Flylib.com
Designing Relational Database Systems (Dv-Mps Designing)
Designing Relational Database Systems (Dv-Mps Designing)
ISBN: 073560634X
EAN: 2147483647
Year: 1999
Pages: 124
Authors:
Rebecca M. Riordan
BUY ON AMAZON
Cover
LOC Page
Foreword
Acknowledgments
Introduction
Chapter 1 -- Basic Concepts
What Is a Database?
Database Tools
The Relational Model
Relational Terminology
The Data Model
Summary
Chapter 2 -- Database Structure
Basic Principles
First Normal Form
Second Normal Form
Third Normal Form
Further Normalization
Summary
Chapter 3 -- Relationships
Terminology
Modeling Relationships
One-to-One Relationships
One-to-Many Relationships
Many-to-Many Relationships
Unary Relationships
Ternary Relationships
Relationships of Known Cardinality
Summary
Chapter 4 -- Data Integrity
Integrity Constraints
Implementing Data Integrity
Summary
Chapter 5 -- Relational Algebra
Nulls and Three-Valued Logic (One More Time)
Relational Operators
Set Operators
Special Relational Operators
Summary
Chapter 6 -- The Design Process
Life Cycle Models
The Database Design Process
A Note on Design Methodologies and Standards
Chapter 7 -- Defining the System Parameters
Determining the System Goals
Developing the Design Criteria
Determining the System Scope
Summary
Chapter 8 -- Defining the Work Processes
Determining Current Work Processes
Analyzing Work Processes
Documenting Work Processes
User Scenarios
Summary
Chapter 9 -- The Conceptual Data Model
Identifying the Data Objects
Defining Relationships
Reviewing Entities
Domain Analysis
Normalization
Summary
Chapter 10 -- The Database Schema
Systems Architectures
Database Schema Components
Security
Summary
Chapter 11 -- Communicating the Design
Audience and Purpose
Document Structure
Executive Summary
System Overview
Work Processes
Conceptual Data Model
Database Schema
User Interface
Change Management
Special Tools
Summary
Chapter 12 -- The Interface as Mediator
Effective Interfaces
Interface Models
User Levels
Putting Users in Charge
Minimizing the Memory Load
Being Consistent
Summary
Chapter 13 -- User Interface Architectures
Supporting the Work Processes
Document Architectures
Summary
Chapter 14 -- Representing Entities in Form Design
Simple Entities
One-to-One Relationships
One-to-Many Relationships
Hierarchies
Many-to-Many Relationships
Summary
Chapter 15 -- Choosing Windows Controls
Representing Logical Values
Representing Sets of Values
Representing Numbers and Dates
Representing Text Values
Summary
Chapter 16 -- Maintaining Database Integrity
Classes of Integrity Constraints
Intrinsic Constraints
Business Constraints
Summary
Chapter 17 -- Reporting
Sorting, Searching, and Filtering Data
Producing Standard Reports
Producing Ad Hoc Reports
Summary
Chapter 18 -- User Assistance
Passive Assistance Mechanisms
Reactive Assistance Mechanisms
Proactive Assistance
User Training
Summary
Footnotes
Glossary
Bibliography
About the Author
Designing Relational Database Systems (Dv-Mps Designing)
ISBN: 073560634X
EAN: 2147483647
Year: 1999
Pages: 124
Authors:
Rebecca M. Riordan
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to a Microsoft Excel Workbook
Mapping .NET Data Provider Data Types to .NET Framework Data Types
Testing for No Records
Converting a DataReader to a DataSet
Getting SQL Server Column Metadata Without Returning Data
Java I/O
Output Streams
Print Streams
File Viewer Finis
Number Formats
Pipes
Inside Network Security Assessment: Guarding Your IT Infrastructure
Network Vulnerability Assessment
Foundations and Principles of Security
Defining the Scope of the Assessment
Statement of Work
Appendix E. SIRT Team Report Format Template
MySQL Clustering
Installing MySQL-Max
Benchmarking
Indexes
Physical Factors
Load Balancing and Failover
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the Authentication Process
Triggers
Defeating Virtual Private Databases
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies