Atjaunināt sīkdatņu piekrišanu

Modern Database Management: United States Edition 9th edition [Hardback]

3.46/5 (282 ratings by Goodreads)
  • Formāts: Hardback, 736 pages, height x width x depth: 282x10x10 mm, weight: 1630 g
  • Izdošanas datums: 22-May-2008
  • Izdevniecība: Pearson
  • ISBN-10: 0136003915
  • ISBN-13: 9780136003915
Citas grāmatas par šo tēmu:
  • Formāts: Hardback, 736 pages, height x width x depth: 282x10x10 mm, weight: 1630 g
  • Izdošanas datums: 22-May-2008
  • Izdevniecība: Pearson
  • ISBN-10: 0136003915
  • ISBN-13: 9780136003915
Citas grāmatas par šo tēmu:

Hoffer focuses on the latest principles, concepts and technologies and what leading practitioners say is most important for database developers.

Database analysis, database design, SQL, client/server database environment, data warehousing, data quality and integration, and object-oriented data modeling.

Intended for professional development programs in introductory database management.

 

 

 

 

 

 

 

 

 

Preface xxix
PART I THE CONTEXT OF DATABASE MANAGEMENT
1(86)
An Overview of Part One
1(2)
The Database Environment
3(35)
Learning Objectives
3(1)
Data Matters!
3(2)
Introduction
5(1)
Basic Concepts and Definitions
6(5)
Data
6(1)
Data Versus Information
7(1)
Metadata
8(1)
Database Management Systems
9(1)
Data Models
9(1)
Entities
9(1)
Relationships
9(2)
Relational Databases
11(1)
Traditional File Processing Systems
11(2)
File Processing Systems at pine Valley Furniture Company
11(1)
Disadvantages of File Processing Systems
12(1)
Program-Data Dependence
12(1)
Duplication of Data
12(1)
Limited Data Sharing
13(1)
Lenghty Development Times
13(1)
Excessive Program Maintenance
13(1)
The Database Approach
13(5)
Advantages of The Database Approach
14(1)
Program-Data Independence
14(1)
Planned Data Redundancy
14(1)
Improved Data Consistency
15(1)
Improved Data Sharing
15(1)
Increased Productivity of Application Development
15(1)
Enforcement of Standards
15(1)
Improved Data Quality
16(1)
Improved Data Accessibility and Responsiveness
16(1)
Reduced Program Maintenance
16(1)
Improved Decision Support
17(1)
Cautions About Database Benefits
17(1)
Costs and Risks of The Database Approach
17(1)
New, Specialized Personnel
17(1)
Installation and Management Cost and Complexity
17(1)
Conversion Costs
18(1)
Need for Explicit Backup and Recovery
18(1)
Organizational Conflict
18(1)
Components of the Database Environment
18(2)
The Range of Database Applications
20(7)
Personal Databases
20(1)
Workgroup Databases
21(2)
Departmental/Divisional Databases
23(1)
Enterprise Databases
23(2)
Web-Enabled Databases
25(1)
Summary of Database Applications
26(1)
Evolution of Database Systems
27(2)
1960s
27(1)
1970s
28(1)
1980s
28(1)
1990s
28(1)
2000 and Beyond
28(1)
Summary
29(1)
Chapter Review
30(1)
Key Terms
30(1)
Review Questions
30(1)
Problems and Exercises
31(2)
Field Exercises
33(1)
References
34(1)
Further Reading
34(1)
Web Resources
34(1)
Case: Mountain View Community Hospital
35(3)
The Database Development Process
38(49)
Learning Objectives
38(1)
Introduction
39(1)
Database Development Within Information Systems Development
40(5)
Information Systems Architecture
40(1)
Information Engineering
41(1)
Information Systems Planning
41(1)
Identifying Strategic Planning Factors
41(1)
Identifying Corporate Planning Objects
42(1)
Developing an Enterprise Model
42(3)
Database Development Process
45(9)
Systems Development Life Cycle
45(1)
Planning-Enterprise Modeling
46(1)
Planning-Conceptual Data Modeling
47(1)
Analysis-Conceptual Data Modeling
48(1)
Design-Logical Database Design
48(1)
Design-Physical Database Design and Definition
49(1)
Implementation-Database Implementation
49(1)
Maintenance-Database Maintenance
49(1)
Alternative IS Development Approaches
49(2)
Role of Packaged Data Models
51(1)
Universal Data Models
52(1)
Industry-Specific Data Models
52(1)
Summary
52(1)
The Role of CASE and a Repository
53(1)
Managing the People Involved in Database Development
54(1)
Three-Schema Architecture for Database Development
55(4)
Three-Schema Components
55(1)
Summary of Schemas
56(1)
Enterprise Data Model
57(1)
User Views
57(1)
Conceptual Schema
57(1)
Logical Schema
57(1)
Physical Schema
58(1)
Strategies for Development
58(1)
Three-Tiered Database Location Architecture
59(2)
Developing a Database Application for Pine Valley Furniture Company
61(13)
Simplified Project Data Model Example
62(3)
A Current Pine Valley Furniture Company Project Request
65(1)
Matching User Needs to the Information Systems Architecture
66(2)
Analyzing Database Requirements
68(1)
Designing the Database
69(2)
Using the Database
71(3)
Administering the Database
74(1)
Summary
74(1)
Chapter Review
75(1)
Key Terms
75(1)
Review Questions
75(1)
Problems and Exercises
76(2)
Field Exercises
78(1)
References
79(1)
Further Reading
79(1)
Web Resources
79(1)
Case: Mountain View Community Hospital
80(7)
PART II DATABASE ANALYSIS
87(112)
An Overview of Part Two
87(2)
Modeling Data in the Organization
89(61)
Learning Objectives
89(1)
Introduction
90(1)
Modeling the Rules of the Organization
91(6)
Overview of Business Rules
92(1)
The Business Rules Paradigm
92(1)
Scope of Business Rules
93(1)
Good Business Rules
93(1)
Gathering Business Rules
93(1)
Data Names and Definitions
94(1)
Data Names
94(1)
Data Definitions
95(1)
Good Data Definitions
96(1)
The E-R Model: An Overview
97(3)
Sample E-R Diagram
97(2)
E-R Model Notation
99(1)
Modeling Entities and Attributes
100(10)
Entities
100(1)
Entity Type Versus Entity Instance
101(1)
Entity Type Versus System Input, Output, or User
101(1)
Strong Versus Weak Entity Types
102(1)
Naming and Defining Entity Types
103(2)
Attributes
105(1)
Required Versus Optional Attributes
105(1)
Simple Versus Composite Attributes
106(1)
Single-Valued Versus Multivalued Attributes
106(1)
Stored Versus Derived Attributes
107(1)
Identifier Attribute
107(2)
Naming and Defining Attributes
109(1)
Modeling Relationships
110(18)
Basic Concepts and Definitions in Relationships
111(1)
Attributes on Relationships
112(1)
Associative Entities
112(2)
Degree of a Relationship
114(1)
Unary Relationship
114(3)
Binary Relationship
117(1)
Ternary Relationship
117(1)
Attributes or Entity?
118(2)
Cardinality Constraints
120(1)
Minimum Cardinality
120(1)
Maximum Cardinality
121(1)
Some Examples
121(1)
A Ternary Relationship
122(1)
Modeling Time-Dependent Data
123(2)
Multiple Relationships
125(2)
Naming and Defining Relationships
127(1)
E-R Modeling Example: Pine Valley Furniture Company
128(3)
Database Processing at Pine Valley Furniture
131(3)
Showing Product Information
131(1)
Showing Customer Information
132(1)
Showing Customer Order Status
132(1)
Showing Product Sales
133(1)
Summary
134(1)
Chapter Review
135(1)
Key Terms
135(1)
Review Questions
136(1)
Problems and Exercises
137(9)
Field Exercises
146(1)
References
146(1)
Further Reading
147(1)
Web Resources
147(1)
Case: Mountain View Community Hospital
148(2)
The Enhanced E-R Model and Business Rules
150(49)
Learning Objectives
150(1)
Introduction
151(1)
Representing Supertypes and Subtypes
152(7)
Basic Concepts and Notation
152(2)
An Example
154(1)
Attribute Inheritance
154(1)
When to Use Supertype/Subtype Relationships
155(1)
Representing Specialization and Generalization
156(1)
Generalization
156(1)
Specialization
157(1)
Combining Specialization and Generalization
158(1)
Specifying Constraints in Supertype/Subtype Relationships
159(6)
Specifying Completeness Constraints
159(1)
Total Specialization Rule
159(1)
Partial Specialization Rule
159(1)
Specifiying Disjointness Constraints
159(1)
Disjoint Rule
160(1)
Overlap Rule
161(1)
Defining Subtype Discriminators
162(1)
Disjoint Subtypes
162(1)
Overlapping Subtypes
163(1)
Defining Supertype/Subtype Hierarchies
163(1)
An Example
164(1)
Summary of Supertype/Subtype Hierarchies
165(1)
EER Modeling Example: Pine Valley Furniture
165(4)
Entity Clustering
169(3)
Packaged Data Models
172(6)
Business Rules Revisited
178(8)
Classification of Business Rules
179(1)
Stating a Structural Assertion
180(1)
Derived Facts
181(1)
Stating an Action Assertion
181(1)
Types of Action Assertions
182(1)
Representing and Enforcing Business Rules
182(1)
Sample Business Rules
183(2)
Identifying and Testing Business Rules
185(1)
Summary
186(1)
Chapter Review
187(1)
Key Terms
187(1)
Review Questions
187(1)
Problems and Exercises
188(6)
Field Exercises
194(1)
References
194(1)
Further Reading
195(1)
Web Resources
195(1)
Case: Mountain View Community Hospital
196(3)
PART III DATABASE DESIGN
199(108)
An Overview of Part Three
199(2)
Logical Database Design and the Relational Model
201(56)
Learning Objectives
201(1)
Introduction
201(1)
The Relational Data Model
202(5)
Basic Definitions
203(1)
Relational Data Structure
203(1)
Relational Keys
203(1)
Properties of Relations
204(1)
Removing Multivalued Attributes from Tables
204(1)
Example Database
205(2)
Integrity Constraints
207(5)
Domain Constraints
207(1)
Entity Integrity
208(1)
Referential Integrity
208(1)
Action Assertions
209(1)
Creating Relational Tables
210(1)
Well-Structured Relations
211(1)
Transforming EER Diagrams into Relations
212(14)
Step 1: Map Regular Entities
212(1)
Composite Attributes
213(1)
Multivalued Attributes
213(1)
Step 2: Map Weak Entities
214(1)
When to Create a Surrogate Key
215(1)
Step 3: Map Binary Relationships
216(1)
Map Binary One-to-Many Relationships
216(1)
Map Binary Many-to-Many Relationships
216(1)
Map Binary One-to-One Relationships
217(1)
Step 4: Map Associative Entities
218(1)
Identifier Not Assigned
219(1)
Identifier Assigned
219(2)
Step 5: Map Unary Relationships
221(1)
Unary One-to-Many Relationships
221(1)
Unary Many-to-Many Relationships
221(2)
Step 6: Map Ternary (and n-ary) Relationships
223(1)
Step 7: Map Supertype/Subtype Relationships
224(1)
Summary of EER to Relational Transformations
225(1)
Introduction to Normalization
226(4)
Steps in Normalization
227(1)
Functional Dependencies and Keys
228(1)
Determinants
228(1)
Candidate Keys
228(2)
Normalization Example: Pine Valley Furniture Company
230(6)
Step 0: Represent the View in Tabular Form
230(1)
Step 1: Convert to First Normal Form
231(1)
Remove Repeating Groups
231(1)
Select the Primary Key
232(1)
Anomalies in INF
232(1)
Step 2: Convert to Second Normal Form
233(1)
Step 3: Convert to Third Normal Form
234(1)
Removing Transitive Dependencies
234(1)
Determinants and Normalization
235(1)
Step 4: Further Normalization
236(1)
Merging Relations
236(3)
An Example
237(1)
View Integration Problems
237(1)
Synonyms
237(1)
Homonyms
237(1)
Transitive Dependencies
238(1)
Supertype/Subtype Relationships
238(1)
A Final Step for Defining Relational Keys
239(1)
Summary
240(2)
Chapter Review
242(1)
Key Terms
242(1)
Review Questions
242(1)
Problems and Exercises
243(7)
Field Exercises
250(1)
References
251(1)
Further Reading
251(1)
Web Resources
251(1)
Case: Mountain View Community Hospital
252(5)
Physical Database Design and Performance
257(50)
Learning Objectives
257(1)
Introduction
257(1)
Physical Database Design Process
258(3)
Data Volume and Usage Analysis
259(2)
Designing Fields
261(4)
Choosing Data Types
261(1)
Coding and Compression Techniques
262(1)
Controlling Data Integrity-A Foundation for Sarbanes-Oxley Compliance
263(2)
Handling Missing Data
265(1)
Designing Physical Records and Denormalization
265(7)
Denormalization
266(1)
Denormalize with Caution
266(1)
Opportunities and Types of Denormalization
267(5)
Designing Physical Files
272(11)
Pointer
273(1)
File Organizations
273(1)
Sequential File Organizations
274(1)
Indexed File Organizations
274(5)
Hashed File Organizations
279(2)
Summary of File Organizations
281(1)
Clustering Files
281(2)
Designing Controls for Files
283(1)
Using and Selecting Indexes
283(2)
Creating a Unique Key Index
283(1)
Creating a Secondary (Nonunique) Key Index
284(1)
When to Use Indexes
284(1)
RAID: Improving File Access Performance by Parallel Processing
285(3)
Designing Databases
288(3)
Optimizing for Query Performance
291(5)
Parallel Query Processing
291(1)
Overriding Automatic Query Optimization
292(1)
Picking Data Block Size
293(1)
Balancing I/O Across Disk Controllers
294(1)
Guidelines for Better Query Design
294(2)
Summary
296(1)
Chapter Review
297(1)
Key Terms
297(1)
Review Questions
298(1)
Problems and Exercises
298(4)
Field Exercises
302(1)
References
302(1)
Further Reading
303(1)
Web Resources
303(1)
Case: Mountain View Community Hospital
304(3)
PART IV IMPLEMENTATION
307(212)
An Overview of Part Four
307(2)
Introduction to SQL
309(47)
Learning Objectives
309(1)
Introduction
309(2)
History of the SQL Standard
311(1)
The Role of SQL in a Database Architecture
312(1)
The SQL Environment
313(5)
Defining a Database in SQL
318(6)
Generating SQL Database Definitions
318(1)
Creating Tables
319(3)
Creating Data Integrity Controls
322(1)
Changing Table Definitions
323(1)
Removing Tables
324(1)
Inserting, Updating, and Deleting Data
324(3)
Batch Input
326(1)
Deleting Database Contents
326(1)
Updating Database Contents
326(1)
Internal Schema Definition in RDBMSs
327(1)
Creating Indexes
328(1)
Processing Single Tables
328(19)
Clauses of the SELECT Statement
329(2)
Using Expressions
331(1)
Using Functions
331(1)
Using Wildcards
332(1)
Using Comparison Operators
333(1)
Using Boolean Operators
333(3)
Using Ranges for Qualification
336(1)
Using Distinct Values
337(2)
Using IN and NOT IN with Lists
339(1)
Sorting Results: The ORDER BY Clause
339(1)
Categorizing Results: The GROUP BY Clause
340(1)
Qualifying Results by Categories: The HAVING Clause
341(1)
Using and Defining Views
342(4)
Materialized Views
346(1)
Summary
347(1)
Chapter Review
347(1)
Key Terms
347(1)
Review Questions
347(2)
Problems and Exercises
349(4)
Field Exercises
353(1)
References
354(1)
Further Reading
354(1)
Web Resources
354(1)
Case: Mountain View Community Hospital
355(1)
Advanced SQL
356(45)
Learning Objectives
356(1)
Introduction
356(1)
Processing Multiple Tables
357(19)
Equi-join
358(2)
Natural Join
360(1)
Outer Join
361(1)
Union Join
362(1)
Sample Multiple Join Involving Four Tables
363(1)
Subqueries
364(4)
Correlated Subqueries
368(1)
Using Derived Tables
369(1)
Combining Queries
369(3)
Conditional Expressions
372(1)
More Complicated SQL Queries
373(2)
Tips for Developing Queries
375(1)
Ensuring Transaction Integrity
376(2)
Data Dictionary Facilities
378(2)
SQL: 200N Enhancements and Extensions to SQL
380(4)
Analytical Functions
380(1)
New Data Types
381(1)
Other Enhancements
382(1)
Programming Extensions
382(2)
Triggers and Routines
384(4)
Triggers
385(1)
Routines
386(2)
Embedded SQL and Dynamic SQL
388(3)
OLAPSQL
391(2)
Summary
393(1)
Chapter Review
394(1)
Key Terms
394(1)
Review Questions
394(1)
Problems and Exercises
395(4)
Field Exercises
399(1)
References
399(1)
Further Reading
399(1)
Web Resources
399(1)
Case: Mountain View Community Hospital
400(1)
The Client/Server Database Environment
401(25)
Learning Objectives
401(1)
Location, Location, Location!
401(2)
Introduction
403(1)
Client/Server Architectures
404(3)
File Server Architectures
404(1)
Limitations of File Servers
405(1)
Database Server Architectures
406(1)
Three-Tier Architectures
407(2)
Partitioning an Application
409(3)
Role of the Mainframe
412(1)
Using Middleware
413(2)
Client/Server Issues
415(2)
Using ODBC to Link External Tables Stored on a Database Server
417(2)
Using JDBC to Link External Tables Stored on a Database Server
419(1)
Looking Forward with Client/Server in Mind
419(1)
Summary
419(1)
Chapter Review
420(1)
Key Terms
420(1)
Review Questions
421(1)
Problems and Exercises
421(1)
Field Exercises
422(1)
References
422(1)
Further Reading
422(1)
Web Resources
423(1)
Case: Mountain View Community Hospital
424(2)
The Internet Database Environment
426(33)
Learning Objectives
426(1)
Introduction
427(1)
The Internet and Database Connection
427(1)
The Internet Environment
428(2)
Common Internet Architecture Components
430(11)
Internet-Related Languages
430(3)
XML and XQuery Overview
433(4)
Server-Side Extensions
437(1)
Web Server Interfaces
438(1)
Web Servers
439(1)
Client-Side Extensions
440(1)
Web-to-Database Tools
441(11)
Web Services
443(7)
Lack of Mature Standards
450(1)
Lack of Security
450(1)
Service-Oriented Architecture (SOA)
451(1)
Semantic Web
451(1)
Internet Technology Rate-of-Change Issues
451(1)
Summary
452(1)
Chapter Review
453(1)
Key Terms
453(1)
Review Questions
453(1)
Problems and Exercises
454(1)
Field Exercises
455(1)
References
455(1)
Further Reading
455(1)
Web Resources
456(1)
Case: Mountain View Community Hospital
457(2)
Data Warehousing
459(60)
Learning Objectives
459(1)
Introduction
460(2)
Basic Concepts of Data Warehousing
462(5)
A Brief History
463(1)
The Need for Data Warehousing
463(1)
Need for a Company-wide View
463(2)
Need to Separate Operational and Informational Systems
465(1)
Data Warehousing Success
466(1)
Data Warehouse Architectures
467(9)
Independent Data Mart Data Warehousing Environment
468(2)
Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach
470(2)
Logical Data Mart and Real-Time Data Warehouse Architecture
472(3)
Three-Layer Data Architecture
475(1)
Role of the Enterprise Data Model
475(1)
Role of Metadata
476(1)
Some Characteristics of Data Warehouse Data
476(4)
Status Versus Event Data
476(1)
Transient Versus Periodic Data
477(1)
An Example of Transient and Periodic Data
477(2)
Transient Data
479(1)
Periodic Data
479(1)
Other Data Warehouse Changes
479(1)
The Derived Data Layer
480(18)
Characteristics of Derived Data
480(1)
The Star Schema
481(1)
Fact Tables and Dimension Tables
481(1)
Example Star Schema
482(2)
Surrogate Key
484(1)
Grain of Fact Table
485(1)
Duration of the Database
486(1)
Size of the Fact Table
486(1)
Modeling Date and Time
487(1)
Variations of the Star Schema
488(1)
Multiple Fact Tables
488(1)
Factless Fact Tables
489(1)
Normalizing Dimension Tables
490(1)
Multivalued Dimensions
490(1)
Hierarchies
491(2)
Slowly Changing Dimensions
493(3)
Determining Dimensions and Facts
496(2)
The User Interface
498(9)
Role of Metadata
498(1)
SQL OLAP Querying
498(2)
Online Analytical Processing (OLAP) Tools
500(1)
Slicing a Cube
501(1)
Drill-Down
502(1)
Summarizing More Than Three Dimensions
503(1)
Data Visualization
503(1)
Business Performance Management and Dashboards
504(1)
Data-Mining Tools
505(1)
Data-Mining Techniques
505(1)
Data-Mining Applications
506(1)
Summary
507(1)
Chapter Review
508(1)
Key Terms
508(1)
Review Questions
508(1)
Problems and Exercises
509(5)
Field Exercises
514(1)
References
514(1)
Further Reading
515(1)
Web Resources
515(1)
Case: Mountain View Community Hospital
516(3)
PART V ADVANCED DATABASE TOPICS
519(121)
An Overview of Part Five
519(3)
Data Quality and Integration
522(34)
Learning Objectives
522(1)
Introduction
522(2)
Managing Data Quality
524(9)
The State of Data Quality
526(1)
External Data Sources
527(1)
Redundant Data Storage and Inconsistent Metadata
527(1)
Data Entry
527(1)
Lack of Organizational Commitment
527(1)
Data Quality Improvement
527(1)
Conduct a Data Quality Audit
527(2)
Improve Data Capture Processes
529(1)
Establish a Data Stewardship Program
529(2)
Apply TQM Principles and Practices
531(1)
Apply Modern Data Management Technology
531(1)
Estimate Return on Investment
531(1)
Start with a High-Quality Data Model
531(2)
Summary of Data Quality
533(1)
Data Integration: An Overview
533(4)
General Approaches to Data Integration
533(1)
Data Federation
534(1)
Data Propagation
534(1)
Master Data Management
535(2)
Data Integration for Data Warehousing: The Reconciled Data Layer
537(7)
Characteristics of Data After ETL
537(1)
The ETL Process
538(1)
Mapping and Metadata Management
539(1)
Extract
539(1)
Cleanse
540(3)
Load and Index
543(1)
Data Transformation
544(5)
Data Transformation Functions
545(1)
Record-Level Functions
545(1)
Field-Level Functions
546(1)
More Complex Transformations
546(1)
Tools to Support Data Reconciliation
546(1)
Data Quality Tools
547(2)
Data Conversion Tools
549(1)
Data Cleansing Tools
549(1)
Selecting Tools
549(1)
Summary
549(1)
Chapter Review
550(1)
Key Terms
550(1)
Review Questions
550(1)
Problems and Exercises
551(1)
Field Exercises
552(1)
References
552(1)
Further Reading
553(1)
Web Resources
553(1)
Case: Mountain View Community Hospital
554(2)
Data and Database Administration
556(59)
Learning Objectives
556(1)
Introduction
557(1)
The Roles of Data Database Administrators
558(7)
Traditional Data Administration
559(1)
Traditional Database Administration
560(3)
Evolving Approaches to Data Administration
563(1)
Blending Data and Database Administration
563(1)
Fast-Track Development
563(1)
New DBA Roles
563(2)
Summary of Evolving Data Administration Roles
565(1)
The Open-Source Movement
565(2)
Modeling Enterprise Data
567(1)
Organizational Roles
567(1)
Role of an Information Systems Architecture
568(1)
Managing Data Security
568(16)
Threats to Data Security
569(1)
Establishing Client/Server Security
570(1)
Server Security
571(1)
Network Security
571(1)
Client/Server Security Issues for Web-Enabled Databases
571(1)
Web Security
572(1)
Web Privacy
573(1)
Database Software Data Security Features
574(1)
Views
574(1)
Integrity Controls
575(2)
Authorization Rules
577(1)
User-Defined Procedures
578(1)
Encryption
579(1)
Authentication Schemes
580(1)
Passwords
580(1)
Strong Authentication
581(1)
Mediated Authentication
582(1)
Security Policies and Procedures
582(1)
Personnel Controls
582(1)
Physical Access Controls
583(1)
Maintenance Controls
583(1)
Data Privacy Controls
583(1)
Database Backup and Recovery
584(8)
Basic Recovery Facilities
584(1)
Backup Facilities
584(1)
Journalizing Facilities
585(1)
Checkpoint Facility
586(1)
Recovery Manager
586(1)
Recovery and Restart Procedures
586(1)
Disk Mirroring
586(1)
Restore/Rerun
586(1)
Maintaining Transaction Integrity
587(1)
Backward Recovery
588(1)
Forward Recovery
589(1)
Types of Database Failure
590(1)
Aborted Transactions
590(1)
Incorrect Data
590(1)
System Failure
591(1)
Database Destruction
591(1)
Disaster Recovery
591(1)
Controlling Concurrent Access
592(6)
The Problem of Lost Updates
592(1)
Serializability
593(1)
Locking Mechanisms
593(1)
Locking Level
594(1)
Types of Locks
595(1)
Deadlock
596(1)
Managing Deadlock
596(1)
Versioning
597(1)
Data Dictionaries and Repositories
598(3)
Data Dictionary
598(1)
Repositories
599(2)
Overview of Tuning the Database for Performance
601(3)
Installation of the DBMS
601(1)
Memory and Storage Space Usage
602(1)
Input/Output (I/O) Contention
602(1)
CPU Usage
603(1)
Application Tuning
603(1)
Data Availability
604(2)
Costs of Dow time
604(1)
Measures to Ensure Availability
605(1)
Hardware Failures
605(1)
Loss or Corruption of Data
605(1)
Human Error
605(1)
Maintenance Downtime
606(1)
Network-Related Problems
606(1)
Summary
606(1)
Chapter Review
607(1)
Key Terms
607(1)
Review Questions
607(2)
Problems and Exercises
609(3)
Field Exercises
612(1)
References
613(1)
Further Reading
613(1)
Web Resources
613(1)
Case: Mountain View Community Hospital
614(1)
Overview: Distributed Databases
615(5)
Learning Objectives
615(1)
Overview
616(2)
Objectives and Trade-Offs
616(1)
Options for Distributing a Database
616(1)
Distributed DBMS
617(1)
Query Optimization
618(1)
Chapter Review
618(1)
References
618(1)
Further Reading
619(1)
Web Resources
619(1)
Overview: Object-Oriented Data Modeling
620(9)
Learning Objectives
620(1)
Overview
621(7)
The Unified Modeling Language
621(1)
Object-Oriented Data Modeling
622(5)
Representing Aggregation
627(1)
Chapter Review
628(1)
References
628(1)
Further Reading
628(1)
Web Resources
628(1)
Overview: Using Relational Databases to Provide Object Persistence
629(11)
Learning Objectives
629(1)
Overview
630(7)
Providing Persistence for Objects Using Relational Databases
631(1)
Call-Level Application Program Interfaces
631(1)
SQL Query Mapping Frameworks
631(1)
Object-Relational Mapping Frameworks
631(1)
Proprietary Approaches
632(1)
Object-Relational Mapping Example
633(1)
Mapping Files
634(2)
Responsibilities of Object-Relational Mapping Frameworks
636(1)
Summary
637(1)
Chapter Review
638(1)
References
638(1)
Further Reading
639(1)
Web Resources
639(1)
APPENDIX A Data Modeling Tools and Notation
640(11)
Comparing E-R Modeling Conventions
640(8)
Visio Professional 2003 Notation
643(1)
Entities
643(1)
Relationships
643(1)
AllFusion ERwin Data Modeler 4.1 SPI Notation
643(1)
Entities
643(2)
Relationships
645(1)
Sybase Power Designer 11.1 Notation
645(1)
Entities
645(2)
Relationships
647(1)
Oracle Designer Notation
647(1)
Entities
647(1)
Relationships
648(1)
Comparison of Tool Interfaces and E-R Diagrams
648(3)
APPENDIX B Advanced Normal Forms
651(6)
Boyce-Codd Normal Form
651(3)
Anomalies in Student Advisor
651(1)
Definition of Boyce-Codd Normal Form (BCNF)
652(1)
Converting a Relation to BCNF
652(2)
Fourth Normal Form
654(2)
Multivalued Dependencies
655(1)
Higher Normal Forms
656(1)
Appendix Review
656(1)
Key Terms
656(1)
References
656(1)
Web Resources
656(1)
APPENDIX C Data Structures
657(13)
Pointers
657(2)
Data Structure Building Blocks
659(1)
Linear Data Structures
660(6)
Stacks
662(1)
Queues
662(1)
Sorted Lists
662(3)
Multilists
665(1)
Hazards of Chain Structures
666(1)
Trees
666(3)
Balanced Trees
667(2)
References
669(1)
Glossary of Acronyms 670(2)
Glossary of Terms 672(9)
Index 681