Flylib.com
ppk on JavaScript, 1/e
ppk on JavaScript, 1/e
ISBN: 72227885
EAN: 2147483647
Year: 2005
Pages: 126
Authors:
Peter-Paul Koch
BUY ON AMAZON
Table of Contents
BackCover
SQL Server 2000 for Experienced DBAs
Introduction
Conventions Used in This Book
Part I: Managing a SQL Server Environment
Chapter 1: Architecture and Installation
Architecture Overview
Installation Tips
Chapter 2: Managing SQL Server
Managing the Database
DBA Roles
Managing Changes
Chapter 3: Securing SQL Server
Permissions
Security Audits of SQL Server
Common Security Concerns
Locking Down Your SQL Server
SQL Injection
Part II: Tuning SQL Server
Chapter 4: Optimizing and Automating SQL Server Administration
SQL Mail
Optimizing SQL Server Agent
Operators
Jobs
Centralized Administration
Administering DTS
Chapter 5: Monitoring and Tuning SQL Server
System Monitor
System Monitor Alerts
sp_monitor
Trace Flags
Alerts
Setting Job Notifications
Forecasting Growth
sqldiag
Black Box
Chapter 6: Automating Administrative Tasks
Administrative T-SQL
OLE Automation
Chapter 7: Optimizing and Troubleshooting SQL Server
Registry Dependencies
Managing and Configuring the Database
Database Standards
Performance Tuning Your Database Model
Using Sample Data
Optimizing Stored Procedures
Using Temporary Tables
Performance Tuning T-SQL
Returning Top Rows
Quoted Identifiers
Read-Only Databases
Optimizing Indexes
SQL Server Profiler
Web Troubleshooting Resources
Part III: SQL Server in the Enterprise Environment
Chapter 8: Disaster Planning and Recovery
Types of Backups
Database Recovery Models
Maintenance Plans
Restoring
Detaching and Attaching a Database
Chapter 9: Scaling SQL Server
Distributed Partitioned Views
Indexed Views
Scaling Up
Chapter 10: High Availability in SQL Server
Log Shipping
Log Shipping Step by Step
Log Shipping Role Changes
Failover Clustering
Chapter 11: Clustering Windows and SQL Server
Clustering Windows 2000 Advanced Server
Clustering SQL Server 2000
Uninstalling the Cluster and SQL Server
Troubleshooting Clusters
Service Pack Installations
Chapter 12: SQL Server Replication
Understanding the Types of Replication
Configuring SQL Server Agent Replication
Preinstallation Concerns
Initial Replication Setup
Disabling Replication
SnapshotTransactional Replication Setup
Merge Replication Setup
Creating Subscriptions
Schema Changes in Replication
Monitoring and Troubleshooting Replication
Troubleshooting Agents
Recovering from a Disaster
Optimizing Replication
Part IV: Appendixes
Appendix A: System Tables and Undocumented DBCC Commands
Undocumented DBCC Commands
Appendix B: Extended Stored Procedures
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
List of Sidebars
ppk on JavaScript, 1/e
ISBN: 72227885
EAN: 2147483647
Year: 2005
Pages: 126
Authors:
Peter-Paul Koch
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
The Seven-Step Information Gathering Process
Trojan and Backdoor Countermeasures
System Hacking
Miscellaneous
U.S. Government Restricted Rights
Metrics and Models in Software Quality Engineering (2nd Edition)
In-Process Quality Metrics
Histogram
The Exponential Model
Modeling Process
Measuring the Value of Process Improvement
Cisco IOS Cookbook (Cookbooks (OReilly))
Losing Access to the TACACS+ Server
Creating an Encrypted Router-to-Router VPN in a GRE Tunnel
Restricting Peers
Defining DHCP Configuration Options
Using MSDP to Discover External Sources
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 18. Blog from Your Mobile Phone
Hack 28. Scan Passively with KisMAC
Hack 38. Graph Your Wireless Performance
Hack 40. Stop Moochers from Stealing Your Wi-Fi Bandwidth
Hack 48. Generate a Tunnel Configuration Automatically
Java Concurrency in Practice
What is Thread Safety?
Testing for Performance
Avoiding Performance Testing Pitfalls
Summary
Performance Considerations
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Triggers
Indirect Privilege Escalation
Defeating Virtual Private Databases
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies