Flylib.com
Understanding DB2: Learning Visually with Examples (2nd Edition)
Understanding DB2: Learning Visually with Examples (2nd Edition)
ISBN: 0131580183
EAN: 2147483647
Year: 2004
Pages: 313
Authors:
Raul Chong
,
Xiaomei Wang
,
Michael Dang
,
Dwaine Snow
BUY ON AMAZON
Understanding DB2 Learning Visually with Examples
Table of Contents
Copyright
IBM Press
DB2 Books
On Demand Computing Books
WebSphere Books
More Books from IBM Press
Foreword
Preface
Who Should Read This Book?
Getting Started
A Word of Advice
Conventions
Contacting the Authors
Acknowledgments
About the Authors
Author Publications
Chapter1.Introduction to DB2 UDB
Section 1.1. A Brief History of DB2
Section 1.2. DB2 software and the IBM E-Business On-Demand Model
Section 1.3. DB2 UDB Editions
Section 1.4. DB2 UDB Clients
Section 1.5. Try and Buy Versions
Section 1.6. Host Connectivity
Section 1.7. Federated Support
Section 1.8. Replication Support
Section 1.9. IBM DB2 Information Integrator
Section 1.10. Special Package Offerings for Developers
Section 1.11. DB2 Syntax Diagram Conventions
Section 1.12. Case Study
Section 1.13. Summary
Section 1.14. Review Questions
Chapter2.DB2 at a Glance: The Big Picture
Section 2.1. SQL Statements and DB2 Commands
Section 2.2. DB2 Tools Overview
Section 2.3. The DB2 Environment
Section 2.4. Federation
Section 2.5. Case Study: The DB2 Environment
Section 2.6. Database Partitioning Feature
Section 2.7. Case Study: DB2 with DPF Environment
Section 2.8. Summary
Section 2.9. Review Questions
Chapter3.Installing DB2
Section 3.1. DB2 Installation: The Big Picture
Section 3.2. Required User IDs and Groups
Section 3.3. Installing DB2 Using the DB2 Setup Wizard
Section 3.4. Silent Install Using a Response File
Section 3.5. Installing DB2 Manually (LinuxUNIX Only)
Section 3.6. Installing a DB2 License
Section 3.7. Installing DB2 in a DPF Environment
Section 3.8. Installing DB2 FixPaks
Section 3.9. Case Study
Section 3.10. Summary
Section 3.11. Review Questions
Chapter4.Using the DB2 Tools
Section 4.1. DB2 Tools: The Big Picture
Section 4.2. The Command Line Tools
Section 4.3. Development Tools
Section 4.4. General Administration Tools
Section 4.5. Information Tools
Section 4.6. Monitoring Tools
Section 4.7. Setup Tools
Section 4.8. Other Tools
Section 4.9. Tool Settings
Section 4.10. Case Study
Section 4.11. Summary
Section 4.12. Review Questions
Chapter5.Understanding the DB2 Environment, DB2 Instances, and Databases
Section 5.1. The DB2 Environment, DB2 Instances, and Databases: The Big Picture
Section 5.2. The DB2 Environment
Section 5.3. The DB2 Instance
Section 5.4. The Database Administration Server
Section 5.5. Configuring a Database
Section 5.6. Instance and Database Design Considerations
Section 5.7. Case Study
Section 5.8. Summary
Section 5.9. Review Questions
Chapter6.Configuring Client and Server Connectivity
Section 6.1. Client and Server Connectivity: The Big Picture
Section 6.2. The DB2 Directories
Section 6.3. Supported Connectivity Scenarios
Section 6.4. Configuring Database Connections Using the Configuration Assistant
Section 6.5. Case Study
Section 6.6. Summary
Section 6.7. Review Questions
Chapter7.Working with Database Objects
Section 7.1. DB2 Database Objects: The Big Picture
Section 7.2. Databases
Section 7.3. Partition Groups
Section 7.4. Table Spaces
Section 7.5. Buffer Pools
Section 7.6. Schemas
Section 7.7. Data Types
Section 7.8. Tables
Section 7.9. Indexes
Section 7.10. Multidimensional Clustering Tables and Block Indexes
Section 7.11. Views
Section 7.12. Packages
Section 7.13. Triggers
Section 7.14. Stored Procedures
Section 7.15. User-Defined Functions
Section 7.16. Sequences
Section 7.17. Case Study
Section 7.18. Summary
Section 7.19. Review Questions
Chapter8.The DB2 Storage Model
Section 8.1. The DB2 Storage Model: The Big Picture
Section 8.2. Databases: Logical and Physical Storage of Your Data
Section 8.3. Database Partition Groups
Section 8.4. Table Spaces
Section 8.5. Buffer Pools
Section 8.6. Case Study
Section 8.7. Summary
Section 8.8. Review Questions
Chapter9.Leveraging the Power of SQL
Section 9.1. Querying DB2 Data
Section 9.2. Modifying DB2 Data
Section 9.3. Selecting from UPDATE, DELETE, and INSERT
Section 9.4. The MERGE Statement
Section 9.5. Recursive SQL
Section 9.6. The UNION, INTERSECT, and EXCEPT Operators
Section 9.7. Case Study
Section 9.8. Summary
Section 9.9. Review Questions
Chapter10.Implementing Security
Section 10.1. DB2 Security Model: The Big Picture
Section 10.2. Authentication
Section 10.3. Data Encryption
Section 10.4. Administrative Authorities
Section 10.5. Database Object Privileges
Section 10.6. Authority and Privilege Metadata
Section 10.7. Windows Domain Considerations
Section 10.8. Case Study
Section 10.9. Summary
Section 10.10. Review Questions
Chapter11.Understanding Concurrency and Locking
Section 11.1. DB2 Locking and Concurrency: The Big Picture
Section 11.2. Concurrency and Locking Scenarios
Section 11.3. DB2 Isolation Levels
Section 11.4. Changing Isolation Levels
Section 11.5. DB2 Locking
Section 11.6. Diagnosing Lock Problems
Section 11.7. Techniques to Avoid Locking
Section 11.8. Case Study
Section 11.9. Summary
Section 11.10. Review Questions
Chapter12.Maintaining Data
Section 12.1. DB2 Data Movement Utilities: The Big Picture
Section 12.2. Data Movement File Formats
Section 12.3. The DB2 EXPORT Utility
Section 12.4. The DB2 IMPORT Utility
Section 12.5. The DB2 LOAD Utility
Section 12.6. The db2move Utility
Section 12.7. The db2relocatedb Utility
Section 12.8. Generating Data Definition Language
Section 12.9. DB2 Maintenance Utilities
Section 12.10. Case Study
Section 12.11. Summary
Section 12.12. Review Questions
Chapter13.Developing Database Backup and Recovery Solutions
Section 13.1. Database Recovery Concepts
Section 13.2. DB2 Transaction Logs
Section 13.3. Recovery Terminology
Section 13.4. Performing Database and Table Space Backups
Section 13.5. Database and Table Space Recovery Using the RESTORE DATABASE Command
Section 13.6. Database and Table Space Roll Forward
Section 13.7. Recovering a Dropped Table
Section 13.8. The Recovery History File
Section 13.9. Database Recovery Using the RECOVER DATABASE Command
Section 13.10. High Availability Through Online Split Mirroring and Suspended IO Support
Section 13.11. High Availability Disaster Recovery
Section 13.12. Using DB2 Tools to Inspect the Health of Your Database
Section 13.13. Case Study
Section 13.14. Summary
Section 13.15. Review Questions
Chapter14.The DB2 Process Model
Section 14.1. The DB2 Process Model: The Big Picture
Section 14.2. The DB2 Engine Dispatchable Units
Section 14.3. Tuning the Number of EDUs
Section 14.4. Monitoring and Tuning the DB2 Agents
Section 14.5. The Connection Concentrator
Section 14.6. Commonly Seen DB2 Executables
Section 14.7. Additional ServicesProcesses on Windows
Section 14.8. Case Study
Section 14.9. Summary
Section 14.10. Review Questions
Chapter15.The DB2 Memory Model
Section 15.1. DB2 Memory Allocation: The Big Picture
Section 15.2. Instance-Level Shared Memory
Section 15.3. Database-Level Shared Memory
Section 15.4. Application-Level Shared Memory
Section 15.5. Agent-Level Private Memory
Section 15.6. The Memory Model
Section 15.7. 32-Bit Memory Model Considerations
Section 15.8. 64-Bit Memory Model Considerations
Section 15.9. AWE Support with Windows
Section 15.10. Case Study
Section 15.11. Summary
Section 15.12. Review Questions
Chapter16.Database Performance Considerations
Section 16.1. Performance Fundamentals
Section 16.2. SystemServer Configuration
Section 16.3. The DB2 Configuration Advisor
Section 16.4. Configuring the DB2 Instance
Section 16.5. Configuring Your Databases
Section 16.6. Lack of Proper Maintenance
Section 16.7. The Snapshot Monitor
Section 16.8. Event Monitors
Section 16.9. The DB2 Optimizer
Section 16.10. The Explain Tool and Explain Tables
Section 16.11. Using Visual Explain to Examine Access Plans
Section 16.12. Case Study
Section 16.13. Summary
Section 16.14. Review Questions
Chapter17.Diagnosing Problems
Section 17.1. Problem Diagnosis: The Big Picture
Section 17.2. How Does DB2 Report Problems?
Section 17.3. DB2 Error Message Description
Section 17.4. DB2 First-Failure Data Capture
Section 17.5. Receiving E-mail Notifications
Section 17.6. The db2support Tool
Section 17.7. The DB2 Trace Facility
Section 17.8. Searching for Known Problems
Section 17.9. Case Study
Section 17.10. Summary
Section 17.11. Review Questions
AppendixA.Solutions to the Review Questions
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
AppendixB.Use of Uppercase Versus Lowercase in DB2
AppendixC.IBM Servers
AppendixD.Using the DB2 System Catalog Tables
DB2 System Catalog Tables
How to Extract Information from the System Catalog Tables
How to Use the SYSSTAT Tables to Perform What-if Modeling and Analysis
AppendixE.Setting Up Database Connectivity for DB2 UDB for zOS and DB2 UDB for iSeries
Part I: Setting Up Database Connectivity for DB2 UDB for zOS
Part II: Setting Up Database Connectivity for DB2 UDB for iSeries
AppendixF.Diagnosing DB2 Connectivity Problems
Diagnosing Client-Server TCPIP Connection Problems
Resources
Glossary
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
About the CD-ROM
CD-ROM Warranty
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Understanding DB2: Learning Visually with Examples (2nd Edition)
ISBN: 0131580183
EAN: 2147483647
Year: 2004
Pages: 313
Authors:
Raul Chong
,
Xiaomei Wang
,
Michael Dang
,
Dwaine Snow
BUY ON AMAZON
MySQL Stored Procedure Programming
Block Structure of Stored Programs
Error Handling
Putting It All Together
Tuning Stored Programs and Their SQL
Tuning Subqueries in the FROM Clause
CISSP Exam Cram 2
Self-Assessment
The CISSP Certification Exam
Multiple-Choice Question Format
Security-Management Practices
LANs and Their Components
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Partitions and Calling Search Spaces Overview
Antivirus Protection
Configuring Cisco CallManager for Video
Review Questions
Database Management Tools
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Addressing
Internet Group Management Protocol (IGMP)
Transmission Control Protocol (TCP) Basics
Transmission Control Protocol (TCP) Data Flow
Internet Protocol Security (IPSec)
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 5. Driven to a Better User Interface
Hack 37. View Your GPS Tracklogs in Google Maps
Hack 48. Tell Your Communitys Story
Hack 53. Add Flash Applets to Your Google Maps
Hack 57. Do a Local Zoom with GxMagnifier
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
XML
Windows Programming
Printing and Drawing with GDI+
ADO.NET
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies