About the Authors |
|
v | |
Acknowledgments |
|
vii | |
Foreword |
|
xix | |
1 IBM DB2 10.1 Certification |
|
1 | (22) |
|
DB2 10.1 Certification Roles |
|
|
1 | (1) |
|
DB2 10.1 Certification Tracks |
|
|
2 | (7) |
|
The Certification Process |
|
|
9 | (3) |
|
Taking an IBM Certification Exam |
|
|
12 | (11) |
2 DB2 Server Management |
|
23 | (138) |
|
|
23 | (1) |
|
|
24 | (10) |
|
Configuring the DB2 System Environment |
|
|
34 | (7) |
|
Configuring DB2 Instances and Databases |
|
|
41 | (35) |
|
DB2 Autonomic Computing Features |
|
|
76 | (8) |
|
|
84 | (4) |
|
|
88 | (1) |
|
Automatic Database Maintenance |
|
|
89 | (10) |
|
The Configuration Advisor |
|
|
99 | (4) |
|
Adaptive Utility Throttling |
|
|
103 | (3) |
|
Taking Control of a DB2 Server |
|
|
106 | (4) |
|
Working with IBM Data Studio |
|
|
110 | (1) |
|
Connecting to Instances and Databases |
|
|
111 | (3) |
|
Generating Data Definition Language Scripts |
|
|
114 | (1) |
|
Performing Database Administration Tasks |
|
|
114 | (1) |
|
Performing Database Development Tasks |
|
|
115 | (1) |
|
|
116 | (7) |
|
|
123 | (4) |
|
|
127 | (1) |
|
|
128 | (18) |
|
|
146 | (15) |
3 Physical Design |
|
161 | (146) |
|
|
161 | (1) |
|
Servers, Instances, and Databases |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (7) |
|
A Complete CREATE DATABASE Command |
|
|
170 | (5) |
|
Design Aspects of Databases |
|
|
175 | (3) |
|
|
178 | (4) |
|
|
182 | (18) |
|
|
200 | (5) |
|
|
205 | (4) |
|
|
209 | (4) |
|
Range Clustering and Range Partitioning Tables |
|
|
213 | (1) |
|
|
213 | (2) |
|
|
215 | (7) |
|
Multi-temperature Storage |
|
|
222 | (9) |
|
Time Travel Query Using Temporal Tables |
|
|
231 | (8) |
|
Utilities, Tools, and File Type Modifiers |
|
|
239 | (1) |
|
Restrictions for System-Period Temporal Tables |
|
|
240 | (1) |
|
Application-Period Temporal Tables |
|
|
241 | (5) |
|
|
246 | (5) |
|
|
251 | (11) |
|
|
262 | (7) |
|
DB2 9.7-Increasing the Compression Landscape |
|
|
269 | (4) |
|
|
273 | (1) |
|
|
274 | (20) |
|
|
294 | (13) |
4 Business Rules Implementation |
|
307 | (82) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (2) |
|
|
310 | (3) |
|
|
313 | (3) |
|
|
316 | (4) |
|
Referential Integrity Constraints |
|
|
320 | (17) |
|
Informational Constraints |
|
|
337 | (2) |
|
The Set Integrity Command |
|
|
339 | (5) |
|
Creating Tables and Constraints |
|
|
344 | (7) |
|
Creating Views with the Check Option |
|
|
351 | (7) |
|
Creating and Using Triggers |
|
|
358 | (12) |
|
|
370 | (1) |
|
|
371 | (11) |
|
|
382 | (7) |
5 Monitoring DB2 Activity |
|
389 | (180) |
|
|
389 | (1) |
|
The Database System Monitor |
|
|
390 | (1) |
|
|
391 | (14) |
|
Table Functions for Monitoring |
|
|
405 | (24) |
|
Functions Quick Reference |
|
|
429 | (1) |
|
Administrative Views for Monitoring |
|
|
430 | (1) |
|
Buffer Pool Hit Ratio and I/O Response Time |
|
|
431 | (1) |
|
Currently Running Expensive SQL Statement |
|
|
432 | (1) |
|
Current Lock-wait Chains in the Database |
|
|
433 | (1) |
|
Understanding Your Table Spaces |
|
|
434 | (1) |
|
Getting to Know Your Database Server |
|
|
435 | (2) |
|
|
437 | (7) |
|
|
444 | (23) |
|
Reading Unformatted Event Data |
|
|
467 | (8) |
|
Unformatted Event Data Format Table Functions |
|
|
475 | (14) |
|
Analyzing SQL with the Explain Facility |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
491 | (5) |
|
|
496 | (16) |
|
DB2 Troubleshooting Tools |
|
|
512 | (1) |
|
Obtaining Information About an Error Code |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
First Occurrence Data Capture (FODC) |
|
|
516 | (6) |
|
The DB2 Diagnostic Log File |
|
|
522 | (1) |
|
The Administration Notification Log |
|
|
523 | (1) |
|
Controlling How Much Information Is Collected |
|
|
523 | (1) |
|
Interpreting the Notification and Diagnostic Log Entries |
|
|
524 | (2) |
|
|
526 | (4) |
|
|
530 | (2) |
|
|
532 | (3) |
|
|
535 | (3) |
|
|
538 | (5) |
|
|
543 | (4) |
|
|
547 | (3) |
|
|
550 | (2) |
|
|
552 | (2) |
|
|
554 | (1) |
|
|
554 | (1) |
|
|
555 | (8) |
|
|
563 | (6) |
6 DB2 Utilities |
|
569 | (150) |
|
|
569 | (1) |
|
Data Movement Utilities and File Formats |
|
|
570 | (1) |
|
Data Movement File Formats |
|
|
570 | (4) |
|
Extracting Columnar Data from External Files |
|
|
574 | (2) |
|
|
576 | (8) |
|
|
584 | (27) |
|
|
611 | (3) |
|
The Four Phases of a Load Operation |
|
|
614 | (1) |
|
Performing a Load Operation |
|
|
615 | (15) |
|
|
630 | (1) |
|
|
631 | (1) |
|
|
632 | (1) |
|
A Nonrecoverable Load Operation |
|
|
633 | (1) |
|
Monitoring a Load Operation |
|
|
634 | (2) |
|
The Set Integrity Command |
|
|
636 | (2) |
|
|
638 | (5) |
|
Formatting the Input Values |
|
|
643 | (3) |
|
Ingesting Data from a Pipe |
|
|
646 | (1) |
|
|
647 | (4) |
|
|
651 | (1) |
|
Handling Ingest Data Problems |
|
|
652 | (3) |
|
Recovering a Failed Ingest Command |
|
|
655 | (3) |
|
Monitoring Ingest Operations |
|
|
658 | (1) |
|
Ingest Performance Tuning Tips |
|
|
659 | (1) |
|
Comparison Between Ingest, Load, and Import Utilities |
|
|
660 | (1) |
|
Ingest Utility Limitations |
|
|
660 | (1) |
|
Other DB2 Data Movement Options |
|
|
661 | (13) |
|
Relocate a Database by Using db2relocatedb |
|
|
674 | (5) |
|
The db2move and db2look Commands |
|
|
679 | (1) |
|
Database Maintenance Utilities |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
681 | (3) |
|
|
684 | (2) |
|
|
686 | (1) |
|
Flushing the Package Cache |
|
|
687 | (1) |
|
Performance-related Utilities |
|
|
688 | (1) |
|
|
688 | (4) |
|
|
692 | (7) |
|
|
699 | (1) |
|
|
700 | (10) |
|
|
710 | (9) |
7 High Availability |
|
719 | (106) |
|
|
719 | (1) |
|
|
720 | (3) |
|
|
723 | (2) |
|
Transaction Logging Strategies |
|
|
725 | (3) |
|
Other Logging Considerations |
|
|
728 | (1) |
|
Controlling How "Disk Full" Errors Are Handled |
|
|
729 | (1) |
|
Database Recovery Concepts |
|
|
730 | (3) |
|
Recoverable and Nonrecoverable Databases |
|
|
733 | (1) |
|
Online Versus Offline Backup and Recovery |
|
|
734 | (1) |
|
Incremental and Delta Backup and Recovery |
|
|
734 | (2) |
|
Performing a Crash Recovery Operation |
|
|
736 | (3) |
|
|
739 | (32) |
|
Rebuilding Invalid Indexes |
|
|
771 | (1) |
|
Backing Up a Database with Split Mirroring |
|
|
772 | (3) |
|
Initializing a Split Mirror with db2inidb |
|
|
775 | (1) |
|
High Availability Disaster Recovery (HADR) |
|
|
776 | (1) |
|
Requirements for HADR Environments |
|
|
777 | (2) |
|
|
779 | (2) |
|
Read On Standby Restrictions |
|
|
781 | (1) |
|
|
782 | (1) |
|
Setting Up an HADR Multiple Standby Environment |
|
|
783 | (6) |
|
|
789 | (2) |
|
DB2 pureScale-An Overview |
|
|
791 | (3) |
|
Working with a pureScale Cluster |
|
|
794 | (3) |
|
|
797 | (1) |
|
|
798 | (17) |
|
|
815 | (10) |
8 DB2 Security |
|
825 | (112) |
|
|
825 | (1) |
|
Controlling Database Access |
|
|
826 | (1) |
|
|
826 | (1) |
|
Where Does Authentication Occur? |
|
|
826 | (3) |
|
|
829 | (1) |
|
Trusted and Untrusted Clients |
|
|
830 | (1) |
|
Authorities and Privileges |
|
|
831 | (1) |
|
|
832 | (9) |
|
|
841 | (10) |
|
Granting Authorities and Privileges |
|
|
851 | (1) |
|
Granting Authorities and Privileges from IBM Data Studio |
|
|
852 | (1) |
|
Granting Authorities and Privileges with the GRANT command |
|
|
853 | (7) |
|
GRANT SQL Statement Examples |
|
|
860 | (1) |
|
Revoking Authorities and Privileges with the REVOKE SQL Statement |
|
|
861 | (7) |
|
REVOKE SQL Statement Examples |
|
|
868 | (1) |
|
Requirements for Granting and Revoking Authorities and Privileges |
|
|
869 | (1) |
|
Authorities and Privileges Needed to Perform Common Tasks |
|
|
870 | (2) |
|
Role-based Access Control |
|
|
872 | (1) |
|
A Comparison Between Roles and Groups |
|
|
873 | (6) |
|
Trusted Contexts and Trusted Connections |
|
|
879 | (4) |
|
Securing Data with Label-based Access Control |
|
|
883 | (1) |
|
Implementing Row-level LBAC |
|
|
883 | (1) |
|
Defining a Security-label Component |
|
|
884 | (1) |
|
Defining a Security Policy |
|
|
885 | (1) |
|
|
886 | (2) |
|
Creating a LBAC-Protected Table |
|
|
888 | (1) |
|
Granting Security Labels to Users |
|
|
889 | (1) |
|
Putting Row-level LBAC into Action |
|
|
890 | (2) |
|
Implementing Column-level LBAC |
|
|
892 | (1) |
|
Defining a Security-label Component |
|
|
892 | (1) |
|
Defining a Security Policy |
|
|
893 | (1) |
|
|
893 | (1) |
|
Creating an LBAC-Protected Table |
|
|
893 | (1) |
|
Granting Security Labels to Users |
|
|
894 | (1) |
|
Creating LBAC-Protected Columns |
|
|
895 | (1) |
|
LBAC Rule Set-DB2LBACRULES |
|
|
896 | (1) |
|
|
897 | (1) |
|
Putting Column-level LBAC into Action |
|
|
898 | (1) |
|
Combining Row-level and Column-level LBAC |
|
|
899 | (2) |
|
Row and Column Access Control |
|
|
901 | (1) |
|
Implementing Row Permissions |
|
|
901 | (5) |
|
Understanding the DML Behavior Under RCAC |
|
|
906 | (1) |
|
Deactivating the Row Access Control |
|
|
907 | (1) |
|
|
907 | (4) |
|
Built-in Scalar Functions |
|
|
911 | (1) |
|
|
911 | (1) |
|
|
912 | (1) |
|
|
913 | (3) |
|
|
916 | (3) |
|
|
919 | (1) |
|
|
920 | (9) |
|
|
929 | (8) |
9 Connectivity and Networking |
|
937 | (48) |
|
|
937 | (1) |
|
Configuring Communications |
|
|
937 | (2) |
|
Manually Configuring DB2 Server Communications |
|
|
939 | (3) |
|
|
942 | (4) |
|
Cataloging Remote Servers and Databases |
|
|
946 | (1) |
|
Cataloging a DB2 Database |
|
|
946 | (4) |
|
Cataloging a Remote DB2 Node (Server) |
|
|
950 | (3) |
|
Cataloging a DCS Database |
|
|
953 | (1) |
|
Binding Utilities and Applications |
|
|
954 | (3) |
|
Configuring Communications to System z and System i |
|
|
957 | (1) |
|
|
957 | (5) |
|
Fast Communications Manager (FCM) |
|
|
962 | (3) |
|
Configuring LDAP Connections |
|
|
965 | (1) |
|
Registering the DB2 Server with LDAP |
|
|
966 | (2) |
|
Registering the DB2 Database with LDAP |
|
|
968 | (1) |
|
Deregistering the DB2 Server from LDAP |
|
|
968 | (1) |
|
Deregistering the DB2 Database from LDAP |
|
|
968 | (1) |
|
Troubleshooting Communications Errors |
|
|
969 | (1) |
|
|
970 | (1) |
|
|
971 | (6) |
|
|
977 | (8) |
10 DB2 10.5 Exam Crash Course |
|
985 | (180) |
|
|
985 | (1) |
|
|
986 | (11) |
|
|
997 | (8) |
|
Managing Access to the Database Server |
|
|
1005 | (1) |
|
|
1006 | (2) |
|
|
1008 | (13) |
|
|
1021 | (2) |
|
Separate Row and Column Instances on a Database Server |
|
|
1023 | (8) |
|
|
1031 | (1) |
|
|
1031 | (15) |
|
|
1046 | (1) |
|
|
1047 | (2) |
|
|
1049 | (1) |
|
Working with Data Studio V4.1.1 |
|
|
1049 | (1) |
|
Configuring a DB2 Database |
|
|
1050 | (9) |
|
|
1059 | (9) |
|
|
1068 | (4) |
|
Changing a Database's Code Set |
|
|
1072 | (1) |
|
|
1073 | (1) |
|
|
1074 | (1) |
|
|
1075 | (30) |
|
Utilities: Converting Row Tables to Column |
|
|
1105 | (1) |
|
Reclaiming Deleted Space in Column-Organized Tables |
|
|
1106 | (1) |
|
|
1107 | (15) |
|
Backup and Restore Enhancements |
|
|
1122 | (9) |
|
Supporting Multiple Databases in pureScale |
|
|
1131 | (1) |
|
CF Self-Tuning Memory Feature |
|
|
1131 | (1) |
|
|
1132 | (9) |
|
Connectivity and Networking |
|
|
1141 | (4) |
|
|
1145 | (1) |
|
The "Oops" Recovery Factor |
|
|
1146 | (1) |
|
|
1147 | (1) |
|
|
1148 | (13) |
|
|
1161 | (4) |
11 DB2 10.1/10.5 Question Bank |
|
1165 | (48) |
|
|
1165 | (29) |
|
|
1194 | (19) |
Appendix A: DSFA Guidelines |
|
1213 | (14) |
Appendix B: Resources |
|
1227 | |