About This Book |
|
xiii | |
Intended Audience |
|
xiii | |
Prerequisites |
|
xiv | |
Reference Materials |
|
xiv | |
About the CD-ROM |
|
xiv | |
Features of this Book |
|
xv | |
The Microsoft Certified Professional Program |
|
xxii | |
Technical Support |
|
xxvii | |
|
Introduction to Microsoft SQL Server 2000 |
|
|
1 | (44) |
|
|
1 | (1) |
|
|
1 | (1) |
|
Overview of SQL Server 2000 |
|
|
2 | (7) |
|
|
2 | (2) |
|
|
4 | (3) |
|
Editions of SQL Server 2000 |
|
|
7 | (1) |
|
|
8 | (1) |
|
Components of SQL Server 2000 |
|
|
9 | (11) |
|
Overview of the SQL Server 2000 Components |
|
|
9 | (1) |
|
SQL Server 2000 Relational Database Engine |
|
|
9 | (1) |
|
SQL Server 2000 Replication |
|
|
10 | (1) |
|
|
11 | (1) |
|
SQL Server 2000 Analysis Services |
|
|
12 | (1) |
|
SQL Server 2000 English Query |
|
|
12 | (1) |
|
SQL Server Meta Data Services |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (5) |
|
|
19 | (1) |
|
Overview of SQL Server 2000 Architecture |
|
|
20 | (25) |
|
|
20 | (8) |
|
Relational Database Engine Architecture |
|
|
28 | (5) |
|
Administration Architecture |
|
|
33 | (5) |
|
Data Warehousing and Online Analytical Processing (OLAP) |
|
|
38 | (1) |
|
Application Development Architecture |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
42 | (3) |
|
Using Transact-SQL on a SQL Server Database |
|
|
45 | (54) |
|
|
45 | (1) |
|
|
45 | (1) |
|
SQL Server Programming Tools |
|
|
46 | (20) |
|
|
46 | (13) |
|
isqlw Command-Prompt Utility |
|
|
59 | (1) |
|
isql Command Prompt Utility |
|
|
60 | (1) |
|
osql Command-Prompt Utility |
|
|
60 | (5) |
|
|
65 | (1) |
|
Introduction to Transact-SQL |
|
|
66 | (11) |
|
|
66 | (1) |
|
|
66 | (9) |
|
|
75 | (2) |
|
Transact-SQL Syntax Elements |
|
|
77 | (12) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (3) |
|
|
82 | (1) |
|
|
82 | (1) |
|
Control-of-Flow Language Elements |
|
|
83 | (1) |
|
|
84 | (4) |
|
|
88 | (1) |
|
Executing Transact-SQL Statements |
|
|
89 | (10) |
|
Single Transact-SQL Statements |
|
|
89 | (2) |
|
|
91 | (2) |
|
Stored Procedures and Triggers |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (3) |
|
Designing a SQL Server Database |
|
|
99 | (44) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Introduction to Database Design |
|
|
100 | (12) |
|
Components of a SQL Server Database |
|
|
100 | (1) |
|
Normalizing a Database Design |
|
|
101 | (4) |
|
|
105 | (6) |
|
|
111 | (1) |
|
Planning a SQL Server Database |
|
|
112 | (7) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
Identifying System Requirements |
|
|
119 | (10) |
|
The Process of Identifying System Requirements |
|
|
119 | (1) |
|
|
120 | (3) |
|
Identifying How the Data Will Be Used |
|
|
123 | (1) |
|
Identifying Business Rules of the System |
|
|
123 | (4) |
|
|
127 | (2) |
|
Developing a Logical Data Model |
|
|
129 | (14) |
|
Identifying Entities and Their Attributes |
|
|
129 | (2) |
|
Identifying Relationships Between Entities |
|
|
131 | (1) |
|
Identifying Constraints on Data |
|
|
132 | (7) |
|
|
139 | (2) |
|
|
141 | (2) |
|
Implementing SQL Server Databases and Tables |
|
|
143 | (36) |
|
|
143 | (1) |
|
|
143 | (1) |
|
Creating and Managing a SQL Server Database |
|
|
144 | (11) |
|
Creating a SQL Server Database |
|
|
144 | (2) |
|
Managing a SQL Server Database |
|
|
146 | (4) |
|
Creating and Managing a Database |
|
|
150 | (4) |
|
|
154 | (1) |
|
|
155 | (8) |
|
System-Supplied Data Types |
|
|
155 | (5) |
|
|
160 | (1) |
|
Identifying Column Data Types |
|
|
160 | (2) |
|
|
162 | (1) |
|
Creating and Managing Tables |
|
|
163 | (16) |
|
Creating Tables in a SQL Server Database |
|
|
163 | (7) |
|
Managing Tables in a SQL Server Database |
|
|
170 | (2) |
|
Creating and Managing Tables in a SQL Server Database |
|
|
172 | (3) |
|
|
175 | (1) |
|
|
176 | (3) |
|
Implementing Data Integrity |
|
|
179 | (26) |
|
|
179 | (1) |
|
|
179 | (1) |
|
Introduction to Data Integrity |
|
|
180 | (7) |
|
|
180 | (2) |
|
|
182 | (2) |
|
Identifying the Properties Used to Ensure Data Integrity |
|
|
184 | (1) |
|
|
185 | (2) |
|
Implementing Integrity Constraints |
|
|
187 | (18) |
|
Introduction to Integrity Constraints |
|
|
187 | (1) |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
191 | (3) |
|
|
194 | (2) |
|
Adding Constraints to Existing Tables |
|
|
196 | (5) |
|
|
201 | (1) |
|
|
202 | (3) |
|
Accessing and Modifying Data |
|
|
205 | (38) |
|
|
205 | (1) |
|
|
205 | (1) |
|
Accessing Data in a SQL Server Database |
|
|
206 | (9) |
|
The Fundamentals of a SELECT Statement |
|
|
206 | (1) |
|
|
207 | (2) |
|
|
209 | (1) |
|
|
209 | (1) |
|
The Where, Group by, and Having Clauses |
|
|
209 | (2) |
|
|
211 | (1) |
|
Using Select Statements to Access Data |
|
|
211 | (3) |
|
|
214 | (1) |
|
Using Advanced Query Techniques to Access Data |
|
|
215 | (14) |
|
Using Joins to Retrieve Data |
|
|
215 | (3) |
|
Defining Subqueries inside SELECT Statements |
|
|
218 | (3) |
|
|
221 | (2) |
|
Using Advanced Query Techniques to Retrieve Data |
|
|
223 | (5) |
|
|
228 | (1) |
|
Modifying Data in a SQL Server Database |
|
|
229 | (14) |
|
Inserting Data into a SQL Server Database |
|
|
229 | (3) |
|
Modifying Data in a SQL Server Database |
|
|
232 | (3) |
|
Deleting Data from a SQL Server Database |
|
|
235 | (1) |
|
Modifying Data in a SQL Server Database |
|
|
236 | (3) |
|
|
239 | (1) |
|
|
240 | (3) |
|
Managing and Manipulating Data |
|
|
243 | (40) |
|
|
243 | (1) |
|
|
243 | (1) |
|
Importing and Exporting Data |
|
|
244 | (12) |
|
Using the bcp Utility and the BULK INSERT Statement |
|
|
244 | (4) |
|
|
248 | (3) |
|
Importing and Exporting Data |
|
|
251 | (3) |
|
|
254 | (2) |
|
Using Distributed Queries to Access External Data |
|
|
256 | (7) |
|
Introduction to Distributed Queries |
|
|
256 | (1) |
|
Using Linked Server Names in Distributed Queries |
|
|
257 | (2) |
|
Using Ad Hoc Computer Names in Distributed Queries |
|
|
259 | (1) |
|
Using Distributed Queries to Access External Data |
|
|
260 | (2) |
|
|
262 | (1) |
|
Using Cursors to Retrieve Data |
|
|
263 | (9) |
|
|
263 | (5) |
|
|
268 | (1) |
|
Controlling Cursor Behavior |
|
|
268 | (1) |
|
|
269 | (1) |
|
Creating a Cursor to Retrieve Data |
|
|
269 | (2) |
|
|
271 | (1) |
|
|
272 | (11) |
|
|
272 | (1) |
|
Using the FOR XML Clause to Retrieve Data |
|
|
273 | (2) |
|
Using the OPENXML Function to Access XML Data |
|
|
275 | (4) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (2) |
|
Implementing Stored Procedures |
|
|
283 | (46) |
|
|
283 | (1) |
|
|
283 | (1) |
|
Introduction to Stored Procedures |
|
|
284 | (8) |
|
Purpose and Advantages of Stored Procedures |
|
|
284 | (2) |
|
Categories of Stored Procedures |
|
|
286 | (5) |
|
|
291 | (1) |
|
Creating, Executing, Modifying, and Deleting Stored Procedures |
|
|
292 | (18) |
|
How a Procedure Is Stored |
|
|
292 | (1) |
|
Methods for Creating Stored Procedures |
|
|
293 | (6) |
|
Executing a Stored Procedures |
|
|
299 | (3) |
|
Modifying Stored Procedures |
|
|
302 | (1) |
|
Deleting Stored Procedures |
|
|
303 | (6) |
|
|
309 | (1) |
|
Programming Stored Procedures |
|
|
310 | (19) |
|
|
310 | (2) |
|
The RETURN Statement and Error Handling |
|
|
312 | (6) |
|
|
318 | (1) |
|
|
318 | (8) |
|
|
326 | (1) |
|
|
327 | (2) |
|
|
329 | (34) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (8) |
|
Extending Data Integrity with Triggers |
|
|
331 | (2) |
|
|
333 | (4) |
|
|
337 | (2) |
|
Creating and Managing Triggers |
|
|
339 | (11) |
|
Creating Triggers Using Transact-SQL |
|
|
339 | (3) |
|
Creating a Triggers Using Enterprise Manager |
|
|
342 | (1) |
|
|
342 | (2) |
|
Viewing, Dropping, and Disabling Triggers |
|
|
344 | (5) |
|
|
349 | (1) |
|
|
350 | (13) |
|
The Inserted and Deleted Pseudo Tables |
|
|
350 | (1) |
|
Trigger Syntax, System Commands, and Functions |
|
|
351 | (2) |
|
Common Trigger Programming Tasks |
|
|
353 | (6) |
|
|
359 | (2) |
|
|
361 | (2) |
|
|
363 | (28) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (4) |
|
|
364 | (1) |
|
Scenarios for Using Views |
|
|
365 | (2) |
|
|
367 | (1) |
|
Creating, Modifying, and Deleting Views |
|
|
368 | (11) |
|
|
368 | (7) |
|
|
375 | (1) |
|
|
376 | (1) |
|
Creating and Modifying a View |
|
|
376 | (2) |
|
|
378 | (1) |
|
Accessing Data through Views |
|
|
379 | (12) |
|
Viewing Data through Views |
|
|
379 | (1) |
|
Modifying Data through Views |
|
|
379 | (5) |
|
Using the AuthorsBooks View to Access Data |
|
|
384 | (3) |
|
|
387 | (1) |
|
|
388 | (3) |
|
|
391 | (30) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (11) |
|
|
392 | (1) |
|
|
393 | (2) |
|
|
395 | (2) |
|
|
397 | (2) |
|
|
399 | (3) |
|
|
402 | (1) |
|
Index Creation and Administration |
|
|
403 | (18) |
|
|
403 | (5) |
|
|
408 | (2) |
|
|
410 | (2) |
|
|
412 | (5) |
|
|
417 | (1) |
|
|
418 | (3) |
|
Managing SQL Server Transactions and Locks |
|
|
421 | (40) |
|
|
421 | (1) |
|
|
421 | (1) |
|
Transaction and Locking Architecture |
|
|
422 | (10) |
|
Transaction Log Architecture |
|
|
422 | (5) |
|
|
427 | (1) |
|
|
427 | (2) |
|
Distributed Transaction Architecture |
|
|
429 | (1) |
|
Accessing and Modifying the Transaction Log |
|
|
429 | (2) |
|
|
431 | (1) |
|
Managing SQL Server Transactions |
|
|
432 | (14) |
|
Overview of SQL Server Transactions |
|
|
432 | (3) |
|
|
435 | (5) |
|
|
440 | (2) |
|
Implementing Explicit Transactions |
|
|
442 | (3) |
|
|
445 | (1) |
|
Managing SQL Server Locking |
|
|
446 | (15) |
|
Types of Concurrency Problems |
|
|
446 | (2) |
|
Optimistic and Pessimistic Concurrency |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
449 | (7) |
|
Configuring Transaction Properties |
|
|
456 | (1) |
|
|
457 | (2) |
|
|
459 | (2) |
|
Designing and Administering SQL Server 2000 Security |
|
|
461 | (38) |
|
|
461 | (1) |
|
|
461 | (1) |
|
Overview of SQL Server 2000 Security |
|
|
462 | (11) |
|
|
462 | (1) |
|
Network Protocol Security |
|
|
462 | (2) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
465 | (6) |
|
|
471 | (1) |
|
|
472 | (1) |
|
Designing a Database Security Plan |
|
|
473 | (6) |
|
|
473 | (2) |
|
Nesting and Ownership Chains |
|
|
475 | (1) |
|
Security Design Recommendations |
|
|
476 | (1) |
|
|
477 | (2) |
|
Database Security Implementation and Administration |
|
|
479 | (20) |
|
Administering Authentication |
|
|
479 | (2) |
|
Administering Authorization |
|
|
481 | (2) |
|
Administering Permissions |
|
|
483 | (4) |
|
|
487 | (7) |
|
|
494 | (2) |
|
|
496 | (3) |
|
SQL Server Monitoring and Tuning |
|
|
499 | (22) |
|
|
499 | (1) |
|
|
499 | (1) |
|
Monitoring Databases with SQL Profiler |
|
|
500 | (11) |
|
|
500 | (1) |
|
|
501 | (9) |
|
|
510 | (1) |
|
Index Tuning and Database Partitioning |
|
|
511 | (10) |
|
|
511 | (1) |
|
Index Tuning Wizard Overview |
|
|
511 | (3) |
|
|
514 | (4) |
|
|
518 | (1) |
|
|
519 | (2) |
Appendix A Questions and Answers |
|
521 | (54) |
Glossary |
|
575 | (48) |
Index |
|
623 | |