Stevens, W. Richard.

UNIX network programming: the sockets networking API / edited by W. Richard Stevens,Bill Fenner and Andrew M. Rudoff - 3rd ed. - Upper Saddle River, NJ : Prentice Hall PTR, 2004 - xxiii.991 p. ill. ; 25 cm.

Chapter 1 An Overview of Database Management
1.1 Introduction
1.2 What Is a Database System?
1.3 What Is a Database?
1.4 Why Database?
Data Independence
1.6 Relatipnal Systems and Others
1.7 Summary
Exercises
References and Bibliography
Chapter 2 Database System Architecture
2.1 Introduction
2.2 The Three Levels of the Architecture
2.3 The External Level
2.4 The Conceptual Level
2.5 The Internal Level
2.6 Mappings
2.7 The Database Administrator
The Database Management System
2.9 Client/Server Architecture
2.10 Utilities
2.11 Distributed Processing
2.12 Summary
Exercises
References and Bibliography
Chapter 3 An Introduction to Relational Databases
3.1 Introduction
3.2 An Informal Look at the Relational Model
3.3 The Catalog
3.4 Base Tables and Views
3.5 Transactions
3.6 The Suppliers-and-Parts Database
3.7 Summary
Exercises
References and Bibliography
Chapter 4 -An Introduction to SQL
4.1 Introduction
4.2 Overview
4.3 The Cat^og
4.4 Views
4.5 Transactions
4.6 Embedded SQL
4.7 Dynamic SQL and SQL/CLI
4.8 SQL Is Not Perfect
4.9 Summary
Exercises
References and Bibliography
Chapter 5 TYPES
5.1 Iiitroduction.
5.2 Values vs. Variables
5.3 Type Generators
5.4 SQL Facilities
5.5 Summary
Exercises
References and Bibliography
Chapter 6 Relations
6.1 Introduction
6.2 Tuples
6.3 Relation Types
6.4 Relation Values
6.5 Relation Variables
6.6 SQL Facilities
6.7 Summary
Exercises
References and Bibliography
Chapter 7 Relational Algebra
7.1 Introduction
7.2 Closure Revisited
7.3 Relational Operators
7.4 Examples
7.5 What Is the Algebra For?
7.6 Further Points
7.7 Summary
Exercises
References and Bibliography
Chapter 8 Relational Calculus
8.1 Introduction
8.2 Tuple Calculus
8.3 Examples
8.4 Calculus vs. Algebra
8.5 Computational Capabilities
8.6 SQL Facilities
8.7 Domain Calculus
8.8 Query-By-Example
8.9 Summary
Exercises
References and Bibliography
Chapter 9 Integrity
9.1 Introduction
9.2 Internal vs. External Predicates
9.3 Correctness vs. Consistency
9.4 Integrity and Views
9.5 A Constraint Classification Scheme
9.6 Keys
9.7 Triggers (A Digression)
9.8 SQL Facilities
9.9 Summary
Exercises
References and Bibliography
Chapter 10 Views
10.1 Introduction
10.2 What Are Views For?
10.3 View Retrievals
10.4 View Updates
10.5 SQL Facilities
10.6 Summary
Exercises
References and Bibliography
Chapter 11 Functional Dependencies
11.1 Introduction
11.2 Basic Definitions
11.3 Trivial and Nontrivial Dependencies
11.4 Closure of a Set of Dependencies
11.5 Closure of a Set of Attributes
11.6 Irreducible Sets of Dependencies
11.7 Sununary
Exercises
References and Bibliography
Chapter 12 Further Normalization I: INF, 2NF, 3NF, BCNF
12.1 Introduction
12.2 Nonloss Decomposition and Functional Dependencies
12.3 First, Second, and Third Normal Forms
12.4 Dependency Preservation
12.5 Boyce/Codd Normal Form
12.6 A Note on Relation-Valued Attributes
12.7 Summary
Exercises
References and Bibliography
Chapter 13 Further Normalization 11: Higher Normal Forms
13.1 Introduction
13.2 Multi-valued Dependencies and Fourth Normal Form
13.3 Join Dependencies and Fifth Normal Form
13.4 The Normalization Procedure Summarized
13.5 A Note on Denormalization
13.6 Orthogonal Design (A Digression)
13.7 Other Normal Forms
13.8 Summary
Exercises
References and Bibliography
Chapter 14 Semantic Modeling
14.1 Introduction
14.2 The Overall Approach
14.3 The E/R Model
14.4 E/R Diagrams
14.5 Database Design with the E/R Model
14.6 A Brief Analysis
14.7 Summary
Exercises
References and Bibliography
Chapter 15 Recovery
15.1 Introduction
15.2 Transactions
15.3 Transaction Recovery
15.4 System Recovery
15.5 Two-Phase Commit
15.6 Savepoints (A Digression)
15.7 SQL Facilities
15.8 Summary
Exercises
References and Bibliography
Chapter 16 Concurrency
16.1 Introduction
16.2 Three Concurrency Problems
16.3 Locking 388
16.4 The Three Concurrency Problems Revisited
16.5 Deadlock
16.6 Serializability
16.7 Recovery Revisited
16.8 Isolation Levels
16.9 Intent Locking
16.10 Dropping ACID
16.11 SQL Facilities 408
16.12 Summary 409
Exercises 410
References and Bibliography
412
Chapter 17 Security
17.1 Introduction
17.2 Discretionary Access Control
17.3 Mandatory Access Control
17.4 Statistical Databases
17.5 Data Encryption
17.6 SQL Facilities
17.7 Summary
Exercises
References and Bibliography
Chapter 18 Optimization
18.1 Introduction
18.2 A Motivating Example
18.3 An Overview of Query Processing
18.4 Expression Transformation
18.5 Database Statistics
18.6 A Divide-and-Conquer Strategy
18.7 Implementing the Relational Operators
18.8 Summary
Exercises
References and Bibliography
Chapter 19 Missing Information
19.1 Introduction
- 19.2 An Overview of the 3VL Approach
Contents xix
19.3
19.4
19.5
19.6
19.7
19.8
Some Consequences of the Foregoing Scheme
Nulls and Keys
Outer Join (A Digression)
Special Values
SQL Facilities
Summary
Exercises
References and Bibliography
Chapter 20 Type Inheritance
20.1
20.2
20.3
20.4
20.5
20.6
20.7
20.8
20.9
20.10
20.11
Introduction
Type Hierarchies
Polymorphism and Substitutability
Variables and Assignments
Specialization by Constraint
Comparisons
Operators, Versions, and Signatures
Is a Circle an Ellipse?
Specialization by Constraint Revisited
SQL Facilities
Summary
Exercises
References and Bibliography
Chapter 21 Distributed Databases
21.1
21.2
21.3
21.4
21.5
21.6
21.7
21.8
Introduction
Some Preliminaries
The Twelve Objectives
Problems of Distributed Systems
Client/Server Systems
DBMS Independence
SQL Facilities )
Summary
Exercises
References and Bibliography
Chapter 22 Dedsion Support
22.1 Introduction
22.2 Aspeas of Decision Support
22.3 Database Design for Decision Support
22.4 Data Preparation 599
22.5 Data Warehouses and Data Marts
22.6 Online Analytical Processing
22.7 Data Mining
22.8 SQL Facilities
22.9 Summary
Exercises
References and Bibliography
Chapter 23 Temporal Databases
23.1 Introduction
23.2 What Is the Problem?
23.3 Intervals
23.4 Packing and Unpacking Relations
23.5 Generalizing the Relational Operators
23.6 Database Design
23.7 Integrity Constraints
23.8 Summary
Exercises
References and Bibliography
Chapter 24 Logic-Based Databases
24.1 Introduction
24.2 Overview
24.3 Propositional Calculus
24.4 Predicate Calculus
24.5 A Proof-Theoretic View of Databases
24.6 Deductive Database Systems
24.7 Recursive Query Processing
24.8 Summary
Exercises
References and Bibliography
Chapter 25 Object Databases
25.1 Introduction
25.2 Objects, Classes, Methods, and Messages
25.3 A Closer Look
25.4 A Cradle-to-Grave Example
25.5 Miscellaneous Issues
25.6 Sununary
Exercises
References and Bibliography
Chapter 26 Object/Relational Databases
26.1 Introduction
26.2 The First Great Blunder
26.3 The Second Great Blunder
26.4 Implementation Issues
26.5 Benefits of True Rapprochement
26.6 SQL Facilities
26.7 Summary
Exercises
References and Bibliography
Chapter 27 The World Wide Web and XML
27.1 Introduction
27.2 The Web and the Internet
27.3 An Overview of XML
27.4 XML Data Definition
27.5 XML Data Manipulation
27.6 XML and Databases
27.7 SQL Facilities
27.8 Summary
Exercises
References and Bibliography

9788120328235 (pb)


Computer Networks.
Internet Programming.

005.7/12768