Davidson / Kline / Klein | Pro SQL Server 2008 Relational Database Design and Implementation | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 665 Seiten

Davidson / Kline / Klein Pro SQL Server 2008 Relational Database Design and Implementation


1. ed
ISBN: 978-1-4302-0867-9
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 665 Seiten

ISBN: 978-1-4302-0867-9
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark



Learn effective and scalable database design techniques in a SQL Server environment. Pro SQL Server 2008 Relational Database Design and Implementation covers everything from design logic that business users will understand, all the way to the physical implementation of the design in a SQL Server database. Grounded in best practices and a solid understanding of the underlying theory, authors Louis Davidson, Kevin Kline, Scott Klein, and Kurt Windisch show how to 'get it right' in SQL Server database design and lay a solid groundwork for the future use of valuable business data. Solid foundation in best practices and relational theory Maximize SQL Server features to enhance security, performance, scalability Thorough treatment from conceptual design to an effective, physical implementation

Louis Davidson has been in the IT industry for more than 15 years as a corporate database developer and architect. He has spent the majority of his career working with Microsoft SQL Server, beginning from the early days of version 1.0. He has a bachelor s degree from the University of Tennessee at Chattanooga in computer science, with a minor in mathematics. Louis is the data architect for Compass Technology (Compass.net) in Chesapeake, Virginia, leading database development on their suite of nonprofit oriented CRM products, built on the Microsoft CRM platform and SQL Server technologies.

Davidson / Kline / Klein Pro SQL Server 2008 Relational Database Design and Implementation jetzt bestellen!

Weitere Infos & Material


1;Contents at a Glance;5
2;Contents;6
3;Foreword;14
4;About the Author;15
4.1;About the Contributing Authors;15
5;About the Technical Reviewers;16
6;Acknowledgments;17
7;Introduction;19
7.1;Purpose of Database Design;20
7.2;Structure of This Book;21
8;Introduction to Database Concepts;23
8.1;Database Design Phases;24
8.2;Relational Data Structures;29
8.3;Relationship Between Entities;45
8.4;Data Access Language (SQL);51
8.5;Understanding Dependencies;52
8.6;Summary;54
9;The Language of Data Modeling;55
9.1;Introduction to Data Modeling;55
9.2;Entities;57
9.3;Attributes;60
9.4;Relationships;68
9.5;Descriptive Information;83
9.6;Alternative Modeling Methodologies;84
9.7;Best Practices;90
9.8;Summary;91
10;Conceptual Data Modeling;93
10.1;Understanding the Requirements;94
10.2;Documenting the Process;95
10.3;Requirements Gathering;96
10.4;Identifying Objects and Processes;104
10.5;Identifying Business Rules and Processes;130
10.6;Finishing the Conceptual Model;134
10.7;Best Practices;137
10.8;Summary;137
11;The Normalization Process;138
11.1;Why Normalize?;139
11.2;How Far to Normalize?;141
11.3;The Process of Normalization;141
11.4;Entity and Attribute Shape: First Normal Form;142
11.5;Relationships Between Attributes;155
11.6;Multivalued Dependencies in Entities;172
11.7;Denormalization;187
11.8;Best Practices;188
11.9;Summary;188
11.10;Bonus Example;189
11.11;The Story of the Book So Far;196
12;Implementing the Base Table Structures;197
12.1;Reviewing the Logical Design;201
12.2;Transforming the Design;201
12.3;Implementing the Design;231
12.4;Best Practices;290
12.5;Summary;291
13;Protecting the Integrity of Your Data;292
13.1;Best Practices;293
13.2;Automatic Data Protection;295
13.3;Manual Data Protection;349
13.4;More Best Practices;356
13.5;Summary;357
14;Patterns and Query Techniques;358
14.1;Precalculated Values;359
14.2;Binary Large Valued Objects (BLOB);376
14.3;Storing User-Specified Data;379
14.4;Commonly Implemented Objects;392
14.5;Anti-patterns;393
14.6;Summary;402
14.7;The Continuing Story of the Book So Far;403
15;Securing Access to the Data;404
15.1;Principals and Securables;406
15.2;Database Security Overview;407
15.3;Controlling Object Access Via T-SQL Coded Objects;424
15.4;Views and Table-Valued Functions;438
15.5;Obfuscating Data;445
15.6;Monitoring and Auditing;448
15.7;Best Practices;462
15.8;Summary;463
16;Table Structures and Indexing;465
16.1;Physical Database Structure;466
16.2;Indexes Overview;478
16.3;Basic Index Structure;478
16.4;Index Types;480
16.5;Basics of Index Creation;486
16.6;Basic Index Usage Patterns;488
16.7;Advanced Index Usage Scenarios;505
16.8;Best Practices;513
16.9;Summary;514
17;Coding for Concurrency;516
17.1;What Is Concurrency?;517
17.2;Query Optimization Basics;518
17.3;OS and Hardware Issues;521
17.4;Transactions;522
17.5;SQL Server Concurrency Controls;539
17.6;Coding for Integrity and Concurrency;556
17.7;Best Practices;569
17.8;Summary;570
18;Considering Data Access Strategies;571
18.1;Ad Hoc SQL;573
18.2;Stored Procedures;585
18.3;T-SQL and the CLR;600
18.4;Best Practices;608
18.5;Summary;610
19;Codd’s 12 Rules for an RDBMS;611
19.1;Rule 1: The Information Rule;611
19.2;Rule 2: Guaranteed Access Rule;612
19.3;Rule 3: Systematic Treatment of NULL Values;612
19.4;Rule 4: Dynamic Online Catalog Based on the Relational Model;612
19.5;Rule 5: Comprehensive Data Sublanguage Rule;613
19.6;Rule 6: View Updating Rule;613
19.7;Rule 7: High-Level Insert, Update, and Delete;614
19.8;Rule 8: Physical Data Independence;614
19.9;Rule 9: Logical Data Independence;615
19.10;Rule 10: Integrity Independence;616
19.11;Rule 11: Distribution Independence;616
19.12;Rule 12: Non-Subversion Rule;616
19.13;Summary;617
20;Scalar Datatype Reference;618
20.1;Precise Numeric Data;620
20.2;Date and Time Data;628
20.3;Character Strings;634
20.4;Binary Data;638
20.5;Other Datatypes;640
20.6;Not Simply Scalar Datatypes;648
21;Index;650



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.