Sold Out
Book Categories |
Foreword | XXIII | |
Preface | XXV | |
Preface to the First Edition | XXIX | |
Part I | Overview | |
Chapter 1 | The Evolution of Microsoft SQL Server: 1989 to 1999 | 3 |
Ron's Story | 6 | |
Kalen's Story | 7 | |
Microsoft SQL Server Ships | 8 | |
Development Roles Evolve | 10 | |
OS/2 and Friendly Fire | 12 | |
Version 4.2 | 13 | |
SQL Server for Windows NT | 16 | |
Success Brings Fundamental Change | 21 | |
The End of Joint Development | 23 | |
The Charge to SQL95 | 25 | |
The Next Version | 27 | |
The Secret of the Sphinx | 28 | |
The New Future | 30 | |
Chapter 2 | A Tour of SQL Server | 31 |
The SQL Server Engine | 32 | |
DBMS-Enforced Data Integrity | 38 | |
Transaction Processing | 43 | |
Symmetric Server Architecture | 45 | |
Security | 47 | |
High Availability | 49 | |
Distributed Data Processing | 50 | |
Data Replication | 51 | |
Systems Management | 54 | |
SQL Server Utilities and Extensions | 61 | |
Client Development Interfaces | 68 | |
Summary | 71 | |
Part II | Architectural Overview | |
Chapter 3 | SQL Server Architecture | 75 |
The SQL Server Engine | 75 | |
Managing Memory | 99 | |
Transaction Logging and Recovery | 107 | |
The SQL Server Kernel and Interaction with the Operating System | 112 | |
Summary | 118 | |
Part III | Using Microsoft SQL Server | |
Chapter 4 | Planning for and Installing SQL Server | 121 |
SQL Server Editions | 121 | |
Hardware Guidelines | 124 | |
Hardware Components | 128 | |
The Operating System | 150 | |
The File System | 151 | |
Security and the User Context | 152 | |
Licensing | 154 | |
Network Protocols | 159 | |
Character Sets and Sort Orders | 163 | |
Installing SQL Server | 171 | |
Basic Configuration After Installation | 172 | |
Remote and Unattended Installation | 174 | |
Summary | 178 | |
Chapter 5 | Databases and Database Files | 179 |
Special System Databases | 180 | |
Database Files | 182 | |
Creating Databases | 184 | |
Expanding and Shrinking Databases | 186 | |
Changes in Log Size | 189 | |
Database Filegroups | 193 | |
Altering a Database | 196 | |
Databases Under the Hood | 198 | |
Database Options | 203 | |
Other Database Considerations | 210 | |
Summary | 212 | |
Chapter 6 | Tables | 213 |
Creating Tables | 214 | |
Internal Storage--The Details | 229 | |
Indexes | 246 | |
User-Defined Datatypes | 250 | |
Identity Property | 251 | |
Constraints | 255 | |
Altering a Table | 292 | |
Temporary Tables | 295 | |
Summary | 298 | |
Chapter 7 | Querying Data | 299 |
The SELECT Statement | 299 | |
Joins | 302 | |
Dealing with NULL | 322 | |
Subqueries | 332 | |
Views and Derived Tables | 345 | |
Other Search Expressions | 350 | |
Summary | 389 | |
Chapter 8 | Modifying Data | 391 |
Basic Modification Operations | 391 | |
Data Modification Internals | 421 | |
Summary | 441 | |
Chapter 9 | Programming with Transact-SQL | 443 |
Transact-SQL as a Programming Language | 443 | |
Transact-SQL Programming Constructs--The Basics | 447 | |
Summary | 506 | |
Chapter 10 | Batches, Transactions, Stored Procedures, and Triggers | 507 |
Batches | 507 | |
Transactions | 512 | |
Stored Procedures | 533 | |
Executing Batches, or What's Stored About a Stored Procedure? | 548 | |
Triggers | 575 | |
Debugging Stored Procedures and Triggers | 580 | |
Working with Text and Image Data | 584 | |
Environmental Concerns | 598 | |
Summary | 606 | |
Chapter 11 | Cursors | 607 |
Cursor Basics | 608 | |
Cursors and ISAMs | 610 | |
Cursor Models | 615 | |
Appropriate Use of Cursors | 621 | |
Working with Transact-SQL Cursors | 632 | |
Cursor Variables | 652 | |
Summary | 660 | |
Chapter 12 | Transact-SQL Examples and Brainteasers | 661 |
Using Triggers to Implement Referential Actions | 661 | |
Brainteasers | 670 | |
Summary | 726 | |
Chapter 13 | Locking | 727 |
The Lock Manager | 727 | |
Lock Types for User Data | 734 | |
Lock Compatibility | 748 | |
Bound Connections | 750 | |
Row-Level vs. Page-Level Locking | 752 | |
Locking Hints and Trace Flags | 754 | |
Summary | 755 | |
Part IV | Performance and Tuning | |
Chapter 14 | Optimizing Query Performance | 759 |
The Development Team | 760 | |
Application and Database Design | 760 | |
Planning for Peak Usage | 766 | |
Perceived Response Time for Interactive Systems | 766 | |
Prototyping, Benchmarking, and Testing | 768 | |
Creating Useful Indexes | 772 | |
Using Stored Procedures and Caching Mechanisms | 780 | |
Concurrency and Consistency Tradeoffs | 788 | |
Resolving Blocking Problems | 789 | |
Resolving Deadlock Problems | 794 | |
Segregating OLTP and DSS Applications | 807 | |
Optimizing Queries | 807 | |
Monitoring Query Performance | 835 | |
Summary | 848 | |
Chapter 15 | Configuration and Performance Monitoring | 849 |
Windows NT Configuration Settings | 849 | |
SQL Server Configuration Settings | 852 | |
System Maintenance | 867 | |
Monitoring System Behavior | 868 | |
Summary | 890 | |
Suggested Reading | 891 | |
Index | 897 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInside Microsoft SQL Server 7.0
X
This Item is in Your InventoryInside Microsoft SQL Server 7.0
X
You must be logged in to review the productsX
X
X
Add Inside Microsoft SQL Server 7.0, A must-read for developers and IT professionals who need tounderstand Microsoft SQL Server from the inside out. Written bya Microsoft SQL Server guru, this comprehensive guide providesupdated, authoritative advice for installing, administering, andp, Inside Microsoft SQL Server 7.0 to the inventory that you are selling on WonderClubX
X
Add Inside Microsoft SQL Server 7.0, A must-read for developers and IT professionals who need tounderstand Microsoft SQL Server from the inside out. Written bya Microsoft SQL Server guru, this comprehensive guide providesupdated, authoritative advice for installing, administering, andp, Inside Microsoft SQL Server 7.0 to your collection on WonderClub |