Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Architecture and Installation
Table 1-1: Basic Feature Differences Between SQL Server Editions
Table 1-2: Time Required to Convert from SQL Server 6.5
Table 1-3: Purposes of the Various SQL Server Subdirectories
Chapter 2: Managing SQL Server
Table 2-1: SQL Server Recovery Models
Chapter 3: Securing SQL Server
Table 3-1: Fixed Roles in SQL Server
Table 3-2: Rights of Fixed Roles in SQL Server
Table 3-3: Protocols that Connect to SQL Server
Chapter 4: Optimizing and Automating SQL Server Administration
Table 4-1:
xp_sendmail
Parameters
Table 4-2: Days of the Week Represented Numerically
Table 4-3: Where to Find OLE DB Providers
Table 4-4: List of Files to Make DTS Independent
Chapter 5: Monitoring and Tuning SQL Server
Table 5-1: Error Log Severity Levels
Table 5-2: Results of Running the Stored Procedure
usp_database
s
Chapter 6: Automating Administrative Tasks
Table 6-1: osql Parameters
Table 6-2: Valid Values by Level
Chapter 7: Optimizing and Troubleshooting SQL Server
Table 7-1: Sample Time Calculations for Database Growth
Chapter 8: Disaster Planning and Recovery
Table 8-1: Availability
Chapter 9: Scaling SQL Server
Table 9-1: Provider Types for Linked Servers
Table 9-2: Mapping of Parameters to Values in the sysservers Table
Table 9-3: DB2 Support for SQL Server Data Types
Table 9-4: Configuring Windows Memory for Scaling Up
Chapter 10: High Availability in SQL Server
Table 10-1: Uptime Percentages
Table 10-2: Clustering Options and Their Redundancy Levels
Table 10-3: Stored Procedures that Help Orchestrate Log Shipping
Table 10-4: SQL Server Service Configuration Based on Who Owns SQL Server
Table 10-5: SQL Server Service Configuration Based on Who Owns SQL Server
Table 10-6: SQL Server Service Configuration in the Event of a Failure to Node 1
Table 10-7: List of Services that Should Be Operational Before Installing Clustering
Chapter 12: SQL Server Replication
Table 12-1: Agents Used in Replication
Previous page
Table of content
Next page
ppk on JavaScript, 1/e
ISBN: 72227885
EAN: 2147483647
Year: 2005
Pages: 126
Authors:
Peter-Paul Koch
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 4.1 Authentication with Public Keys
Step 4.7 Using Public Key Authentication for Automated File Transfers
Conclusion
Building Web Applications with UML (2nd Edition)
Discussion
Glossary
Discussion
Analysis Model Structure
Summary
Postfix: The Definitive Guide
Receiving Limits
Outbound Mail Relay
Simple Mailing Lists
The Nature of Spam
SASL Overview
101 Microsoft Visual Basic .NET Applications
Working with Console Applications
Working with the .NET Framework
Advanced .NET Framework
Visual Studio .NET
Securing Applications
Web Systems Design and Online Consumer Behavior
Chapter VIII Personalization Systems and Their Deployment as Web Site Interface Design Decisions
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
Chapter XV Customer Trust in Online Commerce
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Variation Analysis
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
Selecting and Testing Solutions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies