Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Architecture and Installation
Table 1-1: Basic Feature Differences Between SQL Server Editions
Table 1-2: Time Required to Convert from SQL Server 6.5
Table 1-3: Purposes of the Various SQL Server Subdirectories
Chapter 2: Managing SQL Server
Table 2-1: SQL Server Recovery Models
Chapter 3: Securing SQL Server
Table 3-1: Fixed Roles in SQL Server
Table 3-2: Rights of Fixed Roles in SQL Server
Table 3-3: Protocols that Connect to SQL Server
Chapter 4: Optimizing and Automating SQL Server Administration
Table 4-1:
xp_sendmail
Parameters
Table 4-2: Days of the Week Represented Numerically
Table 4-3: Where to Find OLE DB Providers
Table 4-4: List of Files to Make DTS Independent
Chapter 5: Monitoring and Tuning SQL Server
Table 5-1: Error Log Severity Levels
Table 5-2: Results of Running the Stored Procedure
usp_database
s
Chapter 6: Automating Administrative Tasks
Table 6-1: osql Parameters
Table 6-2: Valid Values by Level
Chapter 7: Optimizing and Troubleshooting SQL Server
Table 7-1: Sample Time Calculations for Database Growth
Chapter 8: Disaster Planning and Recovery
Table 8-1: Availability
Chapter 9: Scaling SQL Server
Table 9-1: Provider Types for Linked Servers
Table 9-2: Mapping of Parameters to Values in the sysservers Table
Table 9-3: DB2 Support for SQL Server Data Types
Table 9-4: Configuring Windows Memory for Scaling Up
Chapter 10: High Availability in SQL Server
Table 10-1: Uptime Percentages
Table 10-2: Clustering Options and Their Redundancy Levels
Table 10-3: Stored Procedures that Help Orchestrate Log Shipping
Table 10-4: SQL Server Service Configuration Based on Who Owns SQL Server
Table 10-5: SQL Server Service Configuration Based on Who Owns SQL Server
Table 10-6: SQL Server Service Configuration in the Event of a Failure to Node 1
Table 10-7: List of Services that Should Be Operational Before Installing Clustering
Chapter 12: SQL Server Replication
Table 12-1: Agents Used in Replication
Previous page
Table of content
Next page
ppk on JavaScript, 1/e
ISBN: 72227885
EAN: 2147483647
Year: 2005
Pages: 126
Authors:
Peter-Paul Koch
BUY ON AMAZON
Network Security Architectures
Applied Knowledge Questions
IP Telephony
Small Network Edge Security Design
Applied Knowledge Questions
Password Policy
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Pausing Output
Asynchronous Interfaces
Cable
BGP Confederacies
Multicast Routing
File System Forensic Analysis
Bibliography
Background
Specific File Systems
Ext2 and Ext3 Data Structures
File Name Category
Junos Cookbook (Cookbooks (OReilly))
Installing a Different Software Release on J-Series Routers
Setting Up TACACS+ User Authentication
Configuring Interfaces Before the PICs Are Installed
Prioritizing LSPs
Installing LSPs into the Unicast Routing Table
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Quantitative Methods in Project Contracts
GDI+ Programming with C#
Summary
Your First GDI+ Application
The Coordinate System
Printing
Using GDI in the Managed Environment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies