Flylib.com
Microsoft SQL Server 2005: Applied Techniques Step by Step (Pro-Step by Step Developer)
Microsoft SQL Server 2005: Applied Techniques Step by Step (Pro-Step by Step Developer)
ISBN: 0735623163
EAN: 2147483647
Year: 2006
Pages: 115
Authors:
Solid Quality Learning
BUY ON AMAZON
Microsoft SQL Server 2005: Applied Techniques Step by Step
Table of Contents
Copyright
Introduction
Acknowledgments
Part I: How to Create a SQL Server Database to Store Your Application Data
Chapter 1. Choosing Which Application Data to Store in Your Database
Where to Store Application Settings
Where to Store User Settings
Where to Store XML Documents
Where to Store External Application Files
Conclusion
Chapter 2. Basic Database Security Principles
Designing Network Security to Secure Your Database System
Managing Access to SQL Server Instances
Managing Access to SQL Server Databases
Managing Access to Schemas
Managing Access to Tables and Columns
Managing Access to Programmable Objects
Conclusion
Chapter 3. Disaster Recovery Techniques to Protect Your Database
Using Full Database Backups
Using Differential Backups
Using Transaction Log Backups
Recovering a Database
Scheduling Backups Using the SQL Maintenance Plan Wizard
Conclusion
Chapter 4. Transferring Your Database to Other Systems
Using Backup and Restore to Transfer Your Data
Using Detach and Attach to Transfer Your Data
Using Replication to Transfer Your Data
Using SSIS to Transfer Your Data
Automating and Scheduling the Transfer of Your Data
Conclusion
Part II: How to Query Data from SQL Server
Chapter 5. Computing Aggregates
Counting Rows
Computing Totals and Subtotals
Computing Running Totals
Computing Statistical Values
Designing Your Own User-Defined Aggregates Using the CLR
Conclusion
Chapter 6. Improving Query Performance
Understanding Query Plans
Creating Indexes to Provide Faster Query Execution
Tuning Queries Using the Database Engine Tuning Advisor
Conclusion
Chapter 7. Building Queries Dynamically
A User Interface for Building Queries
Retrieving Information about the Tables in a Database
Sorting and Filtering Dynamically
Parameters and Security in Dynamic Queries
Conclusion
Chapter 8. Working with Data from Remote Data Sources
Reading Data from Remote Sources at the Middle Tier
Reading Data from Remote Sources in SQL Server
Inserting, Updating, or Deleting Data from Remote Sources in SQL Server
Conclusion
Chapter 9. Reading SQL Server Data from the Internet
Direct Access to SQL Server
Interoperability with Other Systems through HTTP Endpoints
Access to SQL Server through an Extra Layer
Conclusion
Part III: How to Modify Data in SQL Server
Chapter 10. Using Transactions to Provide Safe Database Concurrency
Business Transactions and SQL Server Transactions
Defining Transactions in SQL Server
Managing Transaction Isolation
Transactions in ADO.NET
Conclusion
Chapter 11. Keeping History Data
Taking a Snapshot of Your Database
Summarizing Data in History Tables
Summarizing Data in Indexed Views
Tracking Changes Using Audit Columns and Audit Tables
Conclusion
Chapter 12. Introduction to Reporting Services
Requirements for a Reporting Solution
Design Considerations
Reporting Services Architecture
Creating a Basic Report
Conclusion
Chapter 13. Introduction to Notification Services
A Notification Services Scenario
Gathering Requirements
Building the Application
Running the Application
Conclusion
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Microsoft SQL Server 2005: Applied Techniques Step by Step (Pro-Step by Step Developer)
ISBN: 0735623163
EAN: 2147483647
Year: 2006
Pages: 115
Authors:
Solid Quality Learning
BUY ON AMAZON
Java I/O
File Streams
Validation
Creating Buffers
The File Class
Filtered Readers and Writers
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Telecommunications and Network Security
Cryptography
Appendix F Security Control Catalog
Appendix G Control Baselines
C & Data Structures (Charles River Media Computer Engineering)
Control Structures
Function
Memory Allocation
Linked Lists
Miscellaneous Problems
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA 5520 Model
Deployment Scenarios Using ACLs
RIP
SIP
Site-to-Site VPN Setup Using Preshared Keys
Web Systems Design and Online Consumer Behavior
Chapter IV How Consumers Think About Interactive Aspects of Web Advertising
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with Word Objects
Adding Windows Forms Controls to Your Document
Creating Application-Level Smart Tags
How a COM Add-In Is Registered
Shimming: A Solution to the Problems with MsCoree.dll
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies