没有合适的资源?快使用搜索试试~ 我知道了~
首页Oracle 11g数据库概念教程:权威指南
Oracle Database Concepts 11g Release 1 (11.1) 是一份权威的文档,由Oracle公司发布于2011年1月,版权归属于Oracle及其关联公司,享有所有权利。本书主要作者是Richard Strohm,而包括Lance Ashdown、Mark Bauer等在内的多位专家也做出了贡献。这份教材深入探讨了Oracle数据库的核心概念和技术,适用于数据库管理员、开发人员和其他专业人员,以便理解和优化11g版本的数据库管理。
该书涵盖了Oracle数据库的关键特性,如数据模型、体系结构、安全性、并发控制、事务处理、存储管理、备份恢复、性能调优以及SQL语言的高级用法。在11g版本中,Oracle引入了新的功能,例如实时应用集群(RAC)技术,提高了数据库的可用性和性能;此外,Oracle Database 11g强化了安全措施,包括增强的身份验证方法和数据加密,以应对日益复杂的威胁环境。
书中还介绍了Oracle的数据仓库解决方案,如Oracle BI Suite,以及与XML和Web服务集成的相关内容。对于数据库设计者,章节会涉及规范化原则和数据库设计的最佳实践,帮助读者构建高效、可扩展的数据库架构。
此外,这本书也包含了实用的故障排除和问题解决技巧,以及对Oracle Enterprise Manager的深入介绍,它是Oracle数据库管理的重要工具。学习者将通过本书了解到如何利用这些工具进行监控、维护和性能分析。
值得注意的是,使用本书时必须遵守所附的许可证协议,该协议规定了使用和披露的限制,并受到知识产权法律的保护。书中还列举了一些贡献者的名单,他们为本书的完善和发展做出了贡献,包括Omar Alonso、Penny Avril等。
Oracle Database Concepts 11g.pdf是Oracle数据库领域不可或缺的参考文献,无论是初学者还是经验丰富的专业人士,都可以从中获取深入了解Oracle 11g系统所需的基础知识和深入理解,以提升数据库管理能力。
![](https://csdnimg.cn/release/download_crawler_static/82802031/bg10.jpg)
xvi
SQL for Analysis............................................................................................................................ 16-12
SQL for Modeling.......................................................................................................................... 16-13
Overview of OLAP Capabilities....................................................................................................... 16-13
Full Integration of Multidimensional Technology................................................................... 16-14
Ease of Application Development .............................................................................................. 16-14
Ease of Administration................................................................................................................. 16-14
Security ........................................................................................................................................... 16-15
Unmatched Performance and Scalability .................................................................................. 16-15
Reduced Costs ............................................................................................................................... 16-15
Overview of Data Mining.................................................................................................................. 16-16
17 High Availability
Introduction to High Availability ...................................................................................................... 17-1
Causes Of Downtime............................................................................................................................ 17-2
Protection Against Computer Failures.............................................................................................. 17-2
Overview of Enterprise Grids with Oracle Real Application Clusters and Oracle Clusterware ...
17-3
Fast Start Fault Recovery................................................................................................................ 17-4
Oracle Data Guard .......................................................................................................................... 17-4
Oracle Streams................................................................................................................................. 17-5
Protection Against Data Failures........................................................................................................ 17-5
Protecting Against Storage Failures ............................................................................................. 17-6
Protecting Against Human Errors................................................................................................ 17-7
Guarding Against Human Errors.......................................................................................... 17-7
Oracle Flashback Technology ................................................................................................ 17-7
LogMiner SQL-Based Log Analyzer .................................................................................. 17-10
Protecting Against Data Corruptions ................................................................................. 17-10
Protecting Against Site Failures........................................................................................... 17-13
Avoiding Downtime During Planned Maintenance .................................................................... 17-16
Avoiding Downtime for Data Changes ..................................................................................... 17-16
Online Schema and Data Reorganization........................................................................... 17-17
Partitioned Tables and Indexes............................................................................................ 17-17
Avoiding Downtime for System Changes................................................................................. 17-18
Rolling Patch Updates........................................................................................................... 17-18
Rolling Release Upgrade....................................................................................................... 17-19
Dynamic Resource Provisioning.......................................................................................... 17-19
Maximum Availability Architecture (MAA) Best Practices........................................................ 17-20
18 Very Large Databases (VLDB)
Introduction to Partitioning ................................................................................................................ 18-1
Partition Key .................................................................................................................................... 18-2
Partitioned Tables ........................................................................................................................... 18-2
Partitioned Index-Organized Tables ............................................................................................ 18-3
Partitioning Methods...................................................................................................................... 18-3
Overview of Partitioned Indexes ....................................................................................................... 18-4
Local Partitioned Indexes............................................................................................................... 18-4
Global Partitioned Indexes ............................................................................................................ 18-5
![](https://csdnimg.cn/release/download_crawler_static/82802031/bg11.jpg)
xvii
Global Range Partitioned Indexes......................................................................................... 18-5
Global Hash Partitioned Indexes........................................................................................... 18-5
Maintenance of Global Partitioned Indexes......................................................................... 18-5
Global Nonpartitioned Indexes..................................................................................................... 18-6
Miscellaneous Information about Creating Indexes on Partitioned Tables ........................... 18-6
Using Partitioned Indexes in OLTP Applications...................................................................... 18-6
Using Partitioned Indexes in Data Warehousing and DSS Applications ............................... 18-6
Partitioned Indexes on Composite Partitions ............................................................................. 18-7
Partitioning to Improve Performance................................................................................................ 18-7
Partition Pruning............................................................................................................................. 18-7
Partition Pruning Example..................................................................................................... 18-8
Partition-wise Joins ......................................................................................................................... 18-8
19 Content Management
Introduction to Content Management............................................................................................... 19-1
Overview of XML in Oracle Database .............................................................................................. 19-2
Overview of LOBs................................................................................................................................. 19-3
Overview of Oracle Text....................................................................................................................... 19-3
Oracle Text Index Types................................................................................................................. 19-4
Oracle Text Document Services .................................................................................................... 19-4
Oracle Text Query Package............................................................................................................ 19-5
Oracle Text Advanced Features.................................................................................................... 19-5
Overview of Oracle Ultra Search........................................................................................................ 19-5
Overview of Oracle Multimedia ........................................................................................................ 19-6
Overview of Oracle Spatial ................................................................................................................. 19-7
20 Database Security
Introduction to Database Security ..................................................................................................... 20-1
Database Users and Schemas ........................................................................................................ 20-1
Security Domain ...................................................................................................................... 20-2
Privileges .......................................................................................................................................... 20-2
Roles .................................................................................................................................................. 20-2
Storage Settings and Quotas.......................................................................................................... 20-2
Default Tablespace .................................................................................................................. 20-2
Temporary Tablespace ........................................................................................................... 20-3
Tablespace Quotas ................................................................................................................... 20-3
Profiles and Resource Limits.................................................................................................. 20-3
Overview of Transparent Data Encryption ...................................................................................... 20-3
Tablespace Encryption ................................................................................................................... 20-4
Overview of Authentication Methods ............................................................................................. 20-4
Authentication by the Operating System ................................................................................... 20-5
Authentication by the Network ................................................................................................... 20-5
Third Party-Based Authentication Technologies ................................................................ 20-5
Public-Key-Infrastructure-Based Authentication................................................................ 20-5
Remote Authentication ........................................................................................................... 20-6
Authentication by Oracle Database.............................................................................................. 20-6
![](https://csdnimg.cn/release/download_crawler_static/82802031/bg12.jpg)
xviii
Password Encryption .............................................................................................................. 20-6
Account Locking ..................................................................................................................... 20-7
Password Lifetime and Expiration ....................................................................................... 20-7
Password Complexity Verification ....................................................................................... 20-7
Multitier Authentication and Authorization ............................................................................. 20-7
Authentication by the Secure Socket Layer Protocol................................................................. 20-8
Authentication of Database Administrators .............................................................................. 20-8
Overview of Authorization ................................................................................................................ 20-9
User Resource Limits and Profiles................................................................................................ 20-9
Types of System Resources and Limits .............................................................................. 20-10
Profiles .................................................................................................................................... 20-11
Introduction to Privileges ............................................................................................................ 20-12
System Privileges ................................................................................................................... 20-12
Schema Object Privileges ...................................................................................................... 20-13
Introduction to Roles .................................................................................................................... 20-13
Common Uses for Roles ....................................................................................................... 20-14
Role Mechanisms ................................................................................................................... 20-15
The Operating System and Roles ........................................................................................ 20-15
Secure Application Roles ............................................................................................................. 20-15
Overview of Access Restrictions on Tables, Views, Synonyms, or Rows................................ 20-16
Fine-Grained Access Control....................................................................................................... 20-16
Dynamic Predicates .............................................................................................................. 20-17
Application Context...................................................................................................................... 20-17
Dynamic Contexts.................................................................................................................. 20-17
Fine-Grained Auditing ................................................................................................................. 20-18
Overview of Security Policies .......................................................................................................... 20-18
System Security Policy.................................................................................................................. 20-18
Database User Management................................................................................................. 20-19
User Authentication............................................................................................................... 20-19
Operating System Security ................................................................................................... 20-19
Data Security Policy...................................................................................................................... 20-19
User Security Policy...................................................................................................................... 20-20
General User Security............................................................................................................ 20-20
End-User Security .................................................................................................................. 20-20
Administrator Security.......................................................................................................... 20-21
Application Developer Security...........................................................................................
20-21
A
p
plication Administrator Security.................................................................................... 20-22
Password Management Policy.................................................................................................... 20-22
Auditing Policy.............................................................................................................................. 20-22
Overview of Database Auditing....................................................................................................... 20-23
Types and Records of Auditing .................................................................................................. 20-23
Audit Records and the Audit Trails.................................................................................... 20-24
21 Data Integrity
Introduction to Data Integrity............................................................................................................. 21-1
Data Integrity Rules ....................................................................................................................... 21-1
How Oracle Database Enforces Data Integrity .......................................................................... 21-2
![](https://csdnimg.cn/release/download_crawler_static/82802031/bg13.jpg)
xix
Constraint States.............................................................................................................................. 21-2
Overview of Integrity Constraints ..................................................................................................... 21-3
Advantages of Integrity Constraints ........................................................................................... 21-4
Declarative Ease ....................................................................................................................... 21-4
Centralized Rules..................................................................................................................... 21-4
Maximum Application Development Productivity............................................................ 21-4
Immediate User Feedback ...................................................................................................... 21-5
Flexibility for Data Loads and Identification of Integrity Violations............................... 21-5
The Performance Cost of Integrity Constraints ......................................................................... 21-5
Types of Integrity Constraints ............................................................................................................ 21-5
NOT NULL Integrity Constraints ................................................................................................ 21-5
UNIQUE Key Integrity Constraints ............................................................................................ 21-6
Unique Keys.............................................................................................................................. 21-6
Combining UNIQUE Key and NOT NULL Integrity Constraints ................................... 21-6
PRIMARY KEY Integrity Constraints ......................................................................................... 21-6
Primary Keys ............................................................................................................................ 21-7
PRIMARY KEY Constraints and Indexes............................................................................. 21-7
Referential Integrity Constraints .................................................................................................. 21-7
Self-Referential Integrity Constraints.................................................................................... 21-9
Nulls and Foreign Keys........................................................................................................... 21-9
Actions Defined by Referential Integrity Constraints ........................................................ 21-9
Concurrency Control, Indexes, and Foreign Keys ............................................................ 21-10
CHECK Integrity Constraints ..................................................................................................... 21-12
The Check Condition............................................................................................................. 21-13
Multiple CHECK Constraints .............................................................................................. 21-13
The Mechanisms of Constraint Checking ...................................................................................... 21-13
Default Column Values and Integrity Constraint Checking ................................................. 21-15
Deferred Constraint Checking.......................................................................................................... 21-15
Constraint Attributes ................................................................................................................... 21-15
SET CONSTRAINTS Mode ........................................................................................................ 21-15
Unique Constraints and Indexes ................................................................................................ 21-16
22 Triggers
Introduction to Triggers ....................................................................................................................... 22-1
How Triggers Are Used ................................................................................................................ 22-2
Some Cautionary Notes about Triggers .............................................................................. 22-3
Triggers Compared with Declarative Integrity Constraints ............................................. 22-3
Components of a Trigger...................................................................................................................... 22-3
The Triggering Event or Statement .............................................................................................. 22-4
Trigger Restriction .......................................................................................................................... 22-5
Trigger Action ................................................................................................................................. 22-5
Types of Triggers ................................................................................................................................... 22-5
Row Triggers and Statement Triggers ........................................................................................ 22-5
Row Triggers ........................................................................................................................... 22-6
Statement Triggers .................................................................................................................. 22-6
BEFORE and AFTER Triggers ...................................................................................................... 22-6
BEFORE Triggers .................................................................................................................... 22-6
![](https://csdnimg.cn/release/download_crawler_static/82802031/bg14.jpg)
xx
AFTER Triggers ....................................................................................................................... 22-7
Trigger Type Combinations .................................................................................................. 22-7
Compound Triggers........................................................................................................................ 22-7
INSTEAD OF Triggers ................................................................................................................... 22-8
Modify Views .......................................................................................................................... 22-8
Views That Are Not Modifiable ............................................................................................ 22-9
INSTEAD OF Triggers on Nested Tables ............................................................................ 22-9
Triggers on System Events and User Events .............................................................................. 22-9
Event Publication .................................................................................................................. 22-10
Event Attributes .................................................................................................................... 22-10
System Events ........................................................................................................................ 22-11
User Events ............................................................................................................................ 22-11
Trigger Execution................................................................................................................................. 22-12
The Execution Model for Triggers and Integrity Constraint Checking ............................... 22-13
Data Access for Triggers ............................................................................................................. 22-13
Storage of PL/SQL Triggers........................................................................................................ 22-13
Execution of Triggers ................................................................................................................... 22-13
Dependency Maintenance for Triggers ..................................................................................... 22-13
23 Information Integration
Introduction to Oracle Information Integration.............................................................................. 23-1
Federated Access.................................................................................................................................... 23-2
Distributed SQL............................................................................................................................... 23-2
Location Transparency................................................................................................................... 23-3
SQL and COMMIT Transparency................................................................................................. 23-3
Distributed Query Optimization .................................................................................................. 23-4
Information Sharing ............................................................................................................................. 23-4
Oracle Streams................................................................................................................................. 23-5
Oracle Streams Architecture................................................................................................... 23-5
Replication with Oracle Streams............................................................................................ 23-7
Oracle Streams Advanced Queuing...................................................................................... 23-8
Database Change Notification ............................................................................................. 23-10
Change Data Capture............................................................................................................ 23-10
Heterogeneous Environments.............................................................................................. 23-11
Oracle Streams Use Cases..................................................................................................... 23-11
Materialized Views ....................................................................................................................... 23-12
Data Comparison and Convergence at Oracle Databases ........................................................... 23-13
Integrating Non-Oracle Systems ...................................................................................................... 23-13
Generic Connectivity .................................................................................................................... 23-14
Oracle Database Gateways .......................................................................................................... 23-14
Part IV Oracle Database Application Development
24 SQL
Introduction to SQL .............................................................................................................................. 24-1
SQL Statements ..................................................................................................................................... 24-2
剩余555页未读,继续阅读
点击了解资源详情
点击了解资源详情
109 浏览量
2010-12-27 上传
164 浏览量
2011-08-15 上传
2008-01-22 上传
221 浏览量
468 浏览量
![](https://profile-avatar.csdnimg.cn/09e52ab48bf64b8da8bf3d91fb7b5f40_m0_37649480.jpg!1)
![](https://csdnimg.cn/release/wenkucmsfe/public/img/user-vip.1c89f3c5.png)
小筱在线
- 粉丝: 4373
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助
![](https://csdnimg.cn/release/wenkucmsfe/public/img/voice.245cc511.png)
最新资源
- SmartGit最新版本18.1.1,Git可视化操作更简单
- 探索环境公平:团队项目与可视化研究
- Deno分支的grammy_i18n:本地化支持与TypeScript集成
- EditPlus文本编辑器:Windows平台的好替代
- Code Compare:VS代码比较工具的官方免费安装版
- 全屏秒表倒计时工具:美观易用的计时软件
- 实现教育系统批处理与UI交互的EDUC-PEN-REG-BATCH-API
- IntelliJ Protobuf插件:高效支持Protobuf语言的开发工具
- 海康DS-8632N-E8固件20171211升级指南
- 手机联系人数据通过Service加载至缓存技术解析
- 像素小秘书V1.03绿色免费版:RPG游戏辅助工具
- 创新设计:防折书弹性书夹的原理与应用
- 代码构建的浪漫表白网页 - 学习新技术的项目展示
- 贝基·班伯里·摩根分析全球森林生产力趋势
- CyJsonView v2.3.1: 强大JSON处理与格式化工具
- Java基础入门到进阶全面提升指南
安全验证
文档复制为VIP权益,开通VIP直接复制
![](https://csdnimg.cn/release/wenkucmsfe/public/img/green-success.6a4acb44.png)