping Results (Group By Clause) |
|
|
151 | (3) |
|
|
154 | (2) |
|
|
156 | (2) |
|
|
158 | (6) |
|
|
164 | (1) |
|
Combining Result Tables (UNION, INTERSECT, EXCEPT) |
|
|
165 | (2) |
|
|
167 | (4) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (3) |
|
|
175 | (38) |
|
|
176 | (5) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (3) |
|
Integrity Enhancement Feature |
|
|
181 | (4) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (8) |
|
|
186 | (1) |
|
Creating a Table (CREATE TABLE) |
|
|
187 | (3) |
|
Changing a Table Definition (ALTER TABLE) |
|
|
190 | (1) |
|
Removing a Table (DROP TABLE) |
|
|
191 | (1) |
|
Creating an Index (CREATE INDEX) |
|
|
192 | (1) |
|
Removing an Index (DROP INDEX) |
|
|
192 | (1) |
|
|
193 | (10) |
|
Creating a View (CREATE VIEW) |
|
|
193 | (2) |
|
Removing a View (DROP VIEW) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (2) |
|
Advantages and Disadvantages of Views |
|
|
200 | (2) |
|
|
202 | (1) |
|
|
203 | (1) |
|
Immediate and Deferred Integrity Constraints |
|
|
204 | (1) |
|
Discretionary Access Control |
|
|
204 | (9) |
|
Granting Privileges to Other Users (GRANT) |
|
|
206 | (1) |
|
Revoking Privileges from Users (REVOKE) |
|
|
207 | (2) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (3) |
|
|
213 | (20) |
|
The SQL Programming Language |
|
|
214 | (8) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (2) |
|
|
218 | (1) |
|
|
219 | (3) |
|
Subprograms, Stored Procedures, Functions, and Packages |
|
|
222 | (1) |
|
|
223 | (6) |
|
|
229 | (4) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (2) |
|
|
233 | (26) |
|
Introduction to Microsoft Office Access Queries |
|
|
234 | (2) |
|
Building Select Queries Using QBE |
|
|
236 | (6) |
|
|
237 | (2) |
|
Creating Multi-table Queries |
|
|
239 | (3) |
|
|
242 | (1) |
|
|
242 | (8) |
|
|
242 | (1) |
|
|
243 | (3) |
|
|
246 | (2) |
|
|
248 | (1) |
|
|
249 | (1) |
|
Changing the Content of Tables Using Action Queries |
|
|
250 | (9) |
|
|
250 | (1) |
|
|
250 | (3) |
|
|
253 | (1) |
|
|
253 | (5) |
|
|
258 | (1) |
|
Part 3 Database Analysis and Design |
|
|
259 | (256) |
|
Database System Development Lifecycle |
|
|
261 | (30) |
|
The Information Systems Lifecycle |
|
|
262 | (1) |
|
The Database System Development Lifecycle |
|
|
263 | (1) |
|
|
263 | (3) |
|
|
266 | (1) |
|
|
266 | (1) |
|
Requirements Collection and Analysis |
|
|
266 | (4) |
|
|
268 | (1) |
|
View Integration Approach |
|
|
268 | (2) |
|
|
270 | (5) |
|
Approaches to Database Design |
|
|
271 | (1) |
|
|
271 | (1) |
|
Phases of Database Design |
|
|
272 | (3) |
|
|
275 | (4) |
|
|
275 | (4) |
|
|
279 | (4) |
|
|
280 | (1) |
|
User Interface Design Guidelines |
|
|
281 | (2) |
|
|
283 | (1) |
|
|
283 | (1) |
|
Data Conversion and Loading |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
286 | (5) |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
Database Analysis and the DreamHome Case Study |
|
|
291 | (30) |
|
When Are Fact-Finding Techniques Used? |
|
|
292 | (1) |
|
What Facts are Collected? |
|
|
293 | (1) |
|
|
294 | (3) |
|
|
294 | (1) |
|
|
294 | (1) |
|
Observing the Enterprise in Operation |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
Using Fact-Finding Techniques: A Worked Example |
|
|
297 | (24) |
|
The DreamHome Case Study---An Overview of the Current System |
|
|
298 | (4) |
|
The DreamHome Case Study---Database Planning |
|
|
302 | (6) |
|
The DreamHome Case Study---System Definition |
|
|
308 | (1) |
|
The DreamHome Case Study---Requirements Collection and Analysis |
|
|
309 | (8) |
|
The DreamHome Case Study---Database Design |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
318 | (3) |
|
Entity-Relationship Modeling |
|
|
321 | (28) |
|
|
322 | (2) |
|
|
324 | (5) |
|
Degree of Relationship Type |
|
|
326 | (2) |
|
|
328 | (1) |
|
|
329 | (4) |
|
Simple and Composite Attributes |
|
|
329 | (1) |
|
Single-valued and Multi-valued Attributes |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (2) |
|
Strong and Weak Entity Types |
|
|
333 | (1) |
|
Attributes on Relationships |
|
|
334 | (1) |
|
|
335 | (7) |
|
One-to-One (1:1) Relationships |
|
|
336 | (1) |
|
One-to-Many (1:*) Relationships |
|
|
337 | (1) |
|
Many-to-Many (*:*) Relationships |
|
|
338 | (1) |
|
Multiplicity for Complex Relationships |
|
|
339 | (1) |
|
Cardinality and Participation Constraints |
|
|
340 | (2) |
|
|
342 | (7) |
|
|
342 | (2) |
|
|
344 | (2) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (2) |
|
Enhanced Entity-Relationship Modeling |
|
|
349 | (16) |
|
Specialization/Generalization |
|
|
350 | (11) |
|
Superclasses and Subclasses |
|
|
350 | (1) |
|
Superclass/Subclass Relationships |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (3) |
|
Constraints on Specialization/Generalization |
|
|
356 | (1) |
|
Worked Example of using Specialization/Generalization to Model the Branch View of the DreamHome Case Study |
|
|
357 | (4) |
|
|
361 | (1) |
|
|
362 | (3) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (28) |
|
The Purpose of Normalization |
|
|
366 | (1) |
|
How Normalization Supports Database Design |
|
|
367 | (1) |
|
Data Redundancy and Update Anomalies |
|
|
368 | (2) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (8) |
|
Characteristics of Functional Dependencies |
|
|
370 | (4) |
|
Identifying Functional Dependencies |
|
|
374 | (3) |
|
Identifying the Primary Key for a Relation Using Functional Dependencies |
|
|
377 | (1) |
|
The Process of Normalization |
|
|
378 | (2) |
|
|
380 | (4) |
|
|
384 | (1) |
|
|
385 | (2) |
|
General Definitions of 2NF and 3NF |
|
|
387 | (6) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (3) |
|
|
393 | (102) |
|
More on Functional Dependencies |
|
|
394 | (80) |
|
Inference Rules for Functional Dependencies |
|
|
394 | (2) |
|
Minimal Sets of Functional Dependencies |
|
|
396 | (78) |
|
The Physical Database Design Methodology for Relational Database |
|
|
474 | (21) |
|
Step 3: Translate Logical Data Model for Target DBMS |
|
|
474 | (5) |
|
|
479 | (13) |
|
Step 5: Design User Views |
|
|
492 | (1) |
|
Step 6: Design Security Mechanisms |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
Methodology---Monitoring and Tuning the Operational System |
|
|
495 | (20) |
|
Denormalizing and Introducing Controlled Redundancy |
|
|
495 | (13) |
|
Step 7: Consider the Introduction of Controlled Redundancy |
|
|
495 | (13) |
|
Monitoring the System to Improve Performance |
|
|
508 | (7) |
|
Step 8: Monitor and Tune the Operational System |
|
|
508 | (4) |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
513 | (2) |
|
Part 5 Selected Database Issues |
|
|
515 | (164) |
|
Security and Administration |
|
|
517 | (32) |
|
|
518 | (3) |
|
|
519 | (2) |
|
Countermeasures---Computer-Based Controls |
|
|
521 | (10) |
|
|
522 | (1) |
|
|
523 | (3) |
|
|
526 | (1) |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
RAID (Redundant Array of Independent Disks) |
|
|
528 | (3) |
|
Security in Microsoft Office Access DBMS |
|
|
531 | (2) |
|
|
533 | (4) |
|
|
537 | (7) |
|
|
538 | (1) |
|
|
538 | (1) |
|
Message Digest Algorithms and Digital Signatures |
|
|
539 | (1) |
|
|
539 | (1) |
|
|
540 | (1) |
|
Secure Sockets Layer and Secure HTTP |
|
|
540 | (1) |
|
Secure Electronic Transactions and Secure Transaction Technology |
|
|
541 | (1) |
|
|
542 | (2) |
|
|
544 | (1) |
|
Data Administration and Database Administration |
|
|
544 | (5) |
|
|
545 | (1) |
|
|
546 | (1) |
|
Comparison of Data and Database Administration |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
Professional, Legal, and Ethical Issues in Data Management |
|
|
549 | (20) |
|
Defining Legal and Ethical Issues in IT |
|
|
550 | (3) |
|
Defining Ethics in the Context of IT |
|
|
550 | (1) |
|
The Difference Between Ethical and Legal Behavior |
|
|
551 | (1) |
|
|
552 | (1) |
|
Legislation and Its Impact on the IT Function |
|
|
553 | (5) |
|
Securities and Exchange Commission (SEC) Regulation National Market System (NMS) |
|
|
553 | (1) |
|
The Sarbanes-Oxley Act, COBIT, and COSO |
|
|
553 | (2) |
|
The Health Insurance Portability and Accountability Act |
|
|
555 | (1) |
|
The European Union (EU) Directive on Data Protection of 1995 |
|
|
555 | (1) |
|
The United Kingdom's Data Protection Act of 1998 |
|
|
556 | (1) |
|
International Banking---Basel II Accords |
|
|
557 | (1) |
|
Establishing a Culture of Legal and Ethical Data Stewardship |
|
|
558 | (5) |
|
Developing an Organization-Wide Policy for Legal and Ethical Behavior |
|
|
558 | (1) |
|
Professional Organizations and Codes of Ethics |
|
|
559 | (2) |
|
Developing an Organization-Wide Policy for Legal and Ethical Behavior for DreamHome |
|
|
561 | (2) |
|
|
563 | (6) |
|
|
563 | (1) |
|
|
564 | (1) |
|
|
564 | (1) |
|
Intellectual Property Rights Issues for Software |
|
|
565 | (1) |
|
Intellectual Property Rights Issues for Data |
|
|
566 | (1) |
|
|
566 | (1) |
|
|
567 | (1) |
|
|
567 | (2) |
|
|
569 | (58) |
|
|
570 | (4) |
|
Properties of Transactions |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
574 | (28) |
|
The Need for Concurrency Control |
|
|
574 | (3) |
|
Serializability and Recoverability |
|
|
577 | (8) |
|
|
585 | (6) |
|
|
591 | (3) |
|
|
594 | (3) |
|
Multiversion Timestamp Ordering |
|
|
597 | (1) |
|
|
598 | (1) |
|
Granularity of Data Items |
|
|
599 | (3) |
|
|
602 | (9) |
|
|
602 | (1) |
|
Transactions and Recovery |
|
|
603 | (3) |
|
|
606 | (3) |
|
|
609 | (2) |
|
Recovery in a Distributed DBMS |
|
|
611 | (1) |
|
Advanced Transaction Models |
|
|
611 | (7) |
|
Nested Transaction Models |
|
|
613 | (1) |
|
|
614 | (1) |
|
Multilevel Transaction Model |
|
|
615 | (1) |
|
|
616 | (1) |
|
|
617 | (1) |
|
Concurrency Control and Recovery in Oracle |
|
|
618 | (9) |
|
Oracle's Isolation Levels |
|
|
619 | (1) |
|
Multiversion Read Consistency |
|
|
619 | (2) |
|
|
621 | (1) |
|
|
621 | (3) |
|
|
624 | (1) |
|
|
625 | (1) |
|
|
625 | (2) |
|
|
627 | (52) |
|
Overview of Query Processing |
|
|
629 | (3) |
|
|
632 | (4) |
|
Heuristical Approach to Query Optimization |
|
|
636 | (6) |
|
Transformation rules for the Relational Algebra Operations |
|
|
636 | (5) |
|
Heuristical Processing Strategies |
|
|
641 | (1) |
|
Cost Estimation for the Relational Algebra Operations |
|
|
642 | (18) |
|
|
642 | (1) |
|
Selection Operation (S = Σp(R)) |
|
|
643 | (7) |
|
Join Operation (T = (R F S)) |
|
|
650 | (7) |
|
Projection Operation ( S = II A1, A2,...., Am (R)) |
|
|
657 | (2) |
|
The Relational Algebra Set Operations (T = R U S, T = R ∪ S, T = R - S) |
|
|
659 | (1) |
|
Enumeration of Alternative Execution Strategies |
|
|
660 | (8) |
|
|
661 | (1) |
|
|
661 | (1) |
|
Physical Operators and Execution Strategies |
|
|
662 | (2) |
|
Reducing the Search Space |
|
|
664 | (1) |
|
Enumerating Left-Deep Trees |
|
|
665 | (1) |
|
Semantic Query Optimization |
|
|
666 | (1) |
|
Alternative Approaches to Query Optimization |
|
|
667 | (1) |
|
Distributed Query Optimization |
|
|
668 | (1) |
|
Query Optimization in Oracle |
|
|
668 | (11) |
|
Rule-Based and Cost-Based Optimization |
|
|
668 | (4) |
|
|
672 | (2) |
|
Viewing the Execution Plan |
|
|
674 | (1) |
|
|
675 | (1) |
|
|
676 | (1) |
|
|
676 | (3) |
|
Part 6 Distributed DBMSs and Replication |
|
|
679 | (120) |
|
Distributed DBMSs---Concepts and Design |
|
|
681 | (46) |
|
|
682 | (11) |
|
|
683 | (4) |
|
Advantages and Disadvantages of DDBMSs |
|
|
687 | (3) |
|
Homogeneous and Heterogeneous DDBMSs |
|
|
690 | (3) |
|
|
693 | (4) |
|
Functions and Architectures of a DDBMS |
|
|
697 | (4) |
|
|
697 | (1) |
|
Reference Architecture for a DDBMS |
|
|
697 | (2) |
|
Reference Architecture for a Federated MDBS |
|
|
699 | (1) |
|
Component Architecture for a DDBMS |
|
|
700 | (1) |
|
Distributed Relational Database Design |
|
|
701 | (11) |
|
|
702 | (1) |
|
|
703 | (9) |
|
Transparencies in a DDBMS |
|
|
712 | (9) |
|
Distribution Transparency |
|
|
712 | (3) |
|
|
715 | (3) |
|
|
718 | (2) |
|
|
720 | (1) |
|
Summary of Transparencies in a DDBMS |
|
|
720 | (1) |
|
Date's Twelve Rules for a DDBMS |
|
|
721 | (6) |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
724 | (3) |
|
Distributed DBMSs---Advanced Concepts |
|
|
727 | (44) |
|
Distributed Transaction Management |
|
|
728 | (1) |
|
Distributed Concurrency Control |
|
|
729 | (4) |
|
|
729 | (1) |
|
Distributed Serializability |
|
|
730 | (1) |
|
|
730 | (3) |
|
|
733 | (1) |
|
Distributed Deadlock Management |
|
|
733 | (4) |
|
Distributed Database Recovery |
|
|
737 | (13) |
|
Failures in a Distributed Environment |
|
|
737 | (1) |
|
How Failures Affect Recovery |
|
|
738 | (1) |
|
|
739 | (6) |
|
|
745 | (4) |
|
|
749 | (1) |
|
The X/Open Distributed Transaction Processing Model |
|
|
750 | (3) |
|
Distributed Query Optimization |
|
|
753 | (10) |
|
|
754 | (4) |
|
|
758 | (1) |
|
|
759 | (4) |
|
|
763 | (8) |
|
Oracle's DDBMS Functionality |
|
|
763 | (5) |
|
|
768 | (1) |
|
|
769 | (1) |
|
|
770 | (1) |
|
Replication and Mobile Databases |
|
|
771 | (28) |
|
Introduction to Database Replication |
|
|
772 | (2) |
|
Synchronous Versus Asynchronous Replication |
|
|
773 | (1) |
|
Applications of Replication |
|
|
774 | (1) |
|
|
774 | (8) |
|
Replication Server Functionality |
|
|
775 | (1) |
|
|
775 | (4) |
|
|
779 | (3) |
|
Introduction to Mobile Databases |
|
|
782 | (2) |
|
|
784 | (6) |
|
|
784 | (6) |
|
|
790 | (9) |
|
Oracle's Replication Functionality |
|
|
790 | (6) |
|
|
796 | (1) |
|
|
797 | (1) |
|
|
797 | (2) |
|
|
799 | (172) |
|
Object-Oriented DBMSs---Concepts and Design |
|
|
801 | (70) |
|
Advanced Database Applications |
|
|
803 | (4) |
|
|
807 | (5) |
|
Storing Objects in a Relational Database |
|
|
812 | (4) |
|
Mapping Classes to Relations |
|
|
813 | (1) |
|
Accessing Objects in the Relational Database |
|
|
814 | (2) |
|
Next-Generation Database Systems |
|
|
816 | (1) |
|
|
817 | (12) |
|
Definition of Object-Oriented DBMSs |
|
|
818 | (1) |
|
|
819 | (5) |
|
Persistent Programming Languages |
|
|
824 | (1) |
|
The Object-Oriented Database System Manifesto |
|
|
825 | (3) |
|
Alternative Strategies for Developing an OODBMS |
|
|
828 | (1) |
|
|
829 | (10) |
|
Pointer Swizzling Techniques |
|
|
831 | (3) |
|
|
834 | (2) |
|
|
836 | (1) |
|
|
837 | (2) |
|
|
839 | (10) |
|
|
839 | (1) |
|
|
840 | (1) |
|
|
841 | (3) |
|
|
844 | (2) |
|
|
846 | (3) |
|
Advantages and Disadvantages of OODBMSs |
|
|
849 | (4) |
|
|
849 | (2) |
|
|
851 | (2) |
|
Object-Oriented Database Design |
|
|
853 | (5) |
|
Comparison of Object-Oriented Data Modeling and Conceptual Data Modeling |
|
|
853 | (1) |
|
Relationships and Referential Integrity |
|
|
854 | (2) |
|
|
856 | (2) |
|
Object-Oriented Analysis and Design with UML |
|
|
858 | (13) |
|
|
859 | (5) |
|
Usage of UML in the Methodology for Database Design |
|
|
864 | (2) |
|
|
866 | (1) |
|
|
867 | (1) |
|
|
868 | (3) |
|
Object-Oriented DBMSs---Standards and Systems |
|
|
871 | (50) |
|
|
872 | (11) |
|
|
872 | (3) |
|
The Common Object Request Broker Architecture |
|
|
875 | (5) |
|
|
880 | (3) |
|
Model-Driven Architecture |
|
|
883 | (1) |
|
Object Data Standard ODMG 3.0, 1999 |
|
|
883 | (24) |
|
Object Data Management Group |
|
|
885 | (1) |
|
|
886 | (8) |
|
The Object Definition Language |
|
|
894 | (3) |
|
The Object Query Language |
|
|
897 | (6) |
|
Other Parts of the ODMG Standard |
|
|
903 | (3) |
|
Mapping the Conceptual Design to a Logical (Object-Oriented) Design |
|
|
906 | (1) |
|
|
907 | (14) |
|
|
907 | (3) |
|
Building an ObjectStore Application |
|
|
910 | (1) |
|
Data Definition in ObjectStore |
|
|
911 | (4) |
|
Data Manipulation in ObjectStore |
|
|
915 | (3) |
|
|
918 | (1) |
|
|
919 | (1) |
|
|
919 | (2) |
|
|
921 | (50) |
|
Introduction to Object-Relational Database Systems |
|
|
922 | (3) |
|
The Third-Generation Database Manifestos |
|
|
925 | (4) |
|
The Third-Generation Database System Manifesto |
|
|
926 | (1) |
|
|
926 | (3) |
|
Postgres---An Early ORDBMS |
|
|
929 | (3) |
|
|
929 | (1) |
|
|
929 | (1) |
|
Relations and Inheritance |
|
|
930 | (1) |
|
|
931 | (1) |
|
|
932 | (23) |
|
|
933 | (1) |
|
|
934 | (2) |
|
|
936 | (3) |
|
|
939 | (1) |
|
|
940 | (1) |
|
Reference Types and Object Identity |
|
|
941 | (1) |
|
|
942 | (3) |
|
|
945 | (1) |
|
|
946 | (4) |
|
|
950 | (1) |
|
Persistent Stored Modules |
|
|
950 | (1) |
|
|
951 | (3) |
|
|
954 | (1) |
|
|
955 | (1) |
|
Query Processing and Optimization |
|
|
955 | (4) |
|
|
959 | (1) |
|
Object-Oriented Extensions in Oracle |
|
|
959 | (9) |
|
|
960 | (5) |
|
Manipulating Object Tables |
|
|
965 | (1) |
|
|
966 | (1) |
|
|
967 | (1) |
|
Comparison of ORDBMS and OODBMS |
|
|
968 | (3) |
|
|
969 | (1) |
|
|
969 | (1) |
|
|
970 | (1) |
|
|
971 | (172) |
|
|
973 | (82) |
|
Introduction to the Internet and the Web |
|
|
974 | (4) |
|
|
976 | (1) |
|
e-Commerce and e-Business |
|
|
977 | (1) |
|
|
978 | (13) |
|
Hyper Text Transfer Protocol |
|
|
979 | (2) |
|
Hyper Text Markup Language |
|
|
981 | (1) |
|
Uniform Resource Locators |
|
|
982 | (1) |
|
Static and Dynamic Web Pages |
|
|
982 | (2) |
|
|
984 | (1) |
|
Requirements for Web DBMS Integration |
|
|
985 | (1) |
|
Advantages and Disadvantages of the Web---DBMS Approach |
|
|
986 | (4) |
|
Approaches to Integrating the Web and DBMSs |
|
|
990 | (1) |
|
|
991 | (2) |
|
|
991 | (1) |
|
|
992 | (1) |
|
|
993 | (1) |
|
Common Gateway Interface (CGI) |
|
|
993 | (5) |
|
Passing Information to a CGI Script |
|
|
995 | (2) |
|
Advantages and Disadvantages of CGI |
|
|
997 | (1) |
|
|
998 | (1) |
|
|
999 | (1) |
|
Comparison of CGI and API |
|
|
1000 | (1) |
|
|
1000 | (32) |
|
|
1004 | (6) |
|
|
1010 | (1) |
|
Comparison of JDBC and SQLJ |
|
|
1010 | (1) |
|
Container-Managed Persistence (CMP) |
|
|
1011 | (4) |
|
|
1015 | (7) |
|
JPA (Java Persistence API) |
|
|
1022 | (8) |
|
|
1030 | (1) |
|
|
1030 | (1) |
|
|
1031 | (1) |
|
|
1032 | (12) |
|
|
1034 | (1) |
|
Active Server Pages and Active X Data Objects |
|
|
1035 | (1) |
|
|
1036 | (3) |
|
Comparison of ASP and JSP |
|
|
1039 | (1) |
|
|
1039 | (5) |
|
|
1044 | (1) |
|
|
1044 | (11) |
|
Oracle Application Server (Oracle AS) |
|
|
1045 | (6) |
|
|
1051 | (1) |
|
|
1052 | (1) |
|
|
1053 | (2) |
|
Semistructured Data and XML |
|
|
1055 | (88) |
|
|
1056 | (7) |
|
Object Exchange Model (OEM) |
|
|
1058 | (1) |
|
|
1059 | (4) |
|
|
1063 | (8) |
|
|
1066 | (2) |
|
Document Type Definitions (DTDs) |
|
|
1068 | (3) |
|
|
1071 | (10) |
|
|
1072 | (1) |
|
|
1073 | (1) |
|
|
1073 | (1) |
|
XPath (XML Path Language) |
|
|
1074 | (1) |
|
XPointer (XML Pointer Language) |
|
|
1075 | (1) |
|
XLink (XML Linking Language) |
|
|
1076 | (1) |
|
|
1076 | (1) |
|
Simple Object Access Protocol (SOAP) |
|
|
1077 | (1) |
|
Web Services Description Language (WSDL) |
|
|
1077 | (1) |
|
Universal Discovery, Description and Integration (UDDI) |
|
|
1078 | (3) |
|
|
1081 | (10) |
|
Resource Description Framework (RDF) |
|
|
1087 | (4) |
|
|
1091 | (30) |
|
Extending Lore and Lorel to Handle XML |
|
|
1092 | (1) |
|
|
1093 | (1) |
|
XQuery---A Query Language for XML |
|
|
1094 | (10) |
|
|
1104 | (1) |
|
XQuery 1.0 and XPath 2.0 Data Model (XDM) |
|
|
1105 | (6) |
|
XQuery Update Facility 1.0 |
|
|
1111 | (2) |
|
|
1113 | (8) |
|
|
1121 | (15) |
|
|
1121 | (3) |
|
|
1124 | (11) |
|
|
1135 | (1) |
|
|
1136 | (7) |
|
|
1139 | (2) |
|
|
1141 | (1) |
|
|
1142 | (1) |
|
|
1143 | (100) |
|
|
1145 | (28) |
|
Introduction to Data Warehousing |
|
|
1146 | (7) |
|
The Evolution of Data Warehousing |
|
|
1146 | (1) |
|
Data Warehousing Concepts |
|
|
1147 | (1) |
|
Benefits of Data Warehousing |
|
|
1148 | (1) |
|
Comparison of OLTP Systems and Data Warehousing |
|
|
1148 | (2) |
|
Problems of Data Warehousing |
|
|
1150 | (2) |
|
|
1152 | (1) |
|
Data Warehouse Architecture |
|
|
1153 | (4) |
|
|
1153 | (1) |
|
|
1153 | (1) |
|
|
1154 | (1) |
|
|
1154 | (1) |
|
|
1155 | (1) |
|
|
1155 | (1) |
|
Lightly and Highly Summarized Data |
|
|
1155 | (1) |
|
|
1155 | (1) |
|
|
1156 | (1) |
|
|
1156 | (1) |
|
Data Warehousing Tools and Technologies |
|
|
1157 | (7) |
|
Extraction, Transformation, and Loading (ETL) |
|
|
1158 | (1) |
|
|
1159 | (3) |
|
|
1162 | (2) |
|
Administration and Management Tools |
|
|
1164 | (1) |
|
|
1164 | (1) |
|
Reasons for Creating a Data Mart |
|
|
1165 | (1) |
|
Data Warehousing Using Oracle |
|
|
1165 | (8) |
|
New Warehouse Features in Oracle 10g/11g |
|
|
1168 | (1) |
|
|
1169 | (1) |
|
|
1170 | (1) |
|
|
1171 | (2) |
|
|
1173 | (26) |
|
Designing a Data Warehouse Database |
|
|
1174 | (1) |
|
Data Warehouse Development Methodologies |
|
|
1174 | (2) |
|
Kimball's Business Dimensional Lifecycle |
|
|
1176 | (1) |
|
|
1177 | (4) |
|
Comparison of DM and ER models |
|
|
1180 | (1) |
|
The Dimensional Modeling Stage of Kimball's Business Dimensional Lifecycle |
|
|
1181 | (8) |
|
Create a High-Level Dimensional Model (Phase I) |
|
|
1181 | (1) |
|
|
1181 | (2) |
|
|
1183 | (1) |
|
|
1183 | (2) |
|
|
1185 | (1) |
|
Identify All Dimension Attributes for the Dimensional Model (Phase II) |
|
|
1186 | (3) |
|
Data Warehouse Development Issues |
|
|
1189 | (1) |
|
Data Warehouse Design Using Oracle |
|
|
1190 | (9) |
|
Oracle Warehouse Builder Components |
|
|
1190 | (1) |
|
Using Oracle Warehouse Builder |
|
|
1191 | (4) |
|
New Warehouse Builder Features in Oracle 10g/11g |
|
|
1195 | (1) |
|
|
1196 | (1) |
|
|
1197 | (1) |
|
|
1198 | (1) |
|
|
1199 | (30) |
|
Online Analytical Processing |
|
|
1200 | (1) |
|
|
1201 | (1) |
|
|
1201 | (2) |
|
Multidimensional Data Model |
|
|
1203 | (4) |
|
Alternative Multidimensional Data Representations |
|
|
1203 | (2) |
|
|
1205 | (2) |
|
Multidimensional Operations |
|
|
1207 | (1) |
|
|
1207 | (1) |
|
|
1207 | (7) |
|
Codd's Rules for OLAP Tools |
|
|
1208 | (1) |
|
OLAP Server---Implementation Issues |
|
|
1209 | (1) |
|
Categories of OLAP Server |
|
|
1210 | (4) |
|
OLAP Extensions to the SQL Standard |
|
|
1214 | (7) |
|
Extended Grouping Capabilities |
|
|
1214 | (5) |
|
Elememtary OLAP Operators |
|
|
1219 | (2) |
|
|
1221 | (8) |
|
|
1221 | (1) |
|
Platform for Business Intelligence Applications |
|
|
1222 | (1) |
|
|
1222 | (2) |
|
|
1224 | (1) |
|
|
1225 | (1) |
|
|
1226 | (1) |
|
|
1226 | (1) |
|
New OLAP Features in Oracle IIg |
|
|
1226 | (1) |
|
|
1226 | (1) |
|
|
1227 | (1) |
|
|
1227 | (2) |
|
|
1229 | (14) |
|
|
1230 | (1) |
|
|
1230 | (6) |
|
|
1232 | (1) |
|
|
1233 | (1) |
|
|
1234 | (1) |
|
|
1235 | (1) |
|
|
1236 | (1) |
|
|
1236 | (1) |
|
|
1237 | (1) |
|
Data Mining and Data Warehousing |
|
|
1238 | (1) |
|
|
1239 | (4) |
|
|
1239 | (1) |
|
Enabling Data Mining Applications |
|
|
1239 | (1) |
|
|
1240 | (1) |
|
Oracle Data Mining Environment |
|
|
1240 | (1) |
|
New Data Mining Features in Oracle 11g |
|
|
1241 | (1) |
|
|
1241 | (1) |
|
|
1242 | (1) |
|
|
1242 | (1) |
|
|
1243 | |
|
A Users' Requirements Specification for DreamHome Case Study |
|
|
1 | (1) |
|
Branch User Views of DreamHome |
|
|
1 | (1) |
|
|
1 | (2) |
|
Transaction Requirements (Sample) |
|
|
3 | (1) |
|
Staff User Views of DreamHome |
|
|
4 | (1) |
|
|
4 | (1) |
|
Transaction Requirements (Sample) |
|
|
5 | |
|
|
1 | (1) |
|
The University Accommodation Office Case Study |
|
|
1 | (1) |
|
|
1 | (2) |
|
Query Transactions (Sample) |
|
|
3 | (1) |
|
The Easy Drive School of Motoring Case Study |
|
|
4 | (1) |
|
|
4 | (1) |
|
Query Transactions (Sample) |
|
|
5 | (1) |
|
The Wellmeadows Hospital Case Study |
|
|
5 | (1) |
|
|
5 | (7) |
|
Transaction Requirements (Sample) |
|
|
12 | |
|
C Alternative ER Modeling Notations |
|
|
1 | (1) |
|
ER Modeling Using the Chen Notation |
|
|
1 | (1) |
|
ER Modeling Using the Crow's Feet Notation |
|
|
1 | (1) |
|
D Summary of the Database Design Methodology for Relational Databases |
|
|
1 | (1) |
|
Build Conceptual Data Model |
|
|
1 | (1) |
|
|
2 | (3) |
|
Translate Logical Data Model for Target DBMS |
|
|
5 | (1) |
|
Design File Organizations and Indexes |
|
|
5 | (1) |
|
|
5 | (1) |
|
Design Security Mechanisms |
|
|
5 | (1) |
|
Consider the Introduction of Controlled Redundancy |
|
|
6 | (1) |
|
Monitor and Tune the Operational System |
|
|
6 | |
|
E Introduction to Pyrrho: A Lightweight RDBMS |
|
|
1 | (1) |
|
|
2 | (1) |
|
Download and Install Pyrrho |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | |
|
F File Organizations and Indexes (Online) |
|
|
1 | (1) |
|
G When Is a DBMS Relational? (Online) |
|
|
1 | (1) |
|
H Commercial DBMSs: Access and Oracle (Online) |
|
|
1 | (1) |
|
I Programmatic SQL (Online |
|
|
1 | (1) |
|
J Estimating Disk Space Requirements (Online) |
|
|
1 | (1) |
|
K Introduction to Object-Orientation (Online) |
|
|
1 | (1) |
|
L Example Web Scripts (Online) |
|
|
1 | (1) |
References |
|
1 | (1) |
Further Reading |
|
1 | (1) |
Index |
|
1 | |