没有合适的资源?快使用搜索试试~ 我知道了~
首页Oracle数据库概念详解:10g Release 2版本
Oracle数据库概念详解:10g Release 2版本
需积分: 1 1 下载量 189 浏览量
更新于2024-07-18
收藏 4.57MB PDF 举报
Oracle® Database Concepts En
Oracle® Database Concepts En 是一本关于 Oracle 数据库概念的英文版书籍,虽然看着有点吃力,但是对数据库入门和进阶都有一些用处。下面是根据书籍内容总结的相关知识点:
1. Oracle 数据库架构:Oracle 数据库是一个关系型数据库管理系统(RDBMS),它使用一种基于客户端-服务器的架构。客户端可以是任何可以连接到数据库的应用程序,而服务器则是负责管理和存储数据的Oracle 数据库实例。
2. 数据库实例:Oracle 数据库实例是一个运行在服务器上的进程,它负责管理和存储数据。一个数据库实例可以包含多个数据库,而每个数据库又可以包含多个表空间。
3. 表空间:表空间是一个逻辑的存储结构,它是 Oracle 数据库中存储数据的基本单位。一个表空间可以包含多个段,例如表、索引、视图等。
4. 段:段是一个物理的存储结构,它是 Oracle 数据库中存储数据的基本单位。一个段可以包含多个数据块,每个数据块可以存储多个记录。
5. 记录:记录是一个逻辑的数据单元,它是 Oracle 数据库中存储数据的基本单位。一个记录可以包含多个字段,每个字段都有其特定的数据类型。
6. 数据类型:Oracle 数据库支持多种数据类型,例如数字、字符、日期、时间等。每种数据类型都有其特定的存储格式和操作规则。
7. SQL 语言:SQL(Structured Query Language)是一种标准化的数据库语言,用于操作和管理 Oracle 数据库。SQL 语言可以用来创建、修改和查询数据库中的数据。
8. 数据库安全:Oracle 数据库提供了多种安全机制来保护数据的安全,例如身份验证、授权、加密等。这些机制可以防止非法访问和数据泄露。
9. 数据备份和恢复:Oracle 数据库提供了多种数据备份和恢复机制,例如数据泄露恢复、数据库快照等。这些机制可以确保数据的安全和可靠性。
10. Oracle 数据库管理:Oracle 数据库管理是一个复杂的过程,涉及到数据库的设计、实现、维护和优化等多个方面。一个好的数据库管理是确保数据库安全、可靠和高效运行的关键。
11. 数据库性能优化:Oracle 数据库性能优化是一个重要的方面,涉及到数据库的设计、实现和优化等多个方面。一个好的数据库性能优化可以提高数据库的响应速度和处理能力。
12. 数据库故障恢复:Oracle 数据库故障恢复是一个重要的方面,涉及到数据库的故障诊断、故障恢复和数据恢复等多个方面。一个好的数据库故障恢复可以确保数据库的可靠性和安全性。
Oracle® Database Concepts En 是一本关于 Oracle 数据库概念的综合性书籍,涵盖了 Oracle 数据库的架构、数据库实例、表空间、段、记录、数据类型、SQL 语言、数据库安全、数据备份和恢复、数据库管理、数据库性能优化和数据库故障恢复等多个方面。
xvi
Nonvolatile ............................................................................................................................... 16-2
Time Variant ............................................................................................................................. 16-2
Differences Between Data Warehouse and OLTP Systems ...................................................... 16-2
Workload................................................................................................................................... 16-2
Data Modifications................................................................................................................... 16-2
Schema Design ......................................................................................................................... 16-3
Typical Operations................................................................................................................... 16-3
Historical Data.......................................................................................................................... 16-3
Data Warehouse Architecture....................................................................................................... 16-3
Data Warehouse Architecture (Basic)................................................................................... 16-3
Data Warehouse Architecture (with a Staging Area) ......................................................... 16-4
Data Warehouse Architecture (with a Staging Area and Data Marts)............................. 16-5
Overview of Extraction, Transformation, and Loading (ETL) ...................................................... 16-6
Transportable Tablespaces............................................................................................................. 16-7
Table Functions................................................................................................................................ 16-7
External Tables ................................................................................................................................ 16-8
Table Compression ......................................................................................................................... 16-8
Change Data Capture ..................................................................................................................... 16-9
Overview of Materialized Views for Data Warehouses................................................................. 16-9
Overview of Bitmap Indexes in Data Warehousing..................................................................... 16-10
Overview of Parallel Execution ........................................................................................................ 16-11
How Parallel Execution Works................................................................................................... 16-11
Overview of Analytic SQL ................................................................................................................ 16-12
SQL for Aggregation..................................................................................................................... 16-13
SQL for Analysis............................................................................................................................ 16-13
SQL for Modeling.......................................................................................................................... 16-14
Overview of OLAP Capabilities....................................................................................................... 16-14
Benefits of OLAP and RDBMS Integration ............................................................................... 16-14
Scalability ................................................................................................................................ 16-15
Availability.............................................................................................................................. 16-15
Manageability......................................................................................................................... 16-15
Backup and Recovery............................................................................................................ 16-15
Security.................................................................................................................................... 16-16
Overview of Data Mining.................................................................................................................. 16-16
17 High Availability
Introduction to High Availability ...................................................................................................... 17-1
Overview of Unplanned Downtime.................................................................................................. 17-1
Oracle Solutions to System Failures............................................................................................. 17-1
Overview of Fast-Start Fault Recovery ................................................................................ 17-2
Overview of Real Application Clusters................................................................................ 17-2
Oracle Solutions to Data Failures.................................................................................................. 17-2
Overview of Backup and Recovery Features for High Availability................................. 17-2
Overview of Partitioning ....................................................................................................... 17-3
Overview of Transparent Application Failover .................................................................. 17-4
Oracle Solutions to Disasters......................................................................................................... 17-5
Overview of Oracle Data Guard............................................................................................ 17-5
xvii
Oracle Solutions to Human Errors ............................................................................................... 17-6
Overview of Oracle Flashback Features............................................................................... 17-7
Overview of LogMiner............................................................................................................ 17-7
Overview of Security Features for High Availability......................................................... 17-8
Overview of Planned Downtime ....................................................................................................... 17-8
System Maintenance....................................................................................................................... 17-8
Data Maintenance ........................................................................................................................... 17-9
Database Maintenance.................................................................................................................... 17-9
18 Partitioned Tables and Indexes
Introduction to Partitioning ................................................................................................................ 18-1
Partition Key .................................................................................................................................... 18-3
Partitioned Tables ........................................................................................................................... 18-3
Partitioned Index-Organized Tables ............................................................................................ 18-3
Overview of Partitioning Methods.................................................................................................... 18-3
Range Partitioning .......................................................................................................................... 18-4
Range Partitioning Example................................................................................................... 18-5
List Partitioning............................................................................................................................... 18-5
List Partitioning Example ....................................................................................................... 18-5
Hash Partitioning ............................................................................................................................ 18-6
Hash Partitioning Example .................................................................................................... 18-6
Composite Partitioning .................................................................................................................. 18-7
Composite Partitioning Range-Hash Example.................................................................... 18-7
Composite Partitioning Range-List Example ...................................................................... 18-8
When to Partition a Table .............................................................................................................. 18-9
Overview of Partitioned Indexes ....................................................................................................... 18-9
Local Partitioned Indexes............................................................................................................. 18-10
Global Partitioned Indexes .......................................................................................................... 18-10
Global Range Partitioned Indexes....................................................................................... 18-10
Global Hash Partitioned Indexes......................................................................................... 18-11
Maintenance of Global Partitioned Indexes....................................................................... 18-11
Global Nonpartitioned Indexes................................................................................................... 18-12
Miscellaneous Information about Creating Indexes on Partitioned Tables ......................... 18-12
Using Partitioned Indexes in OLTP Applications.................................................................... 18-13
Using Partitioned Indexes in Data Warehousing and DSS Applications ............................. 18-13
Partitioned Indexes on Composite Partitions ........................................................................... 18-13
Partitioning to Improve Performance.............................................................................................. 18-13
Partition Pruning........................................................................................................................... 18-13
Partition Pruning Example................................................................................................... 18-14
Partition-wise Joins....................................................................................................................... 18-14
Parallel DML.................................................................................................................................. 18-14
19 Content Management
Introduction to Content Management............................................................................................... 19-1
Overview of XML in Oracle ................................................................................................................ 19-2
Overview of LOBs................................................................................................................................. 19-3
xviii
Overview of Oracle Text....................................................................................................................... 19-3
Oracle Text Index Types................................................................................................................. 19-4
Oracle Text Document Services .................................................................................................... 19-4
Oracle Text Query Package............................................................................................................ 19-4
Oracle Text Advanced Features.................................................................................................... 19-4
Overview of Oracle Ultra Search........................................................................................................ 19-5
Overview of Oracle interMedia.......................................................................................................... 19-5
Overview of Oracle Spatial ................................................................................................................. 19-6
20 Database Security
Introduction to Database Security ..................................................................................................... 20-1
Database Users and Schemas ........................................................................................................ 20-1
Security Domain ...................................................................................................................... 20-1
Privileges .......................................................................................................................................... 20-2
Roles.................................................................................................................................................. 20-2
Storage Settings and Quotas.......................................................................................................... 20-2
Default Tablespace .................................................................................................................. 20-2
Temporary Tablespace ........................................................................................................... 20-2
Tablespace Quotas ................................................................................................................... 20-2
Profiles and Resource Limits.................................................................................................. 20-2
Overview of Transparent Data Encryption ...................................................................................... 20-3
Overview of Authentication Methods ............................................................................................. 20-4
Authentication by the Operating System ................................................................................... 20-4
Authentication by the Network ................................................................................................... 20-4
Third Party-Based Authentication Technologies ................................................................ 20-5
Public-Key-Infrastructure-Based Authentication................................................................ 20-5
Remote Authentication ........................................................................................................... 20-5
Authentication by the Oracle Database ...................................................................................... 20-5
Password Encryption .............................................................................................................. 20-6
Account Locking ..................................................................................................................... 20-6
Password Lifetime and Expiration ....................................................................................... 20-6
Password Complexity Verification ....................................................................................... 20-6
Multitier Authentication and Authorization ............................................................................. 20-7
Authentication by the Secure Socket Layer Protocol................................................................. 20-7
Authentication of Database Administrators .............................................................................. 20-7
Overview of Authorization ................................................................................................................ 20-8
User Resource Limits and Profiles................................................................................................ 20-9
Types of System Resources and Limits ................................................................................ 20-9
Profiles .................................................................................................................................... 20-11
Introduction to Privileges ............................................................................................................ 20-11
System Privileges ................................................................................................................... 20-12
Schema Object Privileges...................................................................................................... 20-12
Introduction to Roles .................................................................................................................... 20-12
Common Uses for Roles ....................................................................................................... 20-13
Role Mechanisms ................................................................................................................... 20-14
The Operating System and Roles ........................................................................................ 20-14
Secure Application Roles ............................................................................................................. 20-15
xix
Overview of Access Restrictions on Tables, Views, Synonyms, or Rows................................ 20-15
Fine-Grained Access Control....................................................................................................... 20-15
Dynamic Predicates .............................................................................................................. 20-16
Application Context...................................................................................................................... 20-16
Dynamic Contexts.................................................................................................................. 20-16
Fine-Grained Auditing................................................................................................................. 20-17
Overview of Security Policies .......................................................................................................... 20-17
System Security Policy ................................................................................................................. 20-18
Database User Management................................................................................................. 20-18
User Authentication............................................................................................................... 20-18
Operating System Security................................................................................................... 20-18
Data Security Policy...................................................................................................................... 20-18
User Security Policy...................................................................................................................... 20-19
General User Security............................................................................................................ 20-19
End-User Security .................................................................................................................. 20-19
Administrator Security.......................................................................................................... 20-20
Application Developer Security........................................................................................... 20-20
Application Administrator Security.................................................................................... 20-21
Password Management Policy.................................................................................................... 20-21
Auditing Policy.............................................................................................................................. 20-21
Overview of Database Auditing....................................................................................................... 20-21
Types and Records of Auditing .................................................................................................. 20-22
Audit Records and the Audit Trails.................................................................................... 20-23
21 Data Integrity
Introduction to Data Integrity............................................................................................................. 21-1
Types of Data Integrity .................................................................................................................. 21-3
Null Rule ................................................................................................................................... 21-3
Unique Column Values........................................................................................................... 21-3
Primary Key Values................................................................................................................. 21-3
Referential Integrity Rules...................................................................................................... 21-3
Complex Integrity Checking.................................................................................................. 21-3
How Oracle Enforces Data Integrity ........................................................................................... 21-3
Integrity Constraints Description.......................................................................................... 21-4
Database Triggers .................................................................................................................... 21-4
Overview of Integrity Constraints ..................................................................................................... 21-4
Advantages of Integrity Constraints ........................................................................................... 21-5
Declarative Ease ....................................................................................................................... 21-5
Centralized Rules..................................................................................................................... 21-5
Maximum Application Development Productivity............................................................ 21-5
Immediate User Feedback ...................................................................................................... 21-5
Superior Performance.............................................................................................................. 21-5
Flexibility for Data Loads and Identification of Integrity Violations............................... 21-6
The Performance Cost of Integrity Constraints ......................................................................... 21-6
Types of Integrity Constraints ............................................................................................................ 21-6
NOT NULL Integrity Constraints ................................................................................................ 21-6
UNIQUE Key Integrity Constraints ............................................................................................ 21-7
xx
Unique Keys.............................................................................................................................. 21-7
UNIQUE Key Constraints and Indexes................................................................................ 21-8
Combine UNIQUE Key and NOT NULL Integrity Constraints....................................... 21-9
PRIMARY KEY Integrity Constraints ......................................................................................... 21-9
Primary Keys ............................................................................................................................ 21-9
PRIMARY KEY Constraints and Indexes........................................................................... 21-10
Referential Integrity Constraints ................................................................................................ 21-10
Self-Referential Integrity Constraints.................................................................................. 21-12
Nulls and Foreign Keys......................................................................................................... 21-13
Actions Defined by Referential Integrity Constraints...................................................... 21-13
Concurrency Control, Indexes, and Foreign Keys............................................................ 21-14
CHECK Integrity Constraints ..................................................................................................... 21-16
The Check Condition............................................................................................................. 21-16
Multiple CHECK Constraints .............................................................................................. 21-17
The Mechanisms of Constraint Checking ...................................................................................... 21-17
Default Column Values and Integrity Constraint Checking ................................................. 21-19
Deferred Constraint Checking.......................................................................................................... 21-19
Constraint Attributes ................................................................................................................... 21-19
SET CONSTRAINTS Mode ........................................................................................................ 21-19
Unique Constraints and Indexes ................................................................................................ 21-20
Constraint States.................................................................................................................................. 21-20
Constraint State Modification...................................................................................................... 21-21
22 Triggers
Introduction to Triggers ...................................................................................................................... 22-1
How Triggers Are Used ................................................................................................................ 22-2
Some Cautionary Notes about Triggers .............................................................................. 22-3
Triggers Compared with Declarative Integrity Constraints ............................................. 22-4
Parts of a Trigger.................................................................................................................................... 22-5
The Triggering Event or Statement ............................................................................................. 22-5
Trigger Restriction .......................................................................................................................... 22-6
Trigger Action ................................................................................................................................. 22-6
Types of Triggers ................................................................................................................................... 22-7
Row Triggers and Statement Triggers ........................................................................................ 22-7
Row Triggers ........................................................................................................................... 22-7
Statement Triggers .................................................................................................................. 22-7
BEFORE and AFTER Triggers ...................................................................................................... 22-7
BEFORE Triggers .................................................................................................................... 22-8
AFTER Triggers ....................................................................................................................... 22-8
Trigger Type Combinations .................................................................................................. 22-8
INSTEAD OF Triggers ................................................................................................................... 22-9
Modify Views .......................................................................................................................... 22-9
Views That Are Not Modifiable ............................................................................................ 22-9
INSTEAD OF Triggers on Nested Tables .......................................................................... 22-10
Triggers on System Events and User Events ............................................................................ 22-10
Event Publication .................................................................................................................. 22-11
Event Attributes .................................................................................................................... 22-11
剩余541页未读,继续阅读
点击了解资源详情
点击了解资源详情
点击了解资源详情
2014-08-10 上传
2009-08-17 上传
2019-05-28 上传
2007-09-08 上传
2013-11-05 上传
2013-12-09 上传
woxiaoni3000
- 粉丝: 1
- 资源: 3
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- Cucumber-JVM模板项目快速入门教程
- ECharts打造公司组织架构可视化展示
- DC Water Alerts 数据开放平台介绍
- 图形化编程打造智能家居控制系统
- 个人网站构建:使用CSS实现风格化布局
- 使用CANBUS控制LED灯柱颜色的Matlab代码实现
- ACTCMS管理系统安装与更新教程
- 快速查看IP地址及地理位置信息的View My IP插件
- Pandas库助力数据分析与编程效率提升
- Python实现k均值聚类音乐数据可视化分析
- formdotcom打造高效网络表单解决方案
- 仿京东套餐购买列表源码DYCPackage解析
- 开源管理工具orgParty:面向PartySur的多功能应用程序
- Flutter时间跟踪应用Time_tracker入门教程
- AngularJS实现自定义滑动项目及动作指南
- 掌握C++编译时打印:compile-time-printer的使用与原理
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功