[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] name 2nd 3rd 4th name mapping privileges names column names qualifying locales samples of of geometric proximity operators 2nd of locales naming conventions for meta data functions indexes name 2nd 3rd 4th narrowing searches indexes nested blocks Nested Loop operator 2nd nesting IF-THEN-ELSE statements network access securing 2nd 3rd crypt authentication method 2nd host connections 2nd hostssl connections ident authentication method 2nd 3rd 4th 5th kbr4 and kbr5 authentication method 2nd 3rd 4th 5th local connections md5 authentication method 2nd 3rd pam authentication method 2nd password authentication method 2nd 3rd reject authentication method 2nd 3rd trust authentication method 2nd network address data types CIDR INET MACADDR operators 2nd syntax for literal values 2nd nextval() function NO ACTION 2nd NOCREATEDB NOCREATEUSER non-repeatable reads normalize() normalized values NOT truth table for three-valued NOT operator NOT (~) operators numeric data types NOT LIKE matching patterns NOT NULL column constraints 2nd 3rd 4th PL/pgSQL NULL column constraints 2nd 3rd 4th NULL values 2nd null values 2nd 3rd NULL values arrays 2nd detecting indexes selecting specific rows 2nd 3rd 4th 5th 6th 7th numeric data types 2nd alternate names for approximate numeric data types artithmetic operators for floats artithmetic operators for integers bit-shift operators bit-wise operators bit-wise operators for integers exact numeric data types operators syntax for literal values 2nd NUMERIC(p,s) |