Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent Fundamentals of Database Management Systems, 2nd Edition [ISBN: 9780470624708] for the semester, quarter, and short term or search our site for other textbooks by Gillenson, Mark L.. Renting a textbook can save you up to 90% from the cost of buying.
Preface | p. xiii |
About the Author | p. xvii |
Data: The New Corporate Resource | p. 1 |
Introduction | p. 2 |
The History of Data | p. 2 |
The Origins of Data | p. 2 |
Data Through the Ages | p. 5 |
Early Data Problems Spawn Calculating Devices | p. 7 |
Swamped with Data | p. 8 |
Modern Data Storage Media | p. 9 |
Data in Today's Information Systems Environment | p. 12 |
Using Data for Competitive Advantage | p. 12 |
Problems in Storing and Accessing Data | p. 12 |
Data as a Corporate Resource | p. 13 |
The Database Environment | p. 14 |
Summary | p. 15 |
Data Modeling | p. 19 |
Introduction | p. 20 |
Binary Relationships | p. 20 |
What is a Binary Relationship? | p. 20 |
Cardinality | p. 23 |
Modality | p. 24 |
More About Many-to-Many Relationships | p. 25 |
Unary Relationships | p. 28 |
One-to-One Unary Relationship | p. 28 |
One-to-Many Unary Relationship | p. 29 |
Many-to-Many Unary Relationship | p. 29 |
Ternary Relationships | p. 31 |
Example: The General Hardware Company | p. 31 |
Example: Good Reading Book Stores | p. 34 |
Example: World Music Association | p. 35 |
Example: Lucky Rent-A-Car | p. 36 |
Summary | p. 37 |
The Database Management System Concept | p. 41 |
Introduction | p. 42 |
Data Before Database Management | p. 43 |
Records and Files | p. 43 |
Basic Concepts in Storing and Retrieving Data | p. 46 |
The Database Concept | p. 48 |
Data as a Manageable Resource | p. 48 |
Data Integration and Data Redundancy | p. 49 |
Multiple Relationships | p. 56 |
Data Control Issues | p. 58 |
Data Independence | p. 60 |
DBMS Approaches | p. 60 |
Summary | p. 63 |
Relational Data Retrieval: Sql | p. 67 |
Introduction | p. 68 |
Data Retrieval with the SQL SELECT Command | p. 68 |
Introduction to the SQL SELECT Command | p. 68 |
Basic Functions | p. 70 |
Built-In Functions | p. 81 |
Grouping Rows | p. 83 |
The Join | p. 85 |
Subqueries | p. 86 |
A Strategy for Writing SQL SELECT Commands | p. 89 |
Example: Good Reading Book Stores | p. 90 |
Example: World Music Association | p. 92 |
Example: Lucky Rent-A-Car | p. 95 |
Relational Query Optimizer | p. 97 |
Relational DBMS Performance | p. 97 |
Relational Query Optimizer Concepts | p. 97 |
Summary | p. 99 |
The Relational Database Model: | |
Introduction | p. 105 |
Introduction | p. 106 |
The Relational Database Concept | p. 106 |
Relational Terminology | p. 106 |
Primary and Candidate Keys | p. 109 |
Foreign Keys and Binary Relationships | p. 111 |
Data Retrieval from a Relational Database | p. 124 |
Extracting Data from a Relation | p. 124 |
The Relational Select Operator | p. 125 |
The Relational Project Operator | p. 125 |
Combination of the Relational Select and Project Operators | p. 126 |
Extracting Data Across Multiple Relations: Data Integration | p. 127 |
Example: Good Reading Book Stores | p. 129 |
Example: World Music Association | p. 130 |
Example: Lucky Rent-A-Car | p. 132 |
Summary | p. 132 |
The Relational Database Model: Additional Concepts | p. 137 |
Introduction | p. 138 |
Relational Structures for Unary and Ternary Relationships | p. 139 |
Unary One-to-Many Relationships | p. 139 |
Unary Many-to-Many Relationships | p. 143 |
Ternary Relationships | p. 146 |
Referential Integrity | p. 150 |
The Referential Integrity Concept | p. 150 |
Three Delete Rules | p. 152 |
Summary | p. 153 |
Logical Database Design | p. 157 |
Introduction | p. 158 |
Converting E-R Diagrams into Relational Tables | p. 158 |
Introduction | p. 158 |
Converting a Simple Entity | p. 158 |
Converting Entities in Binary Relationships | p. 160 |
Converting Entities in Unary Relationships | p. 164 |
Converting Entities in Ternary Relationships | p. 166 |
Designing the General Hardware Co. Database | p. 166 |
Designing the Good Reading Bookstores Database | p. 170 |
Designing the World Music Association Database | p. 171 |
Designing the Lucky Rent-A-Car Database | p. 173 |
The Data Normalization Process | p. 174 |
Introduction to the Data Normalization Technique | p. 175 |
Steps in the Data Normalization Process | p. 177 |
Example: General Hardware Co | p. 185 |
Example: Good Reading Bookstores | p. 186 |
Example: World Music Association | p. 188 |
Example: Lucky Rent-A-Car | p. 188 |
Testing Tables Converted from E-R Diagrams with Data Normalization | p. 189 |
Building the Data Structure with SQL | p. 191 |
Manipulating the Data with SQL | p. 192 |
Summary | p. 193 |
Physical Database Design | p. 199 |
Introduction | p. 200 |
Disk Storage | p. 202 |
The Need for Disk Storage | p. 202 |
How Disk Storage Works | p. 203 |
File Organizations and Access Methods | p. 207 |
The Goal: Locating a Record | p. 207 |
The Index | p. 207 |
Hashed Files | p. 215 |
Inputs to Physical Database Design | p. 218 |
The Tables Produced by the Logical Database Design Process | p. 219 |
Business Environment Requirements | p. 219 |
Data Characteristics | p. 219 |
Application Characteristics | p. 220 |
Operational Requirements: Data Security, Backup, and Recovery | p. 220 |
Physical Database Design Techniques | p. 221 |
Adding External Features | p. 221 |
Reorganizing Stored Data | p. 224 |
Splitting a Table into Multiple Tables | p. 226 |
Changing Attributes in a Table | p. 227 |
Adding Attributes to a Table | p. 228 |
Combining Tables | p. 230 |
Adding New Tables | p. 232 |
Example: Good Reading Book Stores | p. 233 |
Example: World Music Association | p. 234 |
Example: Lucky Rent-A-Car | p. 235 |
Summary | p. 237 |
Object-Oriented Database Management | p. 247 |
Introduction | p. 248 |
Terminology | p. 250 |
Complex Relationships | p. 251 |
Generalization | p. 251 |
Inheritance of Attributes | p. 253 |
Operations, Inheritance of Operations, and Polymorphism | p. 254 |
Aggregation | p. 255 |
The General Hardware Co. Class Diagram | p. 256 |
The Good Reading Bookstores Class Diagram | p. 256 |
The World Music Association Class Diagram | p. 259 |
The Lucky Rent-A-Vehicle Class Diagram | p. 260 |
Encapsulation | p. 260 |
Abstract Data Types | p. 262 |
Object/Relational Database | p. 263 |
Summary | p. 264 |
Data Administration, Database Administration, And Data Dictionaries | p. 269 |
Introduction | p. 270 |
The Advantages of Data and Database Administration | p. 271 |
Data as a Shared Corporate Resource | p. 271 |
Efficiency in Job Specialization | p. 272 |
Operational Management of Data | p. 273 |
Managing Externally Acquired Databases | p. 273 |
Managing Data in the Decentralized Environment | p. 274 |
The Responsibilities of Data Administration | p. 274 |
Data Coordination | p. 274 |
Data Planning | p. 275 |
Data Standards | p. 275 |
Liaison to Systems Analysts and Programmers | p. 276 |
Training | p. 276 |
Arbitration of Disputes and Usage Authorization | p. 277 |
Documentation and Publicity | p. 277 |
Data's Competitive Advantage | p. 277 |
The Responsibilities of Database Administration | p. 278 |
DBMS Performance Monitoring | p. 278 |
DBMS Troubleshooting | p. 278 |
DBMS Usage and Security Monitoring | p. 279 |
Data Dictionary Operations | p. 279 |
DBMS Data and Software Maintenance | p. 280 |
Database Design | p. 280 |
Data Dictionaries | p. 281 |
Introduction | p. 281 |
A Simple Example of Metadata | p. 282 |
Passive and Active Data Dictionaries | p. 284 |
Relational DBMS Catalogs | p. 287 |
Data Repositories | p. 287 |
Summary | p. 287 |
Database Control Issues: Security, Backup And Recovery, Concurrency | p. 291 |
Introduction | p. 292 |
Data Security | p. 293 |
The Importance of Data Security | p. 293 |
Types of Data Security Breaches | p. 294 |
Methods of Breaching Data Security | p. 294 |
Types of Data Security Measures | p. 296 |
Backup and Recovery | p. 303 |
The Importance of Backup and Recovery | p. 303 |
Backup Copies and Journals | p. 303 |
Forward Recovery | p. 304 |
Backward Recovery | p. 305 |
Duplicate or ''Mirrored'' Databases | p. 306 |
Disaster Recovery | p. 306 |
Concurrency Control | p. 308 |
The Importance of Concurrency Control | p. 308 |
The Lost Update Problem | p. 308 |
Locks and Deadlock | p. 309 |
Versioning | p. 310 |
Summary | p. 311 |
Client/Server Database And Distributed Database | p. 315 |
Introduction | p. 316 |
Client/Server Databases | p. 316 |
Distributed Database | p. 321 |
The Distributed Database Concept | p. 321 |
Concurrency Control in Distributed Databases | p. 325 |
Distributed Joins | p. 327 |
Partitioning or Fragmentation | p. 329 |
Distributed Directory Management | p. 330 |
Distributed DBMSs: Advantages and Disadvantages | p. 331 |
Summary | p. 332 |
The Data Warehouse | p. 335 |
Introduction | p. 336 |
The Data Warehouse Concept | p. 338 |
The Data is Subject Oriented | p. 338 |
The Data is Integrated | p. 339 |
The Data is Non-Volatile | p. 339 |
The Data is Time Variant | p. 339 |
The Data Must Be High Quality | p. 340 |
The Data May Be Aggregated | p. 340 |
The Data is Often Denormalized | p. 340 |
The Data is Not Necessarily Absolutely Current | p. 341 |
Types of Data Warehouses | p. 341 |
The Enterprise Data Warehouse (EDW) | p. 342 |
The Data Mart (DM) | p. 342 |
Which to Choose: The EDW, the DM, or Both? | p. 342 |
Designing a Data Warehouse | p. 343 |
Introduction | p. 343 |
General Hardware Co. Data Warehouse | p. 344 |
Good Reading Bookstores Data Warehouse | p. 348 |
Lucky Rent-A-Car Data Warehouse | p. 350 |
What About a World Music Association Data Warehouse? | p. 351 |
Building a Data Warehouse | p. 352 |
Introduction | p. 352 |
Data Extraction | p. 352 |
Data Cleaning | p. 354 |
Data Transformation | p. 356 |
Data Loading | p. 356 |
Using a Data Warehouse | p. 357 |
On-Line Analytic Processing | p. 357 |
Data Mining | p. 357 |
Administering a Data Warehouse | p. 360 |
Challenges in Data Warehousing | p. 361 |
Summary | p. 362 |
Databases And The Internet | p. 365 |
Introduction | p. 366 |
Database Connectivity Issues | p. 367 |
Expanded Set of Data Types | p. 373 |
Database Control Issues | p. 374 |
Performance | p. 374 |
Availability | p. 375 |
Scalability | p. 376 |
Security and Privacy | p. 376 |
Data Extraction into XML | p. 379 |
Summary | p. 381 |
Index | p. 385 |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.