没有合适的资源?快使用搜索试试~ 我知道了~
首页Oracle 11g数据库概念教程:权威指南
Oracle Database Concepts 11g Release 1 (11.1) 是一份权威的文档,由Oracle公司发布于2011年1月,版权归属于Oracle及其关联公司,享有所有权利。本书主要作者是Richard Strohm,而包括Lance Ashdown、Mark Bauer等在内的多位专家也做出了贡献。这份教材深入探讨了Oracle数据库的核心概念和技术,适用于数据库管理员、开发人员和其他专业人员,以便理解和优化11g版本的数据库管理。
该书涵盖了Oracle数据库的关键特性,如数据模型、体系结构、安全性、并发控制、事务处理、存储管理、备份恢复、性能调优以及SQL语言的高级用法。在11g版本中,Oracle引入了新的功能,例如实时应用集群(RAC)技术,提高了数据库的可用性和性能;此外,Oracle Database 11g强化了安全措施,包括增强的身份验证方法和数据加密,以应对日益复杂的威胁环境。
书中还介绍了Oracle的数据仓库解决方案,如Oracle BI Suite,以及与XML和Web服务集成的相关内容。对于数据库设计者,章节会涉及规范化原则和数据库设计的最佳实践,帮助读者构建高效、可扩展的数据库架构。
此外,这本书也包含了实用的故障排除和问题解决技巧,以及对Oracle Enterprise Manager的深入介绍,它是Oracle数据库管理的重要工具。学习者将通过本书了解到如何利用这些工具进行监控、维护和性能分析。
值得注意的是,使用本书时必须遵守所附的许可证协议,该协议规定了使用和披露的限制,并受到知识产权法律的保护。书中还列举了一些贡献者的名单,他们为本书的完善和发展做出了贡献,包括Omar Alonso、Penny Avril等。
Oracle Database Concepts 11g.pdf是Oracle数据库领域不可或缺的参考文献,无论是初学者还是经验丰富的专业人士,都可以从中获取深入了解Oracle 11g系统所需的基础知识和深入理解,以提升数据库管理能力。
xvi
SQL for Analysis............................................................................................................................ 16-12
SQL for Modeling.......................................................................................................................... 16-13
Overview of OLAP Capabilities....................................................................................................... 16-13
Full Integration of Multidimensional Technology................................................................... 16-14
Ease of Application Development .............................................................................................. 16-14
Ease of Administration................................................................................................................. 16-14
Security ........................................................................................................................................... 16-15
Unmatched Performance and Scalability .................................................................................. 16-15
Reduced Costs ............................................................................................................................... 16-15
Overview of Data Mining.................................................................................................................. 16-16
17 High Availability
Introduction to High Availability ...................................................................................................... 17-1
Causes Of Downtime............................................................................................................................ 17-2
Protection Against Computer Failures.............................................................................................. 17-2
Overview of Enterprise Grids with Oracle Real Application Clusters and Oracle Clusterware ...
17-3
Fast Start Fault Recovery................................................................................................................ 17-4
Oracle Data Guard .......................................................................................................................... 17-4
Oracle Streams................................................................................................................................. 17-5
Protection Against Data Failures........................................................................................................ 17-5
Protecting Against Storage Failures ............................................................................................. 17-6
Protecting Against Human Errors................................................................................................ 17-7
Guarding Against Human Errors.......................................................................................... 17-7
Oracle Flashback Technology ................................................................................................ 17-7
LogMiner SQL-Based Log Analyzer .................................................................................. 17-10
Protecting Against Data Corruptions ................................................................................. 17-10
Protecting Against Site Failures........................................................................................... 17-13
Avoiding Downtime During Planned Maintenance .................................................................... 17-16
Avoiding Downtime for Data Changes ..................................................................................... 17-16
Online Schema and Data Reorganization........................................................................... 17-17
Partitioned Tables and Indexes............................................................................................ 17-17
Avoiding Downtime for System Changes................................................................................. 17-18
Rolling Patch Updates........................................................................................................... 17-18
Rolling Release Upgrade....................................................................................................... 17-19
Dynamic Resource Provisioning.......................................................................................... 17-19
Maximum Availability Architecture (MAA) Best Practices........................................................ 17-20
18 Very Large Databases (VLDB)
Introduction to Partitioning ................................................................................................................ 18-1
Partition Key .................................................................................................................................... 18-2
Partitioned Tables ........................................................................................................................... 18-2
Partitioned Index-Organized Tables ............................................................................................ 18-3
Partitioning Methods...................................................................................................................... 18-3
Overview of Partitioned Indexes ....................................................................................................... 18-4
Local Partitioned Indexes............................................................................................................... 18-4
Global Partitioned Indexes ............................................................................................................ 18-5
xvii
Global Range Partitioned Indexes......................................................................................... 18-5
Global Hash Partitioned Indexes........................................................................................... 18-5
Maintenance of Global Partitioned Indexes......................................................................... 18-5
Global Nonpartitioned Indexes..................................................................................................... 18-6
Miscellaneous Information about Creating Indexes on Partitioned Tables ........................... 18-6
Using Partitioned Indexes in OLTP Applications...................................................................... 18-6
Using Partitioned Indexes in Data Warehousing and DSS Applications ............................... 18-6
Partitioned Indexes on Composite Partitions ............................................................................. 18-7
Partitioning to Improve Performance................................................................................................ 18-7
Partition Pruning............................................................................................................................. 18-7
Partition Pruning Example..................................................................................................... 18-8
Partition-wise Joins ......................................................................................................................... 18-8
19 Content Management
Introduction to Content Management............................................................................................... 19-1
Overview of XML in Oracle Database .............................................................................................. 19-2
Overview of LOBs................................................................................................................................. 19-3
Overview of Oracle Text....................................................................................................................... 19-3
Oracle Text Index Types................................................................................................................. 19-4
Oracle Text Document Services .................................................................................................... 19-4
Oracle Text Query Package............................................................................................................ 19-5
Oracle Text Advanced Features.................................................................................................... 19-5
Overview of Oracle Ultra Search........................................................................................................ 19-5
Overview of Oracle Multimedia ........................................................................................................ 19-6
Overview of Oracle Spatial ................................................................................................................. 19-7
20 Database Security
Introduction to Database Security ..................................................................................................... 20-1
Database Users and Schemas ........................................................................................................ 20-1
Security Domain ...................................................................................................................... 20-2
Privileges .......................................................................................................................................... 20-2
Roles .................................................................................................................................................. 20-2
Storage Settings and Quotas.......................................................................................................... 20-2
Default Tablespace .................................................................................................................. 20-2
Temporary Tablespace ........................................................................................................... 20-3
Tablespace Quotas ................................................................................................................... 20-3
Profiles and Resource Limits.................................................................................................. 20-3
Overview of Transparent Data Encryption ...................................................................................... 20-3
Tablespace Encryption ................................................................................................................... 20-4
Overview of Authentication Methods ............................................................................................. 20-4
Authentication by the Operating System ................................................................................... 20-5
Authentication by the Network ................................................................................................... 20-5
Third Party-Based Authentication Technologies ................................................................ 20-5
Public-Key-Infrastructure-Based Authentication................................................................ 20-5
Remote Authentication ........................................................................................................... 20-6
Authentication by Oracle Database.............................................................................................. 20-6
xviii
Password Encryption .............................................................................................................. 20-6
Account Locking ..................................................................................................................... 20-7
Password Lifetime and Expiration ....................................................................................... 20-7
Password Complexity Verification ....................................................................................... 20-7
Multitier Authentication and Authorization ............................................................................. 20-7
Authentication by the Secure Socket Layer Protocol................................................................. 20-8
Authentication of Database Administrators .............................................................................. 20-8
Overview of Authorization ................................................................................................................ 20-9
User Resource Limits and Profiles................................................................................................ 20-9
Types of System Resources and Limits .............................................................................. 20-10
Profiles .................................................................................................................................... 20-11
Introduction to Privileges ............................................................................................................ 20-12
System Privileges ................................................................................................................... 20-12
Schema Object Privileges ...................................................................................................... 20-13
Introduction to Roles .................................................................................................................... 20-13
Common Uses for Roles ....................................................................................................... 20-14
Role Mechanisms ................................................................................................................... 20-15
The Operating System and Roles ........................................................................................ 20-15
Secure Application Roles ............................................................................................................. 20-15
Overview of Access Restrictions on Tables, Views, Synonyms, or Rows................................ 20-16
Fine-Grained Access Control....................................................................................................... 20-16
Dynamic Predicates .............................................................................................................. 20-17
Application Context...................................................................................................................... 20-17
Dynamic Contexts.................................................................................................................. 20-17
Fine-Grained Auditing ................................................................................................................. 20-18
Overview of Security Policies .......................................................................................................... 20-18
System Security Policy.................................................................................................................. 20-18
Database User Management................................................................................................. 20-19
User Authentication............................................................................................................... 20-19
Operating System Security ................................................................................................... 20-19
Data Security Policy...................................................................................................................... 20-19
User Security Policy...................................................................................................................... 20-20
General User Security............................................................................................................ 20-20
End-User Security .................................................................................................................. 20-20
Administrator Security.......................................................................................................... 20-21
Application Developer Security...........................................................................................
20-21
A
p
plication Administrator Security.................................................................................... 20-22
Password Management Policy.................................................................................................... 20-22
Auditing Policy.............................................................................................................................. 20-22
Overview of Database Auditing....................................................................................................... 20-23
Types and Records of Auditing .................................................................................................. 20-23
Audit Records and the Audit Trails.................................................................................... 20-24
21 Data Integrity
Introduction to Data Integrity............................................................................................................. 21-1
Data Integrity Rules ....................................................................................................................... 21-1
How Oracle Database Enforces Data Integrity .......................................................................... 21-2
xix
Constraint States.............................................................................................................................. 21-2
Overview of Integrity Constraints ..................................................................................................... 21-3
Advantages of Integrity Constraints ........................................................................................... 21-4
Declarative Ease ....................................................................................................................... 21-4
Centralized Rules..................................................................................................................... 21-4
Maximum Application Development Productivity............................................................ 21-4
Immediate User Feedback ...................................................................................................... 21-5
Flexibility for Data Loads and Identification of Integrity Violations............................... 21-5
The Performance Cost of Integrity Constraints ......................................................................... 21-5
Types of Integrity Constraints ............................................................................................................ 21-5
NOT NULL Integrity Constraints ................................................................................................ 21-5
UNIQUE Key Integrity Constraints ............................................................................................ 21-6
Unique Keys.............................................................................................................................. 21-6
Combining UNIQUE Key and NOT NULL Integrity Constraints ................................... 21-6
PRIMARY KEY Integrity Constraints ......................................................................................... 21-6
Primary Keys ............................................................................................................................ 21-7
PRIMARY KEY Constraints and Indexes............................................................................. 21-7
Referential Integrity Constraints .................................................................................................. 21-7
Self-Referential Integrity Constraints.................................................................................... 21-9
Nulls and Foreign Keys........................................................................................................... 21-9
Actions Defined by Referential Integrity Constraints ........................................................ 21-9
Concurrency Control, Indexes, and Foreign Keys ............................................................ 21-10
CHECK Integrity Constraints ..................................................................................................... 21-12
The Check Condition............................................................................................................. 21-13
Multiple CHECK Constraints .............................................................................................. 21-13
The Mechanisms of Constraint Checking ...................................................................................... 21-13
Default Column Values and Integrity Constraint Checking ................................................. 21-15
Deferred Constraint Checking.......................................................................................................... 21-15
Constraint Attributes ................................................................................................................... 21-15
SET CONSTRAINTS Mode ........................................................................................................ 21-15
Unique Constraints and Indexes ................................................................................................ 21-16
22 Triggers
Introduction to Triggers ....................................................................................................................... 22-1
How Triggers Are Used ................................................................................................................ 22-2
Some Cautionary Notes about Triggers .............................................................................. 22-3
Triggers Compared with Declarative Integrity Constraints ............................................. 22-3
Components of a Trigger...................................................................................................................... 22-3
The Triggering Event or Statement .............................................................................................. 22-4
Trigger Restriction .......................................................................................................................... 22-5
Trigger Action ................................................................................................................................. 22-5
Types of Triggers ................................................................................................................................... 22-5
Row Triggers and Statement Triggers ........................................................................................ 22-5
Row Triggers ........................................................................................................................... 22-6
Statement Triggers .................................................................................................................. 22-6
BEFORE and AFTER Triggers ...................................................................................................... 22-6
BEFORE Triggers .................................................................................................................... 22-6
xx
AFTER Triggers ....................................................................................................................... 22-7
Trigger Type Combinations .................................................................................................. 22-7
Compound Triggers........................................................................................................................ 22-7
INSTEAD OF Triggers ................................................................................................................... 22-8
Modify Views .......................................................................................................................... 22-8
Views That Are Not Modifiable ............................................................................................ 22-9
INSTEAD OF Triggers on Nested Tables ............................................................................ 22-9
Triggers on System Events and User Events .............................................................................. 22-9
Event Publication .................................................................................................................. 22-10
Event Attributes .................................................................................................................... 22-10
System Events ........................................................................................................................ 22-11
User Events ............................................................................................................................ 22-11
Trigger Execution................................................................................................................................. 22-12
The Execution Model for Triggers and Integrity Constraint Checking ............................... 22-13
Data Access for Triggers ............................................................................................................. 22-13
Storage of PL/SQL Triggers........................................................................................................ 22-13
Execution of Triggers ................................................................................................................... 22-13
Dependency Maintenance for Triggers ..................................................................................... 22-13
23 Information Integration
Introduction to Oracle Information Integration.............................................................................. 23-1
Federated Access.................................................................................................................................... 23-2
Distributed SQL............................................................................................................................... 23-2
Location Transparency................................................................................................................... 23-3
SQL and COMMIT Transparency................................................................................................. 23-3
Distributed Query Optimization .................................................................................................. 23-4
Information Sharing ............................................................................................................................. 23-4
Oracle Streams................................................................................................................................. 23-5
Oracle Streams Architecture................................................................................................... 23-5
Replication with Oracle Streams............................................................................................ 23-7
Oracle Streams Advanced Queuing...................................................................................... 23-8
Database Change Notification ............................................................................................. 23-10
Change Data Capture............................................................................................................ 23-10
Heterogeneous Environments.............................................................................................. 23-11
Oracle Streams Use Cases..................................................................................................... 23-11
Materialized Views ....................................................................................................................... 23-12
Data Comparison and Convergence at Oracle Databases ........................................................... 23-13
Integrating Non-Oracle Systems ...................................................................................................... 23-13
Generic Connectivity .................................................................................................................... 23-14
Oracle Database Gateways .......................................................................................................... 23-14
Part IV Oracle Database Application Development
24 SQL
Introduction to SQL .............................................................................................................................. 24-1
SQL Statements ..................................................................................................................................... 24-2
剩余555页未读,继续阅读
点击了解资源详情
点击了解资源详情
点击了解资源详情
2010-12-27 上传
2013-12-26 上传
2011-08-15 上传
2013-12-09 上传
2008-01-22 上传
2020-05-18 上传
小筱在线
- 粉丝: 3488
- 资源: 37
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 深入浅出:自定义 Grunt 任务的实践指南
- 网络物理突变工具的多点路径规划实现与分析
- multifeed: 实现多作者间的超核心共享与同步技术
- C++商品交易系统实习项目详细要求
- macOS系统Python模块whl包安装教程
- 掌握fullstackJS:构建React框架与快速开发应用
- React-Purify: 实现React组件纯净方法的工具介绍
- deck.js:构建现代HTML演示的JavaScript库
- nunn:现代C++17实现的机器学习库开源项目
- Python安装包 Acquisition-4.12-cp35-cp35m-win_amd64.whl.zip 使用说明
- Amaranthus-tuberculatus基因组分析脚本集
- Ubuntu 12.04下Realtek RTL8821AE驱动的向后移植指南
- 掌握Jest环境下的最新jsdom功能
- CAGI Toolkit:开源Asterisk PBX的AGI应用开发
- MyDropDemo: 体验QGraphicsView的拖放功能
- 远程FPGA平台上的Quartus II17.1 LCD色块闪烁现象解析
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功