TY - BOOK AU - Stevens,W.Richard TI - UNIX network programming: the sockets networking API SN - 9788120328235 (pb) U1 - 005.7/12768 PY - 2004/// CY - Upper Saddle River, NJ PB - Prentice Hall PTR KW - Computer Networks KW - Internet Programming N1 - Chapter 1 An Overview of Database Management 1.1 Introduction 1.2 What Is a Database System? 1.3 What Is a Database? 1.4 Why Database? Data Independence 1.6 Relatipnal Systems and Others 1.7 Summary Exercises References and Bibliography Chapter 2 Database System Architecture 2.1 Introduction 2.2 The Three Levels of the Architecture 2.3 The External Level 2.4 The Conceptual Level 2.5 The Internal Level 2.6 Mappings 2.7 The Database Administrator The Database Management System 2.9 Client/Server Architecture 2.10 Utilities 2.11 Distributed Processing 2.12 Summary Exercises References and Bibliography Chapter 3 An Introduction to Relational Databases 3.1 Introduction 3.2 An Informal Look at the Relational Model 3.3 The Catalog 3.4 Base Tables and Views 3.5 Transactions 3.6 The Suppliers-and-Parts Database 3.7 Summary Exercises References and Bibliography Chapter 4 -An Introduction to SQL 4.1 Introduction 4.2 Overview 4.3 The Cat^og 4.4 Views 4.5 Transactions 4.6 Embedded SQL 4.7 Dynamic SQL and SQL/CLI 4.8 SQL Is Not Perfect 4.9 Summary Exercises References and Bibliography Chapter 5 TYPES 5.1 Iiitroduction. 5.2 Values vs. Variables 5.3 Type Generators 5.4 SQL Facilities 5.5 Summary Exercises References and Bibliography Chapter 6 Relations 6.1 Introduction 6.2 Tuples 6.3 Relation Types 6.4 Relation Values 6.5 Relation Variables 6.6 SQL Facilities 6.7 Summary Exercises References and Bibliography Chapter 7 Relational Algebra 7.1 Introduction 7.2 Closure Revisited 7.3 Relational Operators 7.4 Examples 7.5 What Is the Algebra For? 7.6 Further Points 7.7 Summary Exercises References and Bibliography Chapter 8 Relational Calculus 8.1 Introduction 8.2 Tuple Calculus 8.3 Examples 8.4 Calculus vs. Algebra 8.5 Computational Capabilities 8.6 SQL Facilities 8.7 Domain Calculus 8.8 Query-By-Example 8.9 Summary Exercises References and Bibliography Chapter 9 Integrity 9.1 Introduction 9.2 Internal vs. External Predicates 9.3 Correctness vs. Consistency 9.4 Integrity and Views 9.5 A Constraint Classification Scheme 9.6 Keys 9.7 Triggers (A Digression) 9.8 SQL Facilities 9.9 Summary Exercises References and Bibliography Chapter 10 Views 10.1 Introduction 10.2 What Are Views For? 10.3 View Retrievals 10.4 View Updates 10.5 SQL Facilities 10.6 Summary Exercises References and Bibliography Chapter 11 Functional Dependencies 11.1 Introduction 11.2 Basic Definitions 11.3 Trivial and Nontrivial Dependencies 11.4 Closure of a Set of Dependencies 11.5 Closure of a Set of Attributes 11.6 Irreducible Sets of Dependencies 11.7 Sununary Exercises References and Bibliography Chapter 12 Further Normalization I: INF, 2NF, 3NF, BCNF 12.1 Introduction 12.2 Nonloss Decomposition and Functional Dependencies 12.3 First, Second, and Third Normal Forms 12.4 Dependency Preservation 12.5 Boyce/Codd Normal Form 12.6 A Note on Relation-Valued Attributes 12.7 Summary Exercises References and Bibliography Chapter 13 Further Normalization 11: Higher Normal Forms 13.1 Introduction 13.2 Multi-valued Dependencies and Fourth Normal Form 13.3 Join Dependencies and Fifth Normal Form 13.4 The Normalization Procedure Summarized 13.5 A Note on Denormalization 13.6 Orthogonal Design (A Digression) 13.7 Other Normal Forms 13.8 Summary Exercises References and Bibliography Chapter 14 Semantic Modeling 14.1 Introduction 14.2 The Overall Approach 14.3 The E/R Model 14.4 E/R Diagrams 14.5 Database Design with the E/R Model 14.6 A Brief Analysis 14.7 Summary Exercises References and Bibliography Chapter 15 Recovery 15.1 Introduction 15.2 Transactions 15.3 Transaction Recovery 15.4 System Recovery 15.5 Two-Phase Commit 15.6 Savepoints (A Digression) 15.7 SQL Facilities 15.8 Summary Exercises References and Bibliography Chapter 16 Concurrency 16.1 Introduction 16.2 Three Concurrency Problems 16.3 Locking 388 16.4 The Three Concurrency Problems Revisited 16.5 Deadlock 16.6 Serializability 16.7 Recovery Revisited 16.8 Isolation Levels 16.9 Intent Locking 16.10 Dropping ACID 16.11 SQL Facilities 408 16.12 Summary 409 Exercises 410 References and Bibliography 412 Chapter 17 Security 17.1 Introduction 17.2 Discretionary Access Control 17.3 Mandatory Access Control 17.4 Statistical Databases 17.5 Data Encryption 17.6 SQL Facilities 17.7 Summary Exercises References and Bibliography Chapter 18 Optimization 18.1 Introduction 18.2 A Motivating Example 18.3 An Overview of Query Processing 18.4 Expression Transformation 18.5 Database Statistics 18.6 A Divide-and-Conquer Strategy 18.7 Implementing the Relational Operators 18.8 Summary Exercises References and Bibliography Chapter 19 Missing Information 19.1 Introduction - 19.2 An Overview of the 3VL Approach Contents xix 19.3 19.4 19.5 19.6 19.7 19.8 Some Consequences of the Foregoing Scheme Nulls and Keys Outer Join (A Digression) Special Values SQL Facilities Summary Exercises References and Bibliography Chapter 20 Type Inheritance 20.1 20.2 20.3 20.4 20.5 20.6 20.7 20.8 20.9 20.10 20.11 Introduction Type Hierarchies Polymorphism and Substitutability Variables and Assignments Specialization by Constraint Comparisons Operators, Versions, and Signatures Is a Circle an Ellipse? Specialization by Constraint Revisited SQL Facilities Summary Exercises References and Bibliography Chapter 21 Distributed Databases 21.1 21.2 21.3 21.4 21.5 21.6 21.7 21.8 Introduction Some Preliminaries The Twelve Objectives Problems of Distributed Systems Client/Server Systems DBMS Independence SQL Facilities ) Summary Exercises References and Bibliography Chapter 22 Dedsion Support 22.1 Introduction 22.2 Aspeas of Decision Support 22.3 Database Design for Decision Support 22.4 Data Preparation 599 22.5 Data Warehouses and Data Marts 22.6 Online Analytical Processing 22.7 Data Mining 22.8 SQL Facilities 22.9 Summary Exercises References and Bibliography Chapter 23 Temporal Databases 23.1 Introduction 23.2 What Is the Problem? 23.3 Intervals 23.4 Packing and Unpacking Relations 23.5 Generalizing the Relational Operators 23.6 Database Design 23.7 Integrity Constraints 23.8 Summary Exercises References and Bibliography Chapter 24 Logic-Based Databases 24.1 Introduction 24.2 Overview 24.3 Propositional Calculus 24.4 Predicate Calculus 24.5 A Proof-Theoretic View of Databases 24.6 Deductive Database Systems 24.7 Recursive Query Processing 24.8 Summary Exercises References and Bibliography Chapter 25 Object Databases 25.1 Introduction 25.2 Objects, Classes, Methods, and Messages 25.3 A Closer Look 25.4 A Cradle-to-Grave Example 25.5 Miscellaneous Issues 25.6 Sununary Exercises References and Bibliography Chapter 26 Object/Relational Databases 26.1 Introduction 26.2 The First Great Blunder 26.3 The Second Great Blunder 26.4 Implementation Issues 26.5 Benefits of True Rapprochement 26.6 SQL Facilities 26.7 Summary Exercises References and Bibliography Chapter 27 The World Wide Web and XML 27.1 Introduction 27.2 The Web and the Internet 27.3 An Overview of XML 27.4 XML Data Definition 27.5 XML Data Manipulation 27.6 XML and Databases 27.7 SQL Facilities 27.8 Summary Exercises References and Bibliography ER -