CART

(0) items

DataBase Systems : A Practical Approach to Design, Implementation and Management,9780321294012
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

DataBase Systems : A Practical Approach to Design, Implementation and Management

by ;
Edition:
5th
ISBN13:

9780321294012

ISBN10:
0321294017
Format:
Paperback
Pub. Date:
1/1/2010
Publisher(s):
Addison Wesley
List Price: $131.20
More New and Used
from Private Sellers
Starting at $29.36
See Prices

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

New Textbook

We're Sorry
Sold Out

Related Products


  • Database Systems : A Practical Approach to Design, Implementation and Management
    Database Systems : A Practical Approach to Design, Implementation and Management
  • Database Systems : A Practical Approach to Design, Implementation and Management
    Database Systems : A Practical Approach to Design, Implementation and Management
  • Database Systems: A Practical Approach to Design, Implementation, and Management
    Database Systems: A Practical Approach to Design, Implementation, and Management
  • Database Systems: A Practical Approach to Design, Implementation, and Management
    Database Systems: A Practical Approach to Design, Implementation, and Management
  • Database Systems: A Practical Approach to Design, Implementation, and Management, 6/e
    Database Systems: A Practical Approach to Design, Implementation, and Management, 6/e




Summary

This book places a strong emphasis on good design practice, allowing readers to master design methodology in an accessible, step-by-step fashion. In this book, database design methodology is explicitly divided into three phases: conceptual, logical, and physical. Each phase is described in a separate chapter with an example of the methodology working in practice. Extensive treatment of the Web as an emerging platform for database applications is covered alongside many code samples for accessing databases from the Web including JDBC, SQLJ, ASP, ISP, and Oracle's PSP. A thorough update of later chapters covering object-oriented databases, Web databases, XML, data warehousing, data mining is included in this new edition. A clear introduction to design implementation and management issues, as well as an extensive treatment of database languages and standards, make this book an indispensable, complete reference for database professionals.

Table of Contents

Preface xxxiii
Part 1 Background
1(66)
Introduction to Databases
3(30)
Introduction
4(3)
Traditional File-Based Systems
7(7)
File-Based Approach
7(5)
Limitations of the File-Based Approach
12(2)
Database Approach
14(7)
The Database
15(1)
The Database Management System (DBMS)
16(1)
(Database) Application Programs
17(1)
Components of the DBMS Environment
18(3)
Database Design: The Paradigm Shift
21(1)
Roles in the Database Environment
21(3)
Data and Database Administrators
22(1)
Database Designers
22(1)
Application Developers
23(1)
End-Users
23(1)
History of Database Management Systems
24(2)
Advantages and Disadvantages of DBMSs
26(7)
Chapter Summary
31(1)
Review Questions
32(1)
Exercises
32(1)
Database Environment
33(34)
The Three-Level ANSI-SPARC Architecture
34(5)
External Level
35(1)
Conceptual Level
36(1)
Internal Level
36(1)
Schemas, Mappings, and Instances
37(1)
Data Independence
38(1)
Database Languages
39(4)
The Data Definition Language (DDL)
40(1)
The Data Manipulation Language (DML)
40(2)
Fourth-Generation Languages (4GLs)
42(1)
Data Models and Conceptual Modeling
43(5)
Object-Based Data Models
44(1)
Record-Based Data Models
45(2)
Physical Data Models
47(1)
Conceptual Modeling
47(1)
Functions of a DBMS
48(5)
Components of a DBMS
53(3)
Multi-User DBMS Architectures
56(11)
Teleprocessing
56(1)
File-Server Architectures
56(1)
Traditional Two-Tier Client--Server Architecture
57(3)
Three-Tier Client--Server Architecture
60(2)
Transaction Processing Monitors
62(2)
Chapter Summary
64(1)
Review Questions
65(1)
Exercises
65(2)
Part 2 The Relational Model and Languages
67(212)
The Relational Model
69(19)
Brief History of the Relational Model
70(1)
Terminology
71(10)
Relational Data Structure
72(3)
Mathematical Relations
75(1)
Database Relations
76(1)
Properties of Relations
77(1)
Relational Keys
78(1)
Representing Relational Database Schemes
79(2)
Integrity Constraints
81(2)
Nulls
81(1)
Entity Integrity
82(1)
Referential Integrity
83(1)
General Constraints
83(1)
Views
83(5)
Terminology
84(1)
Purpose of Views
84(1)
Updating Views
85(1)
Chapter Summary
86(1)
Review Questions
87(1)
Exercises
87(1)
Relational Algebra and Relational Calculus
88(24)
The Relational Algebra
89(14)
Unary Operations
89(3)
Set Operations
92(3)
Join Operations
95(4)
Division Operation
99(1)
Aggregation and Grouping Operations
100(2)
Summary of the Relational Algebra Operations
102(1)
The Relational Calculus
103(6)
Tuple Relational Calculus
103(4)
Domain Relational Calculus
107(2)
Other Languages
109(3)
Chapter Summary
110(1)
Review Questions
110(1)
Exercises
111(1)
SQL: Data Manipulation
112(45)
Introduction to SQL
113(3)
Objectives of SQL
113(1)
History of SQL
114(2)
Importance of SQL
116(1)
Terminology
116(1)
Writing SQL Commands
116(1)
Data Manipulation
117(40)
Simple Queries
118(9)
Sorting Results (Order by Clause)
127(2)
Using the SQL Aggregate Functions
129(2)
Grouping Results (Group by Clause)
131(3)
Subqueries
134(4)
Any and All
138(1)
Multi-Table Queries
139(7)
Exists and Not Exists
146(1)
Combining Result Tables (Union, Intersect, Except)
147(2)
Database Updates
149(5)
Chapter Summary
154(1)
Review Questions
155(1)
Exercises
155(2)
SQL: Data Definition
157(41)
The ISO SQL Data Types
158(6)
SQL Identifiers
158(1)
SQL Scalar Data Types
159(1)
Exact Numeric Data
160(4)
Integrity Enhancement Feature
164(4)
Required Data
164(1)
Domain Constraints
164(2)
Entity Integrity
166(1)
Referential Integrity
166(1)
General Constraints
167(1)
Data Definition
168(8)
Creating a Database
168(1)
Creating a Table (Create Table)
169(4)
Changing a Table Definition (Alter Table)
173(1)
Removing a Table (Drop Table)
174(1)
Creating an Index (Create Index)
175(1)
Removing an Index (Drop Index)
176(1)
Views
176(11)
Creating a View (Create View)
177(2)
Removing a View (Drop View)
179(1)
View Resolution
180(1)
Restrictions on Views
181(1)
View Updatability
181(2)
With Check Option
183(1)
Advantages and Disadvantages of Views
184(2)
View Materialization
186(1)
Transactions
187(2)
Immediate and Deferred Integrity Constraints
189(1)
Discretionary Access Control
189(9)
Granting Privileges to Other Users (Grant)
191(1)
Revoking Privileges from Users (Revoke)
192(2)
Chapter Summary
194(1)
Review Questions
195(1)
Exercises
195(3)
Query-By-Example
198(27)
Introduction to Microsoft Office Access Queries
199(2)
Building Select Queries Using QBE
201(7)
Specifying Criteria
202(2)
Creating Multi-Table Queries
204(3)
Calculating Totals
207(1)
Using Advanced Queries
208(7)
Parameter Query
208(1)
Crosstab Query
209(3)
Find Duplicates Query
212(2)
Find Unmatched Query
214(1)
Autolookup Query
215(1)
Changing the Content of Tables Using Action Queries
215(10)
Make-Table Action Query
215(2)
Delete Action Query
217(1)
Update Action Query
217(4)
Append Action Query
221(3)
Exercises
224(1)
Commercial RDBMSs: Office Access and Oracle
225(54)
Microsoft Office Access 2003
226(16)
Objects
226(1)
Microsoft Office Access Architecture
227(1)
Table Definition
228(5)
Relationships and Referential Integrity Definition
233(1)
General Constraint Definition
234(2)
Forms
236(2)
Reports
238(1)
Macros
239(3)
Object Dependencies
242(1)
Oracle9i
242(37)
Objects
244(1)
Oracle Architecture
245(7)
Table Definition
252(3)
General Constraint Definition
255(1)
PL/SQL
255(6)
Subprograms, Stored Procedures, Functions, and Packages
261(2)
Triggers
263(4)
Oracle Internet Developer Suite
267(4)
Other Oracle Functionality
271(1)
Oracle 10g
271(5)
Chapter Summary
276(1)
Review Questions
277(2)
Part 3 Database Analysis and Design Techniques
279(156)
Database Planning, Design, and Administration
281(33)
The Information Systems Lifecycle
282(1)
The Database System Development Lifecycle
283(2)
Database Planning
285(1)
System Definition
286(2)
User Views
287(1)
Requirements Collection and Analysis
288(3)
Centralized Approach
289(1)
View Integration Approach
289(2)
Database Design
291(4)
Approaches to Database Design
291(1)
Data Modeling
292(1)
Phases of Database Design
293(2)
DBMS Selection
295(4)
Selecting the DBMS
296(3)
Application Design
299(4)
Transaction Design
300(1)
User Interface Design Guidelines
301(2)
Prototyping
303(1)
Implementation
304(1)
Data Conversion and Loading
305(1)
Testing
305(1)
Operational Maintenance
306(1)
Case Tools
307(2)
Data Administration and Database Administration
309(5)
Data Administration
309(1)
Database Administration
309(2)
Comparison of Data and Database Administration
311(1)
Chapter Summary
311(2)
Review Questions
313(1)
Exercises
313(1)
Fact-Finding Techniques
314(28)
When Are Fact-Finding Techniques Used?
315(1)
What Facts Are Collected?
316(1)
Fact-Finding Techniques
317(4)
Examining Documentation
317(1)
Interviewing
317(2)
Observing the Enterprise in Operation
319(1)
Research
319(1)
Questionnaires
320(1)
Using Fact-Finding Techniques -- A Worked Example
321(21)
The DreamHome Case Study -- An Overview
321(5)
The DreamHome Case Study -- Database Planning
326(5)
The DreamHome Case Study -- System Definition
331(1)
The DreamHome Case Study -- Requirements Collection and Analysis
332(8)
The DreamHome Case Study -- Database Design
340(1)
Chapter Summary
340(1)
Review Questions
341(1)
Exercises
341(1)
Entity--Relationship Modeling
342(29)
Entity Types
343(3)
Relationship Types
346(4)
Degree of Relationship Type
347(2)
Recursive Relationship
349(1)
Attributes
350(4)
Simple and Composite Attributes
351(1)
Single-Valued and Multi-Valued Attributes
351(1)
Derived Attributes
352(1)
Keys
352(2)
Strong and Weak Entity Types
354(1)
Attributes and Relationships
355(1)
Structural Constraints
356(8)
One-to-One (1:1) Relationships
357(1)
One-to-Many (1:*) Relationships
358(1)
Many-to-Many (*:*) Relationships
359(2)
Multiplicity for Complex Relationships
361(1)
Cardinality and Participation Constraints
362(2)
Problems with ER Models
364(7)
Fan Traps
364(1)
Chasm Traps
365(3)
Chapter Summary
368(1)
Review Questions
369(1)
Exercises
369(2)
Enhanced Entity--Relationship Modeling
371(16)
Specialization/Generalization
372(11)
Superclasses and Subclasses
372(1)
Superclass/Subclass Relationships
373(1)
Attribute Inheritance
374(1)
Specialization Process
374(1)
Generalization Process
375(3)
Constraints on Specialization/Generalization
378(1)
Worked Example of using Specialization/Generalization to Model the Branch View of DreamHome Case Study
379(4)
Aggregation
383(1)
Composition
384(3)
Chapter Summary
385(1)
Review Questions
386(1)
Exercises
386(1)
Normalization
387(28)
The Purpose of Normalization
388(1)
How Normalization Supports Database Design
389(1)
Data Redundancy and Update Anomalies
390(2)
Insertion Anomalies
391(1)
Deletion Anomalies
392(1)
Modification Anomalies
392(1)
Functional Dependencies
392(9)
Characteristics of Functional Dependencies
393(4)
Identifying Functional Dependencies
397(2)
Identifying the Primary Key for a Relation using Functional Dependencies
399(2)
The Process of Normalization
401(2)
First Normal Form (1NF)
403(4)
Second Normal Form (2NF)
407(1)
Third Normal Form (3NF)
408(3)
General Definitions of 2NF and 3NF
411(4)
Chapter Summary
412(1)
Review Questions
413(1)
Exercises
413(2)
Advanced Normalization
415(20)
More on Functional Dependencies
416(3)
Inference Rules for Functional Dependencies
416(2)
Minimal Sets of Functional Dependencies
418(1)
Boyce--Codd Normal Form (BCNF)
419(3)
Definition of Boyce--Codd Normal Form
419(3)
Review of Normalization up to BCNF
422(6)
Fourth Normal Form (4NF)
428(2)
Multi-Valued Dependency
428(2)
Definition of Fourth Normal Form
430(1)
Fifth Normal Form (5NF)
430(5)
Lossless-Join Dependency
430(1)
Definition of Fifth Normal Form
431(2)
Chapter Summary
433(1)
Review Questions
433(1)
Exercises
433(2)
Part 4 Methodology
435(104)
Methodology -- Conceptual Database Design
437(24)
Introduction to the Database Design Methodology
438(2)
What is a Design Methodology?
438(1)
Conceptual, Logical, and Physical Database Design
439(1)
Critical Success Factors in Database Design
440(1)
Overview of the Database Design Methodology
440(2)
Conceptual Database Design Methodology
442(19)
Step 1 Build Conceptual Data Model
442(16)
Chapter Summary
458(1)
Review Questions
459(1)
Exercises
460(1)
Methodology -- Logical Database Design for the Relational Model
461(33)
Logical Database Design Methodology for the Relational Model
462(32)
Step 2 Build and Validate Logical Data Model
462(28)
Chapter Summary
490(1)
Review Questions
491(1)
Exercises
492(2)
Methodology -- Physical Database Design for Relational Databases
494(25)
Comparison of Logical and Physical Database Design
495(1)
Overview of Physical Database Design Methodology
496(1)
The Physical Database Design Methodology for Relational Databases
497(22)
Step 3 Translate Logical Data Model for Target DBMS
497(4)
Step 4 Design File Organizations and Indexes
501(14)
Step 5 Design User Views
515(1)
Step 6 Design Security Mechanisms
516(1)
Chapter Summary
517(1)
Review Questions
517(1)
Exercises
518(1)
Methodology -- Monitoring and Tuning the Operational System
519(20)
Denormalizing and Introducing Controlled Redundancy
519(13)
Step 7 Consider the Introduction of Controlled Redundancy
519(13)
Monitoring the System to Improve Performance
532(7)
Step 8 Monitor and Tune the Operational System
532(5)
Chapter Summary
537(1)
Review Questions
537(1)
Exercise
537(2)
Part 5 Selected Database Issues
539(146)
Security
541(31)
Database Security
542(3)
Threats
543(2)
Countermeasures -- Computer-Based Controls
545(10)
Authorization
546(1)
Access Controls
547(3)
Views
550(1)
Backup and Recovery
550(1)
Integrity
551(1)
Encryption
551(1)
RAID (Redundant Array of Independent Disks)
552(3)
Security in Microsoft Office Access DBMS
555(3)
Security in Oracle DBMS
558(4)
DBMSs and Web Security
562(10)
Proxy Servers
563(1)
Firewalls
563(1)
Message Digest Algorithms and Digital Signatures
564(1)
Digital Certificates
564(1)
Kerberos
565(1)
Secure Sockets Layer and Secure HTTP
565(1)
Secure Electronic Transactions and Secure Transaction Technology
566(1)
Java Security
566(3)
ActiveX Security
569(1)
Chapter Summary
570(1)
Review Questions
571(1)
Exercises
571(1)
Transaction Management
572(58)
Transaction Support
573(4)
Properties of Transactions
575(1)
Database Architecture
576(1)
Concurrency Control
577(28)
The Need for Concurrency Control
577(3)
Serializability and Recoverability
580(7)
Locking Methods
587(7)
Deadlock
594(3)
Timestamping Methods
597(3)
Multiversion Timestamp Ordering
600(1)
Optimistic Techniques
601(1)
Granularity of Data Items
602(3)
Database Recovery
605(10)
The Need for Recovery
606(1)
Transactions and Recovery
607(2)
Recovery Facilities
609(3)
Recovery Techniques
612(3)
Recovery in a Distributed DBMS
615(1)
Advanced Transaction Models
615(7)
Nested Transaction Model
616(2)
Sagas
618(1)
Multilevel Transaction Model
619(1)
Dynamic Restructuring
620(1)
Workflow Models
621(1)
Concurrency Control and Recovery in Oracle
622(8)
Oracle's Isolation Levels
623(1)
Multiversion Read Consistency
623(2)
Deadlock Detection
625(1)
Backup and Recovery
625(1)
Chapter Summary
626(1)
Review Questions
627(1)
Exercises
628(2)
Query Processing
630(55)
Overview of Query Processing
631(4)
Query Decomposition
635(4)
Heuristical Approach to Query Optimization
639(7)
Transformation Rules for the Relational Algebra Operations
640(5)
Heuristical Processing Strategies
645(1)
Cost Estimation for the Relational Algebra Operations
646(19)
Database Statistics
646(1)
Selection Operation
647(7)
Join Operation
654(8)
Projection Operation
662(2)
The Relational Algebra Set Operations
664(1)
Enumeration of Alternative Execution Strategies
665(8)
Pipelining
665(1)
Linear Trees
666(1)
Physical Operators and Execution Strategies
667(1)
Reducing the Search Space
668(1)
Enumerating Left-Deep Trees
669(2)
Semantic Query Optimization
671(1)
Alternative Approaches to Query Optimization
672(1)
Distributed Query Optimization
672(1)
Query Optimization in Oracle
673(12)
Rule-Based and Cost-Based Optimization
673(4)
Histograms
677(1)
Viewing the Execution Plan
678(2)
Chapter Summary
680(1)
Review Questions
681(1)
Exercises
681(4)
Part 6 Distributed DBMSs and Replication
685(116)
Distributed DBMSs -- Concepts and Design
687(47)
Introduction
688(11)
Concepts
689(4)
Advantages and Disadvantages of DDBMSs
693(4)
Homogeneous and Heterogeneous DDBMSs
697(2)
Overview of Networking
699(4)
Functions and Architectures of a DDBMS
703(5)
Functions of a DDBMS
703(1)
Reference Architecture for a DDBMS
704(1)
Reference Architecture for a Federated MDBS
705(1)
Component Architecture for a DDBMS
706(2)
Distributed Relational Database Design
708(11)
Data Allocation
709(1)
Fragmentation
710(9)
Transparencies in a DDBMS
719(10)
Distribution Transparency
719(3)
Transaction Transparency
722(3)
Performance Transparency
725(3)
DBMS Transparency
728(1)
Summary of Transparencies in a DDBMS
728(1)
Date's Twelve Rules for a DDBMS
729(5)
Chapter Summary
731(1)
Review Questions
732(1)
Exercises
732(2)
Distributed DBMSs -- Advanced Concepts
734(46)
Distributed Transaction Management
735(1)
Distributed Concurrency Control
736(5)
Objectives
736(1)
Distributed Serializability
737(1)
Locking Protocols
738(2)
Timestamp Protocols
740(1)
Distributed Deadlock Management
741(3)
Distributed Database Recovery
744(14)
Failures in a Distributed Environment
744(1)
How Failures Affect Recovery
745(1)
Two-Phase Commit (2PC)
746(6)
Three-Phase Commit (3PC)
752(4)
Network Partitioning
756(2)
The X/Open Distributed Transaction Processing Model
758(3)
Distributed Query Optimization
761(11)
Data Localization
762(4)
Distributed Joins
766(1)
Global Optimization
767(5)
Distribution in Oracle
772(8)
Oracle's DDBMS Functionality
772(5)
Chapter Summary
777(1)
Review Questions
778(1)
Exercises
778(2)
Replication and Mobile Databases
780(21)
Introduction to Database Replication
781(1)
Benefits of Database Replication
781(2)
Applications of Replication
783(1)
Basic Components of Database Replication
783(1)
Database Replication Environments
784(4)
Synchronous Versus Asynchronous Replication
784(1)
Data Ownership
784(4)
Replication Servers
788(4)
Replication Server Functionality
788(1)
Implementation Issues
789(3)
Introduction to Mobile Databases
792(2)
Mobile DBMSs
794(1)
Oracle Replication
794(7)
Oracle's Replication Functionality
794(5)
Chapter Summary
799(1)
Review Questions
800(1)
Exercises
800(1)
Part 7 Object DBMSs
801(190)
Introduction to Object DBMSs
803(44)
Advanced Database Applications
804(5)
Weaknesses of RDBMSs
809(5)
Object-Oriented Concepts
814(11)
Abstraction, Encapsulation, and Information Hiding
814(1)
Objects and Attributes
815(1)
Object Identity
816(2)
Methods and Messages
818(1)
Classes
819(1)
Subclasses, Superclasses, and Inheritance
820(2)
Overriding and Overloading
822(1)
Polymorphism and Dynamic Binding
823(1)
Complex Objects
824(1)
Storing Objects in a Relational Database
825(3)
Mapping Classes to Relations
826(1)
Accessing Objects in the Relational Database
827(1)
Next-Generation Database Systems
828(2)
Object-Oriented Database Design
830(6)
Comparison of Object-Oriented Data Modeling and Conceptual Data Modeling
830(1)
Relationships and Referential Integrity
831(3)
Behavioral Design
834(2)
Object-Oriented Analysis and Design with UML
836(11)
UML Diagrams
837(5)
Usage of UML in the Methodology for Database Design
842(2)
Chapter Summary
844(1)
Review Questions
845(1)
Exercises
846(1)
Object--Oriented DBMSs -- Concepts
847(41)
Introduction to Object-Oriented Data Models and OODBMSs
849(11)
Definition of Object-Oriented DBMSs
849(1)
Functional Data Models
850(4)
Persistent Programming Languages
854(3)
The Object-Oriented Database System Manifesto
857(2)
Alternative Strategies for Developing an OODBMS
859(1)
OODBMS Perspectives
860(7)
Pointer Swizzling Techniques
862(3)
Accessing an Object
865(2)
Persistence
867(4)
Persistence Schemes
868(1)
Orthogonal Persistence
869(2)
Issues in OODBMSs
871(10)
Transactions
871(1)
Versions
872(1)
Schema Evolution
873(3)
Architecture
876(2)
Benchmarking
878(3)
Advantages and Disadvantages of OODBMSs
881(7)
Advantages
881(2)
Disadvantages
883(2)
Chapter Summary
885(1)
Review Questions
886(1)
Exercises
887(1)
Object-Oriented DBMSs -- Standards and Systems
888(47)
Object Management Group
889(8)
Background
889(2)
The Common Object Request Broker Architecture
891(3)
Other OMG Specifications
894(3)
Model-Driven Architecture
897(1)
Object Data Standard ODMG 3.0, 1999
897(24)
Object Data Management Group
897(3)
The Object Model
900(8)
The Object Definition Language
908(3)
The Object Query Language
911(6)
Other Parts of the ODMG Standard
917(3)
Mapping the Conceptual Design to a Logical (Object-Oriented) Design
920(1)
ObjectStore
921(14)
Architecture
921(3)
Building an ObjectStore Application
924(2)
Data Definition in ObjectStore
926(3)
Data Manipulation in ObjectStore
929(3)
Chapter Summary
932(2)
Review Questions
934(1)
Exercises
934(1)
Object--Relational DBMSs
935(56)
Introduction to Object-Relational Database Systems
936(3)
The Third-Generation Database Manifestos
939(4)
The Third-Generation Database System Manifesto
940(1)
The Third Manifesto
940(3)
Postgres -- An Early ORDBMS
943(3)
Objectives of Postgres
943(1)
Abstract Data Types
943(1)
Relations and Inheritance
944(2)
Object Identity
946(1)
SQL: 1999 and SQL:2003
946(28)
Row Types
947(1)
User-Defined Types
948(3)
Subtypes and Supertypes
951(2)
User-Defined Routines
953(2)
Polymorphism
955(1)
Reference Types and Object Identity
956(1)
Creating Tables
957(3)
Querying Data
960(1)
Collection Types
961(4)
Typed Views
965(1)
Persistent Stored Modules
966(1)
Triggers
967(4)
Large Objects
971(1)
Recursion
972(2)
Query Processing and Optimization
974(4)
New Index Types
977(1)
Object-Oriented Extensions in Oracle
978(8)
User-Defined Data Types
978(6)
Manipulating Object Tables
984(1)
Object Views
985(1)
Privileges
986(1)
Comparison of ORDBMS and OODBMS
986(5)
Chapter Summary
988(1)
Review Questions
988(1)
Exercises
989(2)
Part 8 Web and DBMSs
991(156)
Web Technology and DBMSs
993(72)
Introduction to the Internet and Web
994(4)
Intranets and Extranets
996(1)
e-Commerce and e-Business
997(1)
The Web
998(13)
HyperText Transfer Protocol
999(2)
HyperText Markup Language
1001(1)
Uniform Resource Locators
1002(2)
Static and Dynamic Web Pages
1004(1)
Web Services
1004(1)
Requirements for Web--DBMS Integration
1005(1)
Advantages and Disadvantages of the Web-DBMS Approach
1006(5)
Approaches to Integrating the Web and DBMSs
1011(1)
Scripting Languages
1011(3)
JavaScript and JScript
1012(1)
VBScript
1012(1)
Perl and PHP
1013(1)
Common Gateway Interface
1014(5)
Passing Information to a CGI Script
1016(2)
Advantages and Disadvantages of CGI
1018(1)
HTTP Cookies
1019(1)
Extending the Web Server
1020(1)
Comparison of CGI and API
1021(1)
Java
1021(22)
JDBC
1025(5)
SQLJ
1030(1)
Comparison of JDBC and SQLJ
1030(1)
Container-Managed Persistence (CMP)
1031(4)
Java Data Objects (JDO)
1035(5)
Java Servlets
1040(1)
JavaServer Pages
1041(1)
Java Web Services
1042(1)
Microsoft's Web Platform
1043(12)
Universal Data Access
1045(1)
Active Server Pages and ActiveX Data Objects
1046(3)
Remote Data Services
1049(1)
Comparison of ASP and JSP
1049(1)
Microsoft .NET
1050(4)
Microsoft Web Services
1054(1)
Microsoft Office Access and Web Page Generation
1054(1)
Oracle Internet Platform
1055(10)
Oracle Application Server (OracleAS)
1056(6)
Chapter Summary
1062(1)
Review Questions
1063(1)
Exercises
1064(1)
Semistructured Data and XML
1065(82)
Semistructured Data
1066(7)
Object Exchange Model (OEM)
1068(1)
Lore and Lorel
1069(4)
Introduction to XML
1073(9)
Overview of XML
1076(2)
Document Type Definitions (DTDs)
1078(4)
XML-Related Technologies
1082(9)
DOM and SAX Interfaces
1082(1)
Namespaces
1083(1)
XSL and XSLT
1084(1)
XPath (XML Path Language)
1085(1)
XPointer (XML Pointer Language)
1085(1)
XLink (XML Linking Language)
1086(1)
XHTML
1087(1)
Simple Object Access Protocol (SOAP)
1087(1)
Web Services Description Language (WSDL)
1088(1)
Universal Discovery, Description and Integration (UDDI)
1088(3)
XML Schema
1091(9)
Resource Description Framework (RDF)
1098(2)
XML Query Languages
1100(28)
Extending Lore and Lorel to Handle XML
1100(1)
XML Query Working Group
1101(2)
XQuery -- A Query Language for XML
1103(11)
XML Information Set
1114(1)
XQuery 1.0 and XPath 2.0 Data Model
1115(6)
Formal Semantics
1121(7)
XML and Databases
1128(11)
Storing XML in Databases
1129(3)
XML and SQL
1132(5)
Native XML Databases
1137(2)
XML in Oracle
1139(8)
Chapter Summary
1142(2)
Review Questions
1144(1)
Exercises
1145(2)
Part 9 Business Intelligence
1147(100)
Data Warehousing Concepts
1149(32)
Introduction to Data Warehousing
1150(6)
The Evolution of Data Warehousing
1150(1)
Data Warehousing Concepts
1151(1)
Benefits of Data Warehousing
1152(1)
Comparison of OLTP Systems and Data Warehousing
1153(1)
Problems of Data Warehousing
1154(2)
Data Warehouse Architecture
1156(5)
Operational Data
1156(1)
Operational Data Store
1157(1)
Load Manager
1158(1)
Warehouse Manager
1158(1)
Query Manager
1158(1)
Detailed Data
1159(1)
Lightly and Highly Summarized Data
1159(1)
Archive/Backup Data
1159(1)
Metadata
1159(1)
End-User Access Tools
1160(1)
Data Warehouse Data Flows
1161(4)
Inflow
1162(1)
Upflow
1163(1)
Downflow
1164(1)
Outflow
1164(1)
Metaflow
1165(1)
Data Warehousing Tools and Technologies
1165(6)
Extraction, Cleansing, and Transformation Tools
1165(1)
Data Warehouse DBMS
1166(3)
Data Warehouse Metadata
1169(2)
Administration and Management Tools
1171(1)
Data Marts
1171(4)
Reasons for Creating a Data Mart
1173(1)
Data Marts Issues
1173(2)
Data Warehousing Using Oracle
1175(6)
Oracle9i
1175(3)
Chapter Summary
1178(2)
Review Questions
1180(1)
Exercise
1180(1)
Data Warehousing Design
1181(23)
Designing a Data Warehouse Database
1182(1)
Dimensionality Modeling
1183(4)
Comparison of DM and ER models
1186(1)
Database Design Methodology for Data Warehouses
1187(8)
Criteria for Assessing the Dimensionality of a Data Warehouse
1195(1)
Data Warehousing Design Using Oracle
1196(8)
Oracle Warehouse Builder Components
1197(1)
Using Oracle Warehouse Builder
1198(4)
Chapter Summary
1202(1)
Review Questions
1203(1)
Exercises
1203(1)
OLAP
1204(28)
Online Analytical Processing
1205(1)
OLAP Benchmarks
1206(1)
OLAP Applications
1206(3)
OLAP Benefits
1208(1)
Representation of Multi-Dimensional Data
1209(2)
OLAP Tools
1211(6)
Codd's Rules for OLAP Tools
1211(3)
Categories of OLAP Tools
1214(3)
OLAP Extensions to the SQL Standard
1217(7)
Extended Grouping Capabilities
1218(4)
Elementary OLAP Operators
1222(2)
Oracle OLAP
1224(8)
Oracle OLAP Environment
1225(1)
Platform for Business Intelligence Applications
1225(1)
Oracle9i Database
1226(2)
Oracle OLAP
1228(1)
Performance
1229(1)
System Management
1229(1)
System Requirements
1230(1)
Chapter Summary
1230(1)
Review Questions
1231(1)
Exercises
1231(1)
Data Mining
1232(15)
Data Mining
1233(1)
Data Mining Techniques
1233(6)
Predictive Modeling
1235(1)
Database Segmentation
1236(1)
Link Analysis
1237(1)
Deviation Detection
1238(1)
The Data Mining Process
1239(2)
The CRISP-DM Model
1239(2)
Data Mining Tools
1241(1)
Data Mining and Data Warehousing
1242(1)
Oracle Data Mining (ODM)
1242(5)
Data Mining Capabilities
1242(1)
Enabling Data Mining Applications
1243(1)
Predictions and Insights
1243(1)
Oracle Data Mining Environment
1243(2)
Chapter Summary
1245(1)
Review Questions
1246(1)
Exercises
1246(1)
Appendices
1247(85)
A Users' Requirements Specification for DreamHome Case Study
1249(6)
A.1 Branch User Views of DreamHome
1249(1)
A.1.1 Data Requirements
1249(2)
A.1.2 Transaction Requirements (Sample)
1251(1)
A.2 Staff User Views of DreamHome
1252(1)
A.2.1 Data Requirements
1252(1)
A.2.2 Transaction Requirements (Sample)
1253(2)
B Other Case Studies
1255(13)
B.1 The University Accommodation Office Case Study
1255(1)
B.1.1 Data Requirements
1255(2)
B.1.2 Query Transactions (Sample)
1257(1)
B.2 The EasyDrive School of Motoring Case Study
1258(1)
B.2.1 Data Requirements
1258(1)
B.2.2 Query Transactions (Sample)
1259(1)
B.3 The Wellmeadows Hospital Case Study
1260(1)
B.3.1 Data Requirements
1260(6)
B.3.2 Transaction Requirements (Sample)
1266(2)
C File Organizations and Indexes
1268(25)
C.1 Basic Concepts
1269(1)
C.2 Unordered Files
1270(1)
C.3 Ordered Files
1271(1)
C.4 Hash Files
1272(3)
C.4.1 Dynamic Hashing
1275(1)
C.4.2 Limitations of Hashing
1276(1)
C.5 Indexes
1277(1)
C.5.1 Types of Index
1277(1)
C.5.2 Indexed Sequential Files
1278(1)
C.5.3 Secondary Indexes
1279(1)
C.5.4 Multilevel Indexes
1280(1)
C.5.5 B+-trees
1280(3)
C.5.6 Bitmap Indexes
1283(1)
C.5.7 Join Indexes
1284(2)
C.6 Clustered and Non-Clustered Tables
1286(1)
C.6.1 Indexed Clusters
1286(1)
C.6.2 Hash Clusters
1287(1)
C.7 Guidelines for Selecting File Organizations
1288(3)
Appendix Summary
1291(2)
D When is a DBMS Relational?
1293(5)
E Programmatic SQL
1298(22)
E.1 Embedded SQL
1299(1)
E.1.1 Simple Embedded SQL Statements
1299(2)
E.1.2 SQL Communications Area
1301(2)
E.1.3 Host Language Variables
1303(1)
E.1.4 Retrieving Data Using Embedded SQL and Cursors
1304(6)
E.1.5 Using Cursors to Modify Data
1310(1)
E.1.6 ISO Standard for Embedded SQL
1311(1)
E.2 Dynamic SQL
1312(1)
E.3 The Open Database Connectivity (ODBC) Standard
1313(1)
E.3.1 The ODBC Architecture
1314(1)
E.3.2 ODBC Conformance Levels
1315(3)
Appendix Summary
1318(1)
Review Questions
1319(1)
Exercises
1319(1)
F Alternative ER Modeling Notations
1320(6)
F.1 ER Modeling Using the Chen Notation
1320(1)
F.2 ER Modeling Using the Crow's Feet Notation
1320(6)
G Summary of the Database Design Methodology for Relational Databases
1326(6)
References 1332(13)
Further Reading 1345(11)
Index 1356


Please wait while the item is added to your cart...