图书介绍

an introduction to database systemsPDF|Epub|txt|kindle电子书版本网盘下载

an introduction to database systems
  • 出版社:
  • ISBN:
  • 出版时间:未知
  • 标注页数:0页
  • 文件大小:21MB
  • 文件页数:554页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

an introduction to database systemsPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART 1 DATABASE SYSTEM ARCHITECTURE3

CHAPTER 1 BASIC CONCEPTS3

1.1 What Is a Database?3

1.2 Why Database?6

1.3 Data Independence9

1.4 An Architecture for a Database System13

Exercises21

References and Bibliography22

CHAPTER 2 STORAGE STRUCTURES27

2.1 Introduction27

2.2 Possible Representations for Some Sample Data30

2.3 The Physical Record Irnerface: Intlexing Techniques37

2.4 General Indexing Techniques40

Exercises43

References and Bibliography44

CHAPTER 3 DATA MODELS AND DATA SUBLANGUAGES51

3.1 Introduction51

3.2 The Relational Approach52

3.3 The Hierarchical Approach55

3.4 The Network Approach58

3.5 Higher-Level Data Sublanguages62

3.6 Summary66

Exercises67

References and Bibliography68

PART 2 THE RELATIONAL APPROACH73

CHAPTER 4 THE RELATIONAL DATA MODEL73

4.1 Relations73

4.2 Domains and Attributes75

4.3 Keys77

4.4 Summary79

Exercises81

References and Bibliography81

CHAPTER 5 A DATA SUBLANGUAGE BASED ON RELATIONAL CALCULUS83

5.1 Introduction83

5.2 Assumptions and Definitions84

5.3 Retrieval Operations86

5.4 Storage Operations96

5.5 Library Functions98

5.6 Summary103

Exercises104

References and Bibliography107

CHAPTER 6 A DATA SUBLANGUAGE BASED ON RELATIONAL ALGEBRA113

6.1 Introduction113

6.2 Traditional Set Operations114

6.3 Special Relational Operations115

6.4 Retrieval Examples118

6.5 Storage Examples119

6.6 Summary119

Exercises120

References and Bibliography120

CHAPTER 7 THE DATA SUBLANGUAGE SEQUEL123

7.1 Introduction123

7.2 Retrieval Operations124

7.3 Storage Operations131

7.4 Library Functions132

7.5 Summary134

Exercises134

References and Bibliography134

CHAPTER 8 QUERY BY EXAMPLE137

8.1 Introduction137

8.2 Retrieval Operations138

8.3 Retrieval Operations on Tree-Structured Relations143

8.4 Storage Operations146

8.5 Library Functions148

8.6 Retrieval Operations on the Dictionary149

8.7 Summary151

Exercises152

References and Bibliography152

CHAPTER 9 FURTHER NORMALIZATION153

9.1 Introduction153

9.2 Functional Dependence154

9.3 First, Second,and Third Normal Forms156

9.4 Relations With More Than One Candidate Key163

9.5 Fourth Normal Form167

9.6 Summary169

Exercises170

References and Bibliography172

CHAPTER 10 THE EXTERNAL MODEL179

10.1 Introduction179

10.2 External Relations180

10.3 External Domains183

10.4 Data Sublanguage Operations185

10.5 Changes to the Conceptual Schema186

10.6 Summary188

Exercises190

References and Bibliography190

CHAPTER 11 SOME RELATIONAL SYSTEMS191

11.1 Introduction191

11.2 Early Systems191

11.3 Recent Systems193

References and Bibliography196

PART 3 THE HIERARCHICAL APPROACH205

CHAPTER 12 THE ARACHTTECTURE OF AN IMS SYSTEM205

12.1 Background205

12.2 Architecture206

References and Bibliography208

CHAPTER 13 THE INS DATA MODEL209

13.1 Physical Databases209

13.2 The Database Description212

13.3 Hierarchical Sequence215

13.4 Some Remarks on the Education Datebase216

Exercise217

References and Bibliography218

CHAPTER 14 THE IMS EXTERNAL MODEL219

14.1 Logical Databases219

14.2 The Program Communication Block221

Exercise223

References and Bibliography223

CHAPTER15 THE IMS DATA SUBLANQUAGE225

15.1 Defining the Program Communication Block (PCD)225

15.2 The DL/I Operations227

15.3 DL/I Examples229

15.4 Constructing the Segment Search Angument (SSA)234

15.5 SSA Command Codes234

Exercises239

References and Bibliography239

CHAPTER 16 IMS STORAGE STRUCTURES241

16.1 Introduction241

16.2 HSAM243

16.3 HISAM244

16.4 HD Structures: Pointers249

16.5 HDAM251

16.6 HIDAM254

16.7 Secondary Data Set Groups255

16.8 The Mapping Definition260

16.9 Reorganization264

16.10 Data Independence265

16.11 Summary267

Exercises268

References and Bibliography268

CHAPTER 17 IMS LOGICAL DATABASES269

17.1 Logical Databases (LDBs)269

17.2 An Example270

17.3 Termninology273

17.4 The Database Deacriptions (DBDs)274

17.5 Loading the Logicad Database277

17.6 Processing the Logical Database278

17.7 Bidirectional Logical Relationships280

17.8 A Note on the Storage Structure286

17.9 Logical Databases Involving a Single Physical Database286

17.10 Some Rules and Restrictions290

17.11 Summary291

Exercises291

References and Bibliography292

CHAPTER 18 IMS SECONDARY INDEXING293

18.1 Introduction293

18.2 Indexing the Root on a Field Not the Sequence Field295

18.3 Indexing the Root on a Field in a Dependent298

18.4 Indexing a Dependent on a Field in That Dependent301

18.5 Indexing a Dependent on a Field in a Lower-Level Dependent303

18.6 Additronal Features304

18.7 Summary304

Exercises306

References and Bibliography306

PART 4 THE NETWORK APPROACH309

CHAPTER 19 THE ARCHITECTURE OF A DBTG SYSTEM309

19.1 Background309

19.2 Architecture311

References and Bibliography313

CHAPTER 20 THE DBTG DATA MODEL315

20.1 Introduction315

20.2 The Set Construct: Hierarchical Examples316

20.3 The Set Construct: Network Examples323

20.4 Singular Sets326

20.5 Areas327

20.6 Database-Keys328

20.7 A Sample Schema329

20.8 Membership Class335

20.9 LOCATION MODE338

20.10 SET SELECTION339

20.11 Source and Result Data-Items343

20.12 DDL/COBOL Terminology344

Exercises345

References and Bibliography346

CHAPTER 21 THE DBTG EXTERNAL MODEL349

21.1 Introduction349

21.2 Differences between the Sub-Schemaand Schema349

21.3 A Sample Sub-Schema351

Exercise351

References and Bibliography352

CHAPTER 22 THE DBTG DATA SUBLANGUAGE353

22.1 Introduction353

22.2 Currency353

22.3 GET356

22.4 MODIFY357

22.5 CONNECT359

22.6 DISCONNECT359

22.7 ERASE360

22.8 STORE361

22.9 FIND361

22.10 Miscellaneous Statements368

Exercises369

References and Bibliography371

PART 5 SECURITY AND INTEGRITY375

CHAPTER 23 SECURITY375

23.1 Introduction375

23.2 Identification and Authentication377

23.3 Access Control378

23.4 Security in IMS385

23.5 Security in DBTG386

23.6 Bypassing the System388

Exercise389

References and Bibliography390

CHAPTER 24 INTEGRITY395

24.1 Introduction395

24.2 Integrity Constraints396

24.3 Data Sharing405

24.4 Support Routines408

24.5 Integrity in IMS410

24.6 Integrity in DBTG412

References and Bibliography418

PART 6 REVIEW, ANALYSIS, AND COMPARISONS425

CHAPTER 25 THE THREE APPROACHES REVISITED425

25.1 The ANSI/SPARC Architecture425

25.2 The External Level429

25.3 The Conceptual Level443

25.4 Conclusion456

References and Bibliography457

Answers to Selected Exercises463

Index525

热门推荐