SQL for Dummies

[desc]SQL

Fully updated with
aes
for

ee)

5th Edition

S[/desc][img]72408-a_taylor_sql_for_dummies_2003.webp[/img][bookmark]{“125”: [4,”With a modified attribute “,147],”136”: [4,”Row values “,161],”359”: [3,”Triple-Check Queries with Subselects “,391],”270”: [4,”Client extensions “,322],”288”: [4,”XMLGEN “,335],”45”: [4,”Approximate numerics “,49],”366”: [1,”Part VIII: Appendixes “,394],”259”: [4,”Embedded SQL “,309],”40”: [3,”A (Very) Little History “,44],”109”: [4,”Domain integrity “,125],”245”: [4,”The implicit transaction-starting statement “,296],”214”: [4,”Querying the hard way “,267],”335”: [3,”WHENEVER Clause “,374],”87”: [4,”Deleting a table “,105],”260”: [4,”Module language “,312],”42”: [3,”Reserved Words “,46],”60”: [3,”Using SQL on the Internet/Intranet “,64],”347”: [3,”Considering Only Technical Factors “,387],”52”: [4,”REF types “,56],”81”: [3,”Building a Simple Database Using a RAD Tool “,95],”168”: [4,”SIMILAR “,203],”244”: [4,”Isolation levels “,294],”90”: [4,”Creating a table “,107],”84”: [4,”Altering the table structure “,100],”141”: [3,”Value Expressions “,166],”208”: [2,”Chapter 12: Recursive Queries “,262],”289”: [4,”XMLCONCAT “,336],”368”: [2,”Appendix B: Glossary “,400],”258”: [3,”Hooking SQL into Procedural Languages “,309],”75”: [4,”Transactions “,84],”192”: [4,”Natural join “,229],”218”: [3,”The SQL Data Control Language “,273],”32”: [4,”Guess who’s coming to dinner? “,35],”165”: [4,”BETWEEN “,198],”48”: [4,”Datetimes “,52],”93”: [4,”Deleting a table “,109],”123”: [4,”From tables “,145],”204”: [4,”The ALL, SOME, and ANY quantifiers “,252],”159”: [3,”Row Value Expressions “,192],”210”: [4,”Houston, we have a problem “,264],”67”: [4,”Getting familiar with DDL commands “,76],”326”: [4,”REPEAT UNTIL END REPEAT “,365],”338”: [4,”The diagnostics detail area “,377],”364”: [3,”Back Up Your Databases Regularly “,393],”243”: [4,”The default transaction “,294],”255”: [4,”SQL strengths and weaknesses “,307],”51”: [4,”Collection types “,55],”242”: [4,”Using SQL transactions “,292],”15”: [3,”Part V: SQL in the Real World “,24],”191”: [4,”Cross join “,229],”50”: [4,”ROW types “,54],”285”: [3,”SQL Operators That Produce an XML Result “,334],”157”: [4,”Using CAST within SQL “,191],”262”: [1,”Part V: SQL in the Real World “,316],”235”: [1,”Part IV: Controlling Operations “,286],”23”: [3,”Keeping Track of Things “,28],”188”: [3,”JOINS “,225],”246”: [4,”SET TRANSACTION “,297],”361”: [3,”Watch GROUP BY Clause Restrictions “,392],”217”: [2,”Chapter 13: Providing Database Security “,272],”181”: [3,”GROUP BY Clauses “,214],”321”: [4,”IF THEN ELSE END IF “,362],”105”: [4,”Why would I want an index? “,123],”184”: [2,”Chapter 10: Relational Operators “,220],”353”: [3,”Skipping Beta Testing “,389],”350”: [3,”Using Your Favorite System Architecture Exclusively “,388],”277”: [4,”When not to use the XML type “,330],”323”: [4,”LOOP ENDLOOP “,364],”53”: [4,”User-defined types “,57],”73”: [4,”Subqueries “,84],”113”: [3,”Normalizing the Database “,133],”153”: [4,”Using CASE with values “,185],”39”: [3,”What SQL Is and Isn’t “,42],”85”: [4,”Identifying a primary key “,101],”307”: [4,”Syntax “,351],”7”: [1,”Introduction “,22],”69”: [4,”Value expressions “,78],”132”: [3,”Transferring Data “,156],”160”: [2,”Chapter 9: Zeroing In on the Data You Want “,194],”83”: [4,”Creating the table with Design View “,96],”183”: [3,”ORDER BY Clauses “,217],”70”: [4,”Predicates “,81],”333”: [2,”Chapter 20: Error-Handling “,372],”94”: [4,”Deleting an index “,109],”257”: [4,”Problems in combining SQL with a procedural language “,308],”4″: [1,”Acknowledgments”,8],”8″: [2,”About This Book “,22],”2″: [1,”About the Author”,6],”133″: [3,”Deleting Obsolete Data “,158],”158”: [4,”Using CAST between SQL and the host language “,191],”174”: [4,”OVERLAPS “,208],”57”: [3,”Using SQL in a Client/Server System “,62],”251”: [4,”Savepoints and subtransactions “,300],”171”: [4,”EXISTS “,207],”124”: [4,”With a selection condition “,146],”111”: [4,”Potential problem areas “,129],”316”: [4,”Conditions “,357],”14”: [3,”Part IV: Controlling Operations “,24],”179”: [4,”OR “,213],”296”: [4,”Multiset “,341],”264”: [3,”ODBC “,318],”292”: [4,”Domain “,337],”365”: [3,”Handle Error Conditions Gracefully “,393],”269”: [4,”Server extensions “,321],”167”: [4,”LIKE and NOT LIKE “,201],”186”: [3,”INTERSECT “,223],”21”: [1,”Part I: Basic Concepts “,26],”163”: [3,”WHERE Clauses “,196],”275”: [3,”The XML Data Type “,329],”311”: [2,”Chapter 19: Persistent Stored Modules “,354],”140”: [4,”Column references “,165],”6″: [1,”Table of Contents”,12],”117″: [4,”Domain-key normal form (DK/NF) “,138],”104”: [4,”What’s an index, anyway? “,121],”13”: [3,”Part III: Retrieving Data “,24],”129”: [4,”Adding data only to selected columns “,150],”119”: [1,”Part III: Retrieving Data “,140],”283”: [4,”Handling null values “,333],”172”: [4,”UNIQUE “,207],”150”: [2,”Chapter 8: Advanced SQL Value Expressions “,182],”152”: [4,”Using CASE with search conditions “,183],”9”: [2,”Who Should Read This Book? “,23],”342”: [3,”Handling Exceptions “,381],”294”: [4,”Row “,339],”189”: [4,”Basic JOIN “,225],”130”: [4,”Adding a block of rows to a table “,151],”194”: [4,”Column-name join “,230],”201”: [3,”What Subqueries Do “,246],”28”: [3,”Database Models “,33],”154”: [4,”A special CASE – NULLIF “,187],”142”: [4,”String value expressions “,167],”232”: [3,”Granting the Power to Grant Privileges “,282],”77”: [4,”Referential integrity constraints can jeopardize your data “,88],”213”: [3,”Where Might I Use a Recursive Query? “,265],”56”: [3,”Constraints “,61],”340”: [4,”Adding constraints to an existing table “,380],”49”: [4,”Intervals “,54],”308”: [4,”Orientation of a scrollable cursor “,351],”144”: [4,”Datetime value expressions “,168],”299”: [3,”Declaring a Cursor “,345],”26”: [3,”What Is a Database Management System? “,31],”103”: [3,”Working with Indexes “,121],”38”: [2,”Chapter 2: SQL Fundamentals “,42],”336”: [3,”Diagnostics Areas “,375],”202”: [4,”Nested queries that return sets of rows “,246],”370″: [1,”Team DDU”,1],”276″: [4,”When to use the XML type “,329],”126”: [3,”Updating Views “,148],”97”: [3,”Designing the Database “,112],”220”: [4,”The database administrator “,273],”58”: [4,”The server “,62],”247”: [4,”COMMIT “,298],”315”: [4,”Cursors “,357],”63”: [4,”Creating tables “,67],”205”: [4,”Nested queries that are an existence test “,254],”343”: [1,”Part VII: The Part of Tens “,384],”147”: [3,”Functions “,170],”291”: [3,”Mapping Non-Predefined Data Types to XML “,337],”324”: [4,”LEAVE “,364],”252”: [3,”Constraints within Transactions “,301],”229”: [4,”Referencing related tables “,279],”19”: [2,”Icons Used in This Book “,25],”199”: [2,”Chapter 11: Delving Deep with Nested Queries “,244],”99”: [4,”Step 2: Identifying tables and columns “,113],”137”: [4,”Literal values “,161],”207”: [4,”UPDATE, DELETE, and INSERT statements “,259],”265”: [4,”ODBC interface “,319],”3″: [1,”Dedication”,8],”187″: [3,”EXCEPT “,224],”135”: [3,”Values “,160],”322”: [4,”CASE END CASE “,363],”66”: [4,”Ordering by catalog “,75],”357”: [3,”Try Queries on a Test Database “,391],”209”: [3,”What Is Recursion? “,262],”88”: [3,”Building PowerDesign with SQL’s DDL “,106],”298”: [2,”Chapter 18: Cursors “,344],”300”: [4,”The query expression “,345],”62”: [3,”Data Definition Language “,67],”231”: [4,”Causing SQL statements to be executed “,281],”11”: [3,”Part I: Basic Concepts “,23],”332”: [3,”Stored Modules “,369],”146”: [4,”Conditional value expressions “,169],”290”: [4,”XMLAGG “,337],”282”: [4,”Mapping tables “,332],”30”: [4,”Why relational is better “,34],”263”: [2,”Chapter 16: ODBC and JDBC “,318],”355”: [2,”Chapter 22: Ten Retrieval Tips “,390],”206”: [4,”Other correlated subqueries “,255],”143”: [4,”Numeric value expressions “,168],”25”: [3,”Database Size and Complexity “,30],”328”: [4,”ITERATE “,366],”98”: [4,”Step 1: Defining objects “,113],”346”: [3,”Ignoring Project Scope “,387],”92”: [4,”Altering the table structure “,108],”36”: [4,”Object-relational model “,41],”86”: [4,”Creating an index “,103],”10”: [2,”How This Book Is Organized “,23],”145”: [4,”Interval value expressions “,169],”272”: [3,”JDBC “,325],”33”: [4,”Enjoy the view “,36],”100”: [4,”Step 3: Defining tables “,114],”341”: [4,”Interpreting the information returned by SQLSTATE “,380],”24”: [3,”What Is a Database? “,30],”362”: [3,”Use Parentheses with AND, OR, and NOT “,392],”151”: [3,”CASE Conditional Expressions “,182],”107”: [3,”Maintaining Integrity “,124],”356”: [3,”Verify the Database Structure “,390],”238”: [4,”Platform instability “,289],”173”: [4,”DISTINCT “,208],”166”: [4,”IN and NOT IN “,199],”329”: [3,”Stored Procedures “,367],”295”: [4,”Array “,340],”128”: [4,”Adding data one row at a time “,149],”267”: [3,”ODBC in a Client/Server Environment “,320],”354”: [3,”Not Documenting “,389],”44”: [4,”Exact numerics “,47],”175”: [4,”MATCH “,209],”149”: [4,”Value functions “,173],”155”: [4,”Another special CASE – COALESCE “,189],”5″: [1,”Contents at a Glance”,10],”211″: [4,”Failure is not an option “,264],”268”: [3,”ODBC and the Internet “,321],”106”: [4,”Maintaining an index “,123],”358”: [3,”Double-Check Queries with JOINs “,391],”256”: [4,”Procedural language strengths and weaknesses “,308],”222”: [4,”The public “,275],”121”: [3,”Retrieving Data “,142],”196”: [4,”Outer join “,232],”330”: [3,”Stored Functions “,368],”178”: [4,”AND “,213],”306”: [3,”Fetching Data from a Single Row “,350],”278”: [3,”Mapping SQL to XML and XML to SQL “,330],”249”: [4,”Locking database objects “,298],”46”: [4,”Character strings “,51],”59”: [4,”The client “,63],”327”: [4,”FOR DO END FOR “,366],”309”: [4,”Positioned DELETE and UPDATE statements “,352],”164”: [4,”Comparison predicates “,198],”301”: [4,”The ORDER BY clause “,346],”22”: [2,”Chapter 1: Relational Database Fundamentals “,28],”37”: [3,”Database Design Considerations “,41],”64”: [4,”A room with a view “,69],”139”: [4,”Special variables “,165],”234”: [3,”Using GRANT and REVOKE Together Saves Time and Effort “,284],”345”: [3,”Assuming That Your Clients Know What They Need “,386],”127”: [3,”Adding New Data “,148],”310”: [3,”Closing a Cursor “,352],”337”: [4,”The diagnostics header area “,375],”34”: [4,”Schemas, domains, and constraints “,39],”190”: [4,”Equi-join “,227],”279”: [4,”Mapping character sets “,330],”74”: [3,”Data Control Language “,84],”360”: [3,”Summarize Data with GROUP BY “,391],”110”: [4,”Referential integrity “,126],”230”: [4,”Using domains, character sets, collations, and translations “,280],”287”: [4,”XMLFOREST “,335],”116”: [4,”Third normal form “,137],”72”: [4,”Set functions “,82],”43”: [3,”Data Types “,46],”134”: [2,”Chapter 7: Specifying Values “,160],”118”: [4,”Abnormal form “,139],”248”: [4,”ROLLBACK “,298],”339”: [4,”Constraint violation example “,379],”169”: [4,”NULL “,203],”131”: [3,”Updating Existing Data “,153],”200”: [3,”Why Use a Subquery? “,245],”61”: [2,”Chapter 3: The Components of SQL “,66],”193”: [4,”Condition join “,230],”177”: [3,”Logical Connectives “,212],”239”: [4,”Equipment failure “,289],”349”: [3,”Always Using Your Favorite Development Environment “,388],”78”: [4,”Delegating responsibility for security “,90],”108”: [4,”Entity integrity “,124],”320”: [3,”Flow of Control Statements “,362],”281”: [4,”Mapping data types “,331],”227”: [4,”Modifying table data “,278],”352”: [3,”Neglecting Design Reviews “,389],”71”: [4,”Logical connectives “,82],”79”: [1,”Part II: Using SQL to Build Databases “,92],”367”: [2,”Appendix A: SQL:2003 Reserved Words “,396],”351”: [3,”Designing Database Tables in Isolation “,388],”35”: [4,”The object model challenges the relational model “,40],”286”: [4,”XMLELEMENT “,334],”182”: [3,”HAVING Clauses “,216],”180”: [4,”NOT “,214],”101”: [4,”Domains, character sets, collations, and translations “,118],”80”: [2,”Chapter 4: Building and Maintaining a Simple Database Structure “,94],”233”: [3,”Taking Privileges Away “,283],”29”: [4,”Relational model “,34],”112”: [4,”Constraints “,131],”274”: [3,”How XML Relates to SQL “,328],”18”: [3,”Part VIII: Appendixes “,25],”219”: [3,”User Access Levels “,273],”223”: [3,”Granting Privileges to Users “,276],”0″: [1,”SQL for Dummies”,1],”122″: [3,”Creating Views “,144],”302”: [4,”The updatability clause “,347],”148”: [4,”Summarizing by using set functions “,170],”314”: [4,”Variables “,357],”54”: [4,”Data type summary “,59],”273”: [2,”Chapter 17: SQL:2003 and XML “,328],”224”: [4,”Roles “,277],”161”: [3,”Modifying Clauses “,194],”20”: [2,”Getting Started “,25],”27”: [3,”Flat Files “,32],”176”: [4,”Referential integrity rules “,210],”226”: [4,”Looking at data “,278],”280”: [4,”Mapping identifiers “,330],”363”: [3,”Control Retrieval Privileges “,392],”91”: [4,”Creating an index “,108],”334”: [3,”SQLSTATE “,372],”41”: [3,”SQL Commands “,45],”225”: [4,”Inserting data “,277],”156”: [3,”CAST Data-Type Conversions “,189],”96”: [2,”Chapter 5: Building a Multitable Relational Database “,112],”120”: [2,”Chapter 6: Manipulating Database Data “,142],”318”: [4,”Conditions that aren’t handled “,361],”284”: [4,”Generating the XML Schema “,333],”138”: [4,”Variables “,163],”313”: [4,”Atomicity “,355],”305”: [3,”Opening a Cursor “,349],”162”: [3,”FROM Clauses “,196],”241”: [3,”Reducing Vulnerability to Data Corruption “,292],”237”: [3,”Threats to Data Integrity “,288],”293”: [4,”Distinct UDT “,339],”369″: [1,”Index”,408],”185″: [3,”UNION “,220],”47”: [4,”Booleans “,52],”344”: [2,”Chapter 21: Ten Common Mistakes “,386],”266”: [4,”Components of ODBC “,319],”261”: [4,”Object-oriented RAD tools “,314],”16”: [3,”Part VI: Advanced Topics “,24],”55”: [3,”Null Values “,61],”12”: [3,”Part II: Using SQL to Build Databases “,23],”65”: [4,”Collecting tables into schemas “,74],”82”: [4,”Deciding what to track “,95],”76”: [4,”Users and privileges “,86],”304”: [4,”Scrollability “,349],”303”: [4,”Sensitivity “,348],”89”: [4,”Using SQL with Microsoft Access “,106],”253”: [2,”Chapter 15: Using SQL Within Applications “,306],”312”: [3,”Compound Statements “,354],”212”: [3,”What Is a Recursive Query? “,265],”319”: [4,”Assignment “,361],”348”: [3,”Not Asking for Client Feedback “,387],”102”: [4,”Getting into your database fast with keys “,118],”114”: [4,”First normal form “,135],”17”: [3,”Part VII: The Part of Tens “,25],”271”: [3,”ODBC and an Intranet “,325],”68”: [3,”Data Manipulation Language “,77],”317”: [4,”Handling conditions “,359],”170”: [4,”ALL, SOME, ANY “,204],”95”: [3,”Portability Considerations “,109],”216”: [3,”Where Else Might I Use a Recursive Query? “,270],”325”: [4,”WHILE DO END WHILE “,365],”195”: [4,”Inner join “,231],”297”: [1,”Part VI: Advanced Topics “,342],”221”: [4,”Database object owners “,274],”240”: [4,”Concurrent access “,290],”31”: [4,”Components of a relational database “,35],”198”: [4,”ON versus WHERE “,242],”228”: [4,”Deleting obsolete rows from a table “,279],”203”: [4,”Nested queries that return a single value “,250],”331”: [3,”Privileges “,369],”254”: [3,”SQL in an Application “,307],”1″: [2,”Cover”,1],”215″: [4,”Saving time with a recursive query “,268],”250”: [4,”Backing up your data “,299],”197”: [4,”Union join “,235],”236”: [2,”Chapter 14: Protecting Data “,288],”115”: [4,”Second normal form “,136]
}[/bookmark]

Related