Figure 2–1: The three levels or views of a SQL Server database management system. The internal level contains the physical files of the database, the conceptual level is an abstraction of the physical files, and the external level is what your users interact with
Figure 2–2: The conceptual level or view of SQL Server database, as seen from Microsoft SQL Server Management Studio
Figure 2–3: Database files as seen from Windows Explorer
Figure 2–4: The objects inside a SQL Server database
Figure 2–5: Creating a table using Management Studio
Figure 2–6: The primary key in Clients links the to the row in Phones. The rows thus combine to form a complete record. If you delete a row without cascading the delete to foreign tables, the rows in the foreign tables will no longer have a relationship with any other table as part of a record
Figure 2–7: Creating an index using Management Studio
Figure 2–8: Specifying the fill factor of an index
Figure 2–9: A SQL Server data page
Figure 2–10: Configuring a database interactively
Figure 2–11: Configuring filegroups
Figure 2–12: The order of pages in the data file
Chapter 3: RDBMS Architecture
Figure 3–1: The relational engine and the storage engine are separate components of SQL Server 2005 (all editions)
Figure 3–2: The steps taken by SQL Server to parse and optimize a T-SQL statement and create an execution plan
Chapter 4: Connecting to and Administering the Database Engine
Figure 4–1: SQL Server Configuration Manager for managing protocols and SQL Server protocols
Figure 4–2: SQL Server Properties dialog box
Chapter 5: Security
Figure 5–1: Permissions protect the object
Figure 5–2: The pinnacle represents the smallest segment of people that have access to the information
Figure 5–3: Columns classified according to the sensitivity of the data
Figure 5–4: The access token-SID-ACL model
Figure 5–5: The base of the pyramid
Figure 5–6: Different methods of authenticating to SQL Server
Figure 5–7: Key distribution and mutual authentication
Figure 5–8: The domain-to-domain trust model under Kerberos
Figure 5–9: Configuring the computer account for delegation
Figure 5–10: Configure the user account for delegation
Figure 5–11: The object-ownership chain
Figure 5–12: The Access tree starts at the object and extends up through permissions, users, and roles to the login
Figure 5–13: The Database Role-New dialog box
Figure 5–14: Login-New dialog box
Figure 5–15: Database User-New dialog box
Chapter 6: Databases, Tables, and Indexes
Figure 6–1: Creating a database interactively
Figure 6–2: Choosing a source server for the copy
Figure 6–3: Choosing the transfer method
Figure 6–4: Choosing the database to copy
Figure 6–5: Adding tables to a Database Diagram workspace
Figure 6–6: Working with the Database Diagram tool
Chapter 7: SQL Server Disaster Recovery
Figure 7-1: The backup-level pyramid
Figure 7–2: The Database Properties dialog box
Figure 7–3: Back Up Database (General page)
Figure 7–4: Select Backup Destination
Figure 7–5: Back Up Database (Options page)
Figure 7–6: Database Restore
Figure 7–7: Restore Database Options
Figure 7–8: Selecting the target server for the maintenance plan
Figure 7–9: Select a maintenance task
Chapter 8: Distributed Database Architecture
Figure 8–1: Selecting the publication
Figure 8–2: Running the agent
Figure 8–3: Choosing the subscription database
Figure 8–4: Configuring replication security
Figure 8–5: Configuring the schedule
Figure 8–6: Initializing the subscription
Figure 8–7: Determining when to the create the subscription
Figure 8–8: Building the subscription
Figure 8–9: Distributor setup options
Figure 8–10: Snapshot folder
Figure 8–11: Choosing the Publication folder
Figure 8–12: Choosing Publication type
Figure 8–13: Choosing the Articles
Figure 8–14: Filtering Table Rows
Figure 8–15: Application of Filters
Figure 8–16: Allocating a disk resource
Figure 8–17: Creating the share on the primary server
Figure 8–18: Backup settings
Figure 8–19: The Secondary Database Initialization tab