Flylib.com
SQL in a Nutshell (In a Nutshell (OReilly))
SQL in a Nutshell (In a Nutshell (OReilly))
ISBN: 0596518846
EAN: 2147483647
Year: 2003
Pages: 78
Authors:
Kevin Kline
,
Brand Hunt
,
Daniel Kline
BUY ON AMAZON
SQL in a Nutshell, 2nd Edition
Table of Contents
Copyright
Preface
Why This Book?
Who Should Read This Book?
How This Book Is Organized
Conventions Used in This Book
How to Use This Book
How to Contact Us
Safari Enabled
Resources
Changes in the Second Edition
Acknowledgments
Chapter 1. SQL History and Implementations
1.1 The Relational Model and ANSI SQL
1.2 History of the SQL Standard
1.3 SQL Dialects
Chapter 2. Foundational Concepts
2.1 Database Platforms Described in This Book
2.2 Categories of Syntax
2.3 SQL2003 and Platform-Specific Datatypes
2.4 Constraints
Chapter 3. SQL Statement Command Reference
3.1 How to Use This Chapter
3.2 SQL Platform Support
3.3 SQL Command Reference
Chapter 4. SQL Functions
4.1 Types of Functions
4.2 ANSI SQL Aggregate Functions
4.3 ANSI SQL Window Functions
4.4 ANSI SQL Scalar Functions
4.5 Platform-Specific Extensions
Chapter 5. Database Programming
5.1 Database Programming Overview
5.2 Opening a Database Connection
5.3 Closing a Database Connection
5.4 Managing Transactions
5.5 Executing Statements
5.6 Retrieving Data
5.7 Bound Parameters
5.8 Error Handling
5.9 Examples
Appendix A. Sybase Adaptive Server
A.1 Sybase Adaptive Server Datatypes
A.2 Sybase Adaptive Server SQL Statements
A.3 Sybase Adaptive Server SQL Functions
A.4 Sybase Adaptive Server Keywords
Appendix B. Shared and Platform-Specific Keywords
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
SQL in a Nutshell (In a Nutshell (OReilly))
ISBN: 0596518846
EAN: 2147483647
Year: 2003
Pages: 78
Authors:
Kevin Kline
,
Brand Hunt
,
Daniel Kline
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.2 Passphrase Considerations
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 6.3 X11 Forwarding
Certified Ethical Hacker Exam Prep
Determining Assessment Scope
Study Strategies
Algorithms
Enumeration
Sniffers
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Part II - The Applications
Restructuring
Mergers and acquisitions
MySQL Cookbook
Issuing Queries and Retrieving Results
Writing Comparisons Involving NULL in Programs
Choosing Appropriate LIMIT Values
Introduction
C.5. Java Resources
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Working Within the Visio Environment
Adding Shapes to Diagrams
Connecting Shapes
Laying Out Office Spaces
Organizing Shapes in Office Layouts by Using Layers
The Oracle Hackers Handbook: Hacking and Defending Oracle
Triggers
Indirect Privilege Escalation
Running Operating System Commands
Accessing the File System
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies