Atjaunināt sīkdatņu piekrišanu

Expert Oracle Practices: Oracle Database Administration from the Oak Table 1st ed. [Mīkstie vāki]

4.25/5 (14 ratings by Goodreads)
  • Formāts: Paperback / softback, 592 pages, height x width: 254x178 mm, weight: 1090 g, 592 p., 1 Paperback / softback
  • Izdošanas datums: 20-Jan-2010
  • Izdevniecība: APress
  • ISBN-10: 1430226684
  • ISBN-13: 9781430226680
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 45,09 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 53,05 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 592 pages, height x width: 254x178 mm, weight: 1090 g, 592 p., 1 Paperback / softback
  • Izdošanas datums: 20-Jan-2010
  • Izdevniecība: APress
  • ISBN-10: 1430226684
  • ISBN-13: 9781430226680
Citas grāmatas par šo tēmu:
This book is an anthology of effective database management techniques representing the collective wisdom of the OakTable Network. With an emphasis upon performancebut also branching into security, national language, and other issuesthe book helps you deliver the most value for your companys investment in Oracle Database technologies. Youll learn to effectively plan for and monitor performance, to troubleshoot systematically when things go wrong, and to manage your database rather than letting it manage you.
Foreword xix
About the Authors xxiii
About the Technical Reviewers xxix
Battle Against Any Guess
1(16)
Guess Hunting
1(2)
Why Do We Guess?
3(2)
Understanding a Problem
5(6)
Logical Conclusions vs. Historical Observations
6(2)
Knowledge Is Power
8(1)
RTFM
9(2)
Facing the Unknown
11(2)
Paradigm Shifts
11(1)
Experience Is Danger
12(1)
Fixing the Root Cause?
13(1)
Best Practices and Myths
14(1)
BattleAgainstAnyGuess.com
15(2)
A Partly Cloudy Future
17(18)
What Is Cloud Computing?
17(2)
Software as a Service (SAAS)
18(1)
Platform as a Service (PAAS)
18(1)
Infrastructure as a Service (IAAS)
18(1)
Who Are the Cloud Providers?
19(1)
Sun
19(1)
Salesforce.com
19(1)
Google
19(1)
Microsoft
20(1)
Amazon.com
20(1)
Running Oracle on Amazon's Cloud
20(6)
But Is It Supported?
21(1)
Making the Cloud Concrete
21(2)
Prerequisites
23(1)
How Do You Work This Thing?
23(3)
Starting Out: Getting a Suitable Operating System Running
26(2)
Persistent Storage
28(4)
Simple Storage Service (S3)
28(1)
Elastic Block Storage (EBS)
29(1)
EBS Performance for Oracle
29(2)
Attaching and Configuring EBS Storage
31(1)
Persistence Approaches
32(1)
Generic AMI and EBS File System
32(1)
Custom AMI
33(1)
Boot from EBS
33(1)
Oracle Backup on EC2: The OSB Cloud Module
33(1)
Summary
34(1)
Developing a Performance Methodology
35(38)
What Is Performance?
35(2)
The Early Days
35(1)
Time-Based Performance Analysis
36(1)
Performance Strategy
36(1)
Design and Development
37(2)
Common Design Pitfalls
38(1)
Lightweight Performance Measures
39(1)
Quality Assurance
39(2)
Testing for Performance
39(1)
Capturing Resource Utilization and Outlines
40(1)
New Software and Upgrades
41(2)
Know Your Hardware
41(1)
Verify Statistics Collection
42(1)
Back Up the Optimizer Statistics
43(1)
Implement Change Incrementally
43(1)
Post Installation or Upgrade
43(1)
Reactive Tuning
44(10)
Define the Problem
45(4)
Examine the Performance Data
49(3)
Formulate a Theory
52(1)
Implement and Verify the Solution
53(1)
Diagnostic Tools
54(13)
Using and Interpreting ADDM
55(1)
Using and Interpreting the ASH Report
56(4)
Using and Interpreting the AWR and Statspack Instance Reports
60(7)
Meaning of Key Statistics
67(3)
Time-Based Statistics
67(1)
% Activity and Average Active Sessions
68(1)
ASH-Estimated DB time
69(1)
VOSTAT
70(1)
Wait Classes
70(1)
The Optimizer
70(1)
Managing Statistics
71(1)
Locking Statistics
71(1)
Execution Plan Stability and Profiles
71(1)
Summary
71(2)
The DBA as Designer
73(38)
When to Get Involved in Application Design
74(2)
Be Approachable
74(1)
Ask for Periodic Sign-off on Design and Application Milestones
75(1)
Attend Code Reviews
75(1)
Hold Postmortems
76(1)
Partnership Between DBAs and Developers
76(2)
Hold Brown Bag Sessions
77(1)
Sit Near Each Other
77(1)
Be Open to New Ideas
77(1)
Be on the Same Side
78(1)
Design-First Methodologies vs. Agile Techniques
78(5)
Design-First Approach
79(1)
Agile Software Development
80(1)
Pros and Cons of Each Methodology
80(3)
Schema Design
83(19)
Choose Your Datatypes Carefully
83(8)
When Bigger Is Not Better
91(1)
Heaps of Trouble
92(8)
Faster, Not Harder
100(2)
Other Design Considerations
102(3)
Middle Tier vs. Database
102(1)
Flexibility, Security, Speed
103(1)
The Importance of Having Integrity
103(2)
Don't Be High Maintenance
105(1)
The DBA as Database Evangelist
105(5)
Reading the Documentation and Keeping Current
107(1)
Knowing, Testing, and Teaching Your Software's Features
108(2)
Learning from Your Mistakes and Experiences
110(1)
Triages and Postmortems
110(1)
Constant and Iterative Knowledge Sharing
110(1)
Running Oracle on Windows
111(20)
Architecture
111(8)
CPU Resources
112(5)
Memory
117(2)
Disk
119(1)
Management
119(11)
The Registry
119(3)
Services
122(4)
Scripting
126(4)
Summary
130(1)
Managing SQL Performance
131(22)
Adopting a Performance Mindset
131(2)
Defining and Measuring Performance
133(8)
Explain Plan
133(2)
DBMS_XPLAN
135(3)
Extended SQL Trace Data
138(3)
Interpreting Performance Data
141(10)
The Lack of a Good Index
141(1)
The Presence of Unidentified Data Skew
142(2)
SQL That Should Be Rewritten
144(4)
SQL That Unnecessarily Invokes PL/SQL
148(3)
Summary
151(1)
Further Reading
152(1)
PL/SQL and the CBO
153(20)
Reviewing the Basics
153(3)
Parsing Phase
153(1)
Execution Plan Preparation
154(2)
Using the Extensible Optimizer
156(1)
User-Defined Statistics
156(1)
User-Defined Selectivity
157(1)
User-Defined Cost
157(1)
Creating an Example
157(5)
Creating Some Example Objects
157(3)
Running an Example Query
160(2)
Giving the CBO Better Information
162(1)
Understanding How It Works
162(2)
Indicating Default Selectivity and Default Cost
164(2)
Specifying Defaults (Syntax)
165(1)
Determining a Default Cost
165(1)
Breaking the Association
165(1)
Influencing the Execution Plans
166(6)
Influence of the Increased Cost
166(2)
Influence on the Order of Operations with Default Statistics
168(2)
Influence on the Order of Operations
170(2)
Summary
172(1)
Understanding Performance Optimization Methods
173(124)
Blindly Changing Parameters
174(1)
Monitoring and Reacting to the BCHR
174(8)
Monitoring Delta Values of System/Session Stats
182(2)
Monitoring File Activity
184(6)
Monitoring the Delta Values of System/Session Waits
190(6)
Monitoring CPU Utilization
196(7)
CPU Load Generators
197(1)
Determining the CPU Run Queue
198(3)
Determining CPU Utilization
201(2)
Sampling Performance with Low Overhead
203(9)
Capturing Some Statistics
203(6)
Decision Tree for Quickly Interpreting the Statistics
209(3)
Creating Statspack or AWR Reports
212(3)
Monitoring the Delta Values for SQL Statements
215(4)
Examining Execution Plans and Plan Statistics
219(8)
Examining Optimizer Parameters Affecting Plans
227(3)
Generating 10053 Cost-Based Optimizer Traces
230(16)
Activating and Deactivating the Optimizer Trace
230(1)
Query Blocks
231(1)
Peeked Bind Variables
231(2)
Optimizer Parameters Used
233(1)
Transformations
233(2)
System Statistics
235(1)
Base Statistical Information
236(2)
Dynamic Sampling
238(3)
Single Table Access Path
241(1)
General Plans
242(1)
Plan Table
243(1)
Query Block Registry
244(1)
Hints
245(1)
The Query
245(1)
Generating 10046 Extended Traces
246(14)
Brief Summary of a Raw 10046 Extended Trace File's Contents
247(2)
Enabling a 10046 Extended Trace
249(4)
Disabling 10046 Tracing
253(1)
Sample Trace File Analysis with Oracle 11.1.0.7
253(7)
Examining Server Stack Traces
260(15)
Generating a Trace File on Error
260(1)
Initiating a Trace with SQLPlus Oradebug
261(14)
Operating-System-Generated Stack Traces
275(1)
Reviewing the Enterprise Manager ADDM Findings
275(4)
Examining Network Packets
279(4)
Examining Client-Side Traces
283(3)
SQLNet Tracing
283(2)
Process Monitor Tracing
285(1)
Spy++ Tracing
286(1)
Investigating Enqueue Waits
286(5)
Summary
291(6)
Choosing a Performance Optimization Method
297(50)
Decision Tree for Performance Monitoring
297(3)
Performance Problems Not Yet Reported
298(1)
Problems Reported by End Users
298(1)
Problems Reported by IT Staff
299(1)
Sample Investigations
300(21)
Quick Checkup
300(6)
Problem After Upgrading the Oracle Release Version
306(7)
Problem After Upgrading the ERP Version
313(8)
Performance Optimization Issues
321(1)
Inefficient SQL
321(7)
Verify the Inefficiency
321(1)
Collect Additional Data
322(1)
Verify That the Trace File Covers Only One Test
322(1)
Verify That the Trace File Is Complete
323(2)
Verify That the Issue Is a Database Issue
325(2)
Determine Whether It Is a Parse or Execution Problem
327(1)
Parse Performance Issues
328(3)
Majority of Parse Time Spent on the CPU
329(2)
Majority of Parse Time Spent on Wait Events
331(1)
High Execution Time or Fetch Time Issues
331(16)
General Optimizer Settings and Object Statistics
331(1)
Histogram Issues
332(1)
Common Parameters Influencing Optimizer
333(1)
Statement and Physical Design Issues
334(1)
Data Access Issues
335(2)
Optimizer Not Using (Correct) Index
337(1)
Pagination (Top N) Queries
338(1)
Processing Large Result Sets
339(1)
Join Issues
340(1)
Parallel Processing Issues
341(1)
Shared Pool Abuse
342(1)
Resolving Shared Pool Abuse
343(1)
General Guidelines for Investigating Shared Pool Abuse
344(3)
Managing the Very Large Database
347(22)
Designing (or Retrofitting) a VLDB
348(1)
Infinity Is So Imprecise
349(2)
Partitioning
351(9)
Everything Is a Segment
353(1)
Data Manipulation with Partitioning
353(4)
Partition Pruning
357(1)
Partition Configuration
358(2)
Information Life Cycle Management
360(2)
Backup Optimization and Guaranteed Recovery
362(2)
Further Notes on Storage
364(1)
Limits of Which to Be Aware
365(2)
Database Block Size
365(1)
Number of Files in a Database
365(1)
Storage That Can Migrate
366(1)
Parameter READ_ONLY_OPEN_DELAYED
367(1)
Summary
367(2)
Statistics
369(30)
It Can't Be Done!
369(9)
Subquery Anomaly
370(4)
Partition Elimination
374(4)
Lack of Knowledge
378(7)
Problems with Statistics
385(2)
Timing
387(1)
Multinationals
387(1)
Partitioning
387(1)
Batch Jobs
388(1)
Creating Statistics
388(9)
Other Stats
394(2)
Baseline
396(1)
Summary
397(2)
Troubleshooting Latch Contention
399(42)
Latches and Why We Need Them
399(1)
Solitaire, Parent, and Child Latches
400(1)
Operational Specifics
401(3)
Immediate Mode
401(2)
Willing-to-Wait Mode
403(1)
Latch-Wait Posting Mode
404(1)
Identifying and Analyzing Latch Contention
404(3)
Identify Latches Causing Contention
404(2)
Review Distribution of Gets
406(1)
Check the Code Path
406(1)
Cache Buffers Chains Latch Contention
407(12)
Common Causes of CBC Latch Contention
409(1)
Analyzing CBC Latch Contention
410(5)
Resolving CBC Latch Contention
415(4)
Shared Pool Latch Contention
419(10)
Structures in the Shared Pool
419(2)
Common Causes of Shared Pool Latch Contention
421(1)
Analyzing Shared pool Latch Contention
422(6)
Resolving Shared Pool Latch Contention
428(1)
Library Cache Latch Contention
429(5)
Common Causes of Library Cache Latch Contention
431(1)
Analyzing Library Cache Latch Contention
431(1)
Library Cache Latches and Mutexes
432(1)
Resolving Library Cache Latch Contention
432(2)
Enqueue Hash Chains Latch Contention
434(5)
Common Causes of Enqueue Hash Chains Latch Contention
435(1)
Analyzing Enqueue Hash Chains Latch Contention
436(2)
Resolving Enqueue Hash Chains Latch Contention
438(1)
Advanced Help for Latch Contention Problems
439(1)
The Vlatch_Parent View
439(1)
The spin_count Parameter
439(1)
The _latch_classes and _latch_class_N Parameters
439(1)
The _latch_wait_posting and _enable_reliable_latch_waits Parameters
440(1)
Summary
440(1)
Measuring for Robust Performance
441(26)
Finding the Red Rocks
442(1)
Understanding the Properties of Performance
443(2)
Response Time Is Key
443(1)
Throughput Counts
443(1)
Meeting Expectations Matters
444(1)
All Together Now
444(1)
``Tuning'' a Data Warehouse
445(3)
Initial Tuning
445(2)
Repeating the Analysis
447(1)
Exploring What Variance Can Tell Us About a Process
448(7)
Distribution Analysis
449(3)
Distribution of Elapsed Time Data
452(1)
Variance
452(1)
The Index of Dispersion
453(1)
What About Standard Deviation?
453(1)
Elapsed Time Data Sources
454(1)
Achieving Robust Performance
455(10)
Designing an Experiment
456(1)
Using Instrumentation
457(2)
Measuring the Results
459(4)
Tolerance Ranges and Process Capability
463(1)
What is ``Too Much'' Variation?
464(1)
Measuring Variance Within Oracle Sample Sets
464(1)
Sampling from Samples
464(1)
Summary
465(2)
User Security
467(40)
Securing User Accounts
468(1)
User Enumeration
469(6)
Splitting the Task in Two
470(2)
Dealing with Oracle Database 10g and Prior
472(3)
Feature Analysis
475(7)
Accounts That Can Definitely Be Removed
477(1)
Accounts That Definitely Have to Remain in the Database
478(1)
Accounts to Analyze Individually
479(3)
Reduction of Accounts
482(5)
Account Password Strength
487(11)
Cracking Passwords with a PL/SQL Password Cracker
488(2)
Cracking Passwords with a ``Real'' Password Cracker
490(7)
Fixing Weak Passwords
497(1)
Roles and Privilege Assessment
498(2)
Have Accounts Been Used?
498(1)
Have Accounts Been Shared?
499(1)
Password Management
500(3)
Audit Settings
503(1)
Summary
504(1)
Quiz Answer
505(2)
Securing Data
507(26)
Identifying Key Data
508(1)
Locating the Database Table
509(18)
Direct Table Privileges
510(3)
Understand the Hierarchy
513(6)
Other Methods to Read Data
519(6)
Access to Access
525(2)
Duplicating Data
527(3)
Generalizing Across the Database
530(1)
Summary
531(1)
Quiz Answer
532(1)
Index 533
Pete Finnigan works as an independent Oracle security consultant for his own company PeteFinnigan.com Limited. Pete specializes in performing detailed Oracle security Health checks against Oracle databases using a detailed methodology developed by Pete from many years of experience in securing databases. Pete performs this service for many clients worldwide, but also offers other specialist consulting services in many areas related to Oracle security. Pete's company PeteFinnigan.com Limited also develops and delivers a number of Oracle security training courses that are well-regarded and comprehensive.