Cargando…

Database systems : a pragmatic approach /

Database Systems: A Pragmatic Approach provides a comprehensive, yet concise introduction to database systems. It discusses the database as an essential component of a software system, as well as a valuable, mission critical corporate resource. The book is based on lecture notes that have been teste...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Foster, Elvis C. (Autor), Godbole, Shripad (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Berkeley, CA] : Apress, 2014.
Colección:Expert's voice in database.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • At a Glance
  • Contents
  • About the Authors
  • Preface
  • Acknowledgments
  • Part1: Preliminary Topics
  • Chapter 1: Introduction to Database Systems
  • 1.1 Definitions and Rationale
  • 1.2 Objectives of a Database System
  • Clarification on Data Independence
  • 1.3 Advantages of a Database System
  • 1.4 Approaches to Database Design
  • 1.5 Desirable Features of a DBS
  • 1.6 Database Development Life Cycle
  • 1.7 Summary and Concluding Remarks
  • 1.8 Review Questions
  • 1.9 References and/or Recommended Readings
  • Chapter 2: The Database System Environment
  • 2.1 Levels of Architecture
  • 2.1.1 External Level
  • 2.1.2 Conceptual Level
  • 2.1.3 Internal Level
  • 2.2 Inter-level Mappings
  • 2.3 The Database Administrator
  • 2.4 The Database Management System
  • 2.5 Components of DBMS Suite
  • 2.5.1 The DBMS Engine
  • 2.5.2 Definition Tools Subsystem
  • 2.5.3 The User Interface Subsystem
  • 2.5.4 Application Development Subsystem
  • 2.5.5 Data Administration Subsystem
  • 2.5.6 Data Dictionary Subsystem
  • 2.5.7 Data Communications Manager
  • 2.5.8 Utilities Subsystem
  • 2.6 The Front-end and Back-end Perspectives
  • 2.7 Database System Architecture
  • 2.8 Summary and Concluding Remarks
  • 2.9 Review Questions
  • 2.10 References and/or Recommended Readings
  • Part2: The Relational Database Model
  • Chapter 3: The Relational Model
  • 3.1 Basic Concepts
  • 3.2 Domains
  • Significance of Domains
  • 3.3 Relations
  • 3.3.1 Properties of a Relation
  • 3.3.2 Kinds of Relations
  • 3.4 Relational Database System
  • Steps in Building a Relational Database System
  • 3.5 Identifying, Representing, and Implementing Relationships
  • 3.5.1 Identifying Relationships
  • 3.5.2 Representing Relationships
  • The Entity-Relationship Model
  • The Object-Relationship Model
  • Database Tree
  • Database Networks
  • 3.5.3 Multiplicity of Relationships.
  • 3.5.4 Implementing Relationships
  • 3.6 The Relation-Attributes List and Relationship List
  • 3.7 Non-Relational Approaches
  • 3.8 Summary and Concluding Remarks
  • 3.9 Review Questions
  • 3.10 References and/or Recommended Readings
  • Chapter 4: Integrity Rules and Normalization
  • 4.1 Fundamental Integrity Rules
  • 4.2 Foreign Key Concept
  • Deletion of Referenced Tuples
  • 4.3 Rationale for Normalization
  • 4.4 Functional Dependence and Non-loss Decomposition
  • 4.4.1 Functional Dependence
  • 4.4.2 Non-loss Decomposition
  • Corollary of Heath's Theorem
  • Conclusion
  • 4.5 The First Normal Form
  • Problems with Relations in 1NF Only
  • 4.6 The Second Normal Form
  • Problems with Relations in 2NF Only
  • 4.7 The Third Normal Form
  • Problems with Relations in 3NF Only
  • 4.8 The Boyce-Codd Normal Form
  • 4.9 The Fourth Normal Form
  • 4.9.1 Multi-valued Dependency
  • 4.9.2 Fagin's Theorem
  • 4.10 The Fifth Normal Form
  • 4.10.2 Fagin's Theorem
  • 4.11 Other Normal Forms
  • 4.11.1 The Domain-Key Normal Form
  • 4.11.2 The Sixth Normal Form
  • 4.12 Summary and Concluding Remarks
  • 4.13 Review Questions
  • 4.14 References and/or Recommended Readings
  • Chapter 5: Database Modeling and Design
  • 5.1 Database Model and Database Design
  • 5.1.1 Database Model
  • 5.1.2 Database Design
  • 5.2 The E-R Model Revisited
  • 5.3 Database Design via the E-R Model
  • 5.4 The Extended Relational Model
  • 5.4.1 Entity Classifications
  • 5.4.2 Surrogates
  • 5.4.3 E-Relations and P-Relations
  • 5.4.4 Integrity Rules
  • 5.5 Database Design via the XR Model
  • 5.5.1 Determining the Kernel Entities
  • 5.5.2 Determining the Characteristic Entities
  • 5.5.3 Determining the Designative Entities
  • 5.5.4 Determining the Associations
  • 5.5.5 Determining Entity Subtypes and Super-types
  • 5.5.6 Determining Component Entities
  • 5.5.7 Determining the Properties.
  • 5.6 The UML Model
  • 5.7 Database Design via the UML Model
  • 5.8 Innovation: The Object/Entity Specification Grid
  • 5.9 Database Design via Normalization Theory
  • 5.9.1 Example: Mountaineering Problem
  • 5.9.2 Determining Candidate Keys and then Normalizing
  • 5.10 Database Model and Design Tools
  • 5.11 Summary and Concluding Remarks
  • 5.12 Review Questions
  • 5.13 References and/or Recommended Readings
  • Chapter 6: Database User Interface Design
  • 6.1 Introduction
  • 6.2 Deciding on User Interface
  • 6.3 Steps in User Interface Design
  • 6.3.1 Menu or Graphical User Interface
  • 6.3.2 Command-Based User Interface
  • 6.4 User Interface Development and Implementation
  • 6.5 Summary and Concluding Remarks
  • 6.6 Review Questions
  • 6.7 References and/or Recommend Readings
  • Chapter 7: Relational Algebra
  • 7.1 Introduction
  • 7.2 Basic Operations of Relational Algebra
  • 7.2.1 Primary and Secondary Operations
  • 7.2.2 Codd's Original Classification of Operations
  • 7.2.3 Nested Operations
  • 7.3 Syntax of Relational Algebra
  • 7.3.1 Select Statement
  • 7.3.2 Projection Statement
  • 7.3.3 Natural Join Statement
  • 7.3.4 Cartesian Product
  • 7.3.5 Theta-Join
  • 7.3.6 Union, Intersection, Difference Statements
  • 7.3.7 Division Statement
  • 7.4 Aliases, Renaming and the Relational Assignment
  • 7.4.1 The Alias Operation
  • 7.4.2 The Assignment Operation
  • 7.4.3 The Rename Operation
  • 7.5 Other Operators
  • 7.6 Summary and Concluding Remarks
  • 7.7 Review Questions
  • 7.8 References and/or Recommended Readings
  • Chapter 8: Relational Calculus
  • 8.1 Introduction
  • 8.2 Calculus Notations and Illustrations
  • 8.3 Quantifiers, Free and Bound Variables
  • 8.3.1 Well-Formed Formula
  • 8.3.2 Free and Bound Variables
  • 8.4 Substitution Rule and Standardization Rules
  • 8.5 Query Optimization
  • 8.6 Domain Oriented Relational Calculus.
  • 8.7 Summary and Concluding Remarks
  • 8.8 Review Questions
  • 8.9 References and/or Recommended Readings
  • Chapter 9: Relational System
  • a Closer Look
  • 9.1 The Relational Model Summarized
  • 9.2 Ramifications of the Relational Model
  • 9.2.1 Codd's Early Benchmark
  • 9.2.2 Revised Definition of a Relational System
  • Date's Zero-Rule
  • Codd's Twelve Rules
  • 9.2.3 Far Reaching Consequences
  • 9.3 Summary and Concluding Remarks
  • 9.4 Review Questions
  • 9.5 References
  • Part3: The Structured Query Language
  • Chapter 10: Overview of SQL
  • 10.1 Important Facts
  • 10.1.1 Commonly Used DDL Statements
  • 10.1.2 Commonly Used DML and DCL Statements
  • 10.1.3 Syntax Convention
  • 10.2 Advantages of SQL
  • 10.3 Summary and Concluding Remarks
  • 10.4 Review Questions
  • 10.5 Recommended Readings
  • Chapter 11: SQL Data Definition Statements
  • 11.1 Overview of Oracle's SQL Environment
  • 11.2 Database Creation
  • 11.3 Database Management
  • 11.4 Tablespace Creation
  • 11.5 Tablespace Management
  • 11.6 Table Creation Statement
  • 11.7 Dropping or Modifying a Table
  • 11.8 Working with Indexes
  • 11.9 Creating and Managing Sequences
  • 11.10 Altering and Dropping Sequences
  • 11.11 Creating and Managing Synonyms
  • 11.12 Summary and Concluding Remarks
  • 11.13 Review Questions
  • 11.14 References and/or Recommended Readings
  • Chapter 12: SQL Data Manipulation Statements
  • 12.1 Insertion of Data
  • 12.2 Update Operations
  • 12.3 Deletion of Data
  • 12.4 Commit and Rollback Operations
  • 12.5 Basic Syntax for Queries
  • 12.6 Simple Queries
  • 12.7 Queries Involving Multiple Tables
  • 12.7.1 The Traditional Method
  • 12.7.2 The ANSI Method
  • 12.8 Queries Involving the use of Functions
  • 12.8.1 Row Functions
  • 12.8.2 Date Functions
  • 12.8.3 Data Conversion Functions
  • 12.8.4 Programmer-Defined Functions
  • 12.8.5 Aggregation Functions.
  • 12.9 Queries Using LIKE, BETWEEN and IN Operators
  • 12.10 Nested Queries
  • 12.11 Queries Involving Set Operators
  • 12.12 Queries with Runtime Variables
  • 12.13 Queries Involving SQL Plus Format Commands
  • 12.14 Embedded SQL
  • 12.15 Dynamic Queries
  • 12.16 Summary and Concluding Remarks
  • 12.17 Review Questions
  • 12.18 References and/or Recommended Readings
  • Chapter 13: SQL Views and System Security
  • 13.1 Traditional Logical Views
  • 13.1.1 View Creation
  • 13.1.2 View Modification and Removal
  • 13.1.3 Usefulness and Manipulation of Logical Views
  • 13.2 System Security
  • 13.2.1 Access to the System
  • 13.2.2 Access to the System Resources
  • Development Privileges
  • Roles
  • 13.2.3 Access to the System Data
  • Security via Object Privileges
  • Security via Views
  • Security via Database Design
  • 13.3 Materialized Views
  • 13.3.1 Creating a Materialized View
  • 13.3.2 Altering or Dropping a Materialized View
  • 13.4 Summary and Concluding Remarks
  • 13.5 Review Questions
  • 13.6 References and/or Recommended Readings
  • Chapter 14: The System Catalog
  • 14.1 Introduction
  • 14.2 Three Important Catalog Tables
  • 14.2.1 The User_Tables View
  • 14.2.2 The User_Tab_Columns View
  • 14.2.3 The User_Indexes View
  • 14.3 Other Important Catalog Tables
  • 14.4 Querying the System Catalog
  • 14.5 Updating the System Catalog
  • 14.6 Summary and Concluding Remarks
  • 14.7 Review Questions
  • 14.8 References and/or Recommended Readings
  • Chapter 15: Some Limitations of SQL
  • 15.1 Programming Limitations
  • 15.2 Limitations on Views
  • 15.2.1 Restriction on use of the Order-By-Clause
  • 15.2.2 Restriction on Data Manipulation for Views involving UNION, INTERSECT or JOIN
  • 15.3 Foreign Key Constraint Specification
  • 15.4 Superfluous Enforcement of Referential Integrity
  • 15.5 Limitations on Calculated Columns
  • 15.6 If-Then Limitation.