没有合适的资源?快使用搜索试试~ 我知道了~
首页掌握Oracle 10g Release 2概念经典教程:B14220-02
Oracle Database Concepts 10g Release 2 (10.2) 是一本经典的Oracle数据库学习资料,由Michele Cyran担任主要作者,Paul Lane和JPPolk等人做出了重要贡献。该书出版于2005年10月,版权属于Oracle公司,享有1993年和2005年的所有权利。这本书详尽介绍了Oracle数据库的核心概念和技术,涵盖了10g版本的特性,适合深入理解Oracle数据库体系结构、数据模型、性能优化、安全性、存储管理和备份恢复等各个方面。
Oracle数据库是一个功能强大的关系型数据库管理系统,其10g版本在当时的市场中占据重要地位。书中涉及的内容包括但不限于:
1. **数据库体系结构**:介绍Oracle数据库的整体架构,包括RAC(Real Application Clusters)分布式系统,以及实例、进程、共享池、后台进程和内存结构等关键组件的工作原理。
2. **SQL语言**:详细解读SQL语言的使用,包括标准SQL、PL/SQL(Procedural Language/Structured Query Language)编程以及存储过程、触发器等内容。
3. **数据模型与设计**:探讨如何设计和优化数据库模式,包括规范化理论、索引策略、分区和分片技术等。
4. **性能调优**:讲解如何通过SQL查询优化、索引管理、表分区、服务器参数调整等方式提高数据库的响应速度和吞吐量。
5. **安全性与权限管理**:介绍Oracle的安全模型,包括角色、权限、加密以及审计等方面,确保数据的完整性和机密性。
6. **存储管理**:涵盖数据文件、控制文件、 redo log、归档日志的组织和管理,以及数据块和段的细节。
7. **备份与恢复**:提供备份策略、归档模式、闪回技术等实用知识,帮助用户处理数据丢失或灾难恢复场景。
8. **程序开发与部署**:涉及Oracle的编程接口和工具,如Oracle SQL Developer、PL/SQL Developer等,以及应用程序部署的最佳实践。
9. **许可证协议与法律问题**:强调了Oracle软件的使用限制、保密协议以及知识产权法律对数据库管理员的重要意义。
这本书不仅是Oracle数据库管理员和技术人员的必备参考书籍,也是初学者入门学习Oracle技术的理想资源。通过深入阅读和实践,读者可以全面掌握Oracle数据库的关键概念和技术,提升在实际项目中的应用能力。
xvi
Nonvolatile ............................................................................................................................... 16-2
Time Variant ............................................................................................................................. 16-2
Differences Between Data Warehouse and OLTP Systems ...................................................... 16-2
Workload................................................................................................................................... 16-2
Data Modifications................................................................................................................... 16-2
Schema Design ......................................................................................................................... 16-3
Typical Operations................................................................................................................... 16-3
Historical Data.......................................................................................................................... 16-3
Data Warehouse Architecture....................................................................................................... 16-3
Data Warehouse Architecture (Basic)................................................................................... 16-3
Data Warehouse Architecture (with a Staging Area) ......................................................... 16-4
Data Warehouse Architecture (with a Staging Area and Data Marts)............................. 16-5
Overview of Extraction, Transformation, and Loading (ETL) ...................................................... 16-6
Transportable Tablespaces............................................................................................................. 16-7
Table Functions................................................................................................................................ 16-7
External Tables ................................................................................................................................ 16-8
Table Compression ......................................................................................................................... 16-8
Change Data Capture ..................................................................................................................... 16-9
Overview of Materialized Views for Data Warehouses................................................................. 16-9
Overview of Bitmap Indexes in Data Warehousing..................................................................... 16-10
Overview of Parallel Execution ........................................................................................................ 16-11
How Parallel Execution Works................................................................................................... 16-11
Overview of Analytic SQL ................................................................................................................ 16-12
SQL for Aggregation..................................................................................................................... 16-13
SQL for Analysis............................................................................................................................ 16-13
SQL for Modeling.......................................................................................................................... 16-14
Overview of OLAP Capabilities....................................................................................................... 16-14
Benefits of OLAP and RDBMS Integration ............................................................................... 16-14
Scalability ................................................................................................................................ 16-15
Availability.............................................................................................................................. 16-15
Manageability......................................................................................................................... 16-15
Backup and Recovery............................................................................................................ 16-15
Security.................................................................................................................................... 16-16
Overview of Data Mining.................................................................................................................. 16-16
17 High Availability
Introduction to High Availability ...................................................................................................... 17-1
Overview of Unplanned Downtime.................................................................................................. 17-1
Oracle Solutions to System Failures............................................................................................. 17-1
Overview of Fast-Start Fault Recovery ................................................................................ 17-2
Overview of Real Application Clusters................................................................................ 17-2
Oracle Solutions to Data Failures.................................................................................................. 17-2
Overview of Backup and Recovery Features for High Availability................................. 17-2
Overview of Partitioning ....................................................................................................... 17-3
Overview of Transparent Application Failover .................................................................. 17-4
Oracle Solutions to Disasters......................................................................................................... 17-5
Overview of Oracle Data Guard............................................................................................ 17-5
xvii
Oracle Solutions to Human Errors ............................................................................................... 17-6
Overview of Oracle Flashback Features............................................................................... 17-7
Overview of LogMiner............................................................................................................ 17-7
Overview of Security Features for High Availability......................................................... 17-8
Overview of Planned Downtime ....................................................................................................... 17-8
System Maintenance....................................................................................................................... 17-8
Data Maintenance ........................................................................................................................... 17-9
Database Maintenance.................................................................................................................... 17-9
18 Partitioned Tables and Indexes
Introduction to Partitioning ................................................................................................................ 18-1
Partition Key .................................................................................................................................... 18-3
Partitioned Tables ........................................................................................................................... 18-3
Partitioned Index-Organized Tables ............................................................................................ 18-3
Overview of Partitioning Methods.................................................................................................... 18-3
Range Partitioning .......................................................................................................................... 18-4
Range Partitioning Example................................................................................................... 18-5
List Partitioning............................................................................................................................... 18-5
List Partitioning Example ....................................................................................................... 18-5
Hash Partitioning ............................................................................................................................ 18-6
Hash Partitioning Example .................................................................................................... 18-6
Composite Partitioning .................................................................................................................. 18-7
Composite Partitioning Range-Hash Example.................................................................... 18-7
Composite Partitioning Range-List Example ...................................................................... 18-8
When to Partition a Table .............................................................................................................. 18-9
Overview of Partitioned Indexes ....................................................................................................... 18-9
Local Partitioned Indexes............................................................................................................. 18-10
Global Partitioned Indexes .......................................................................................................... 18-10
Global Range Partitioned Indexes....................................................................................... 18-10
Global Hash Partitioned Indexes......................................................................................... 18-11
Maintenance of Global Partitioned Indexes....................................................................... 18-11
Global Nonpartitioned Indexes................................................................................................... 18-12
Miscellaneous Information about Creating Indexes on Partitioned Tables ......................... 18-12
Using Partitioned Indexes in OLTP Applications.................................................................... 18-13
Using Partitioned Indexes in Data Warehousing and DSS Applications ............................. 18-13
Partitioned Indexes on Composite Partitions ........................................................................... 18-13
Partitioning to Improve Performance.............................................................................................. 18-13
Partition Pruning........................................................................................................................... 18-13
Partition Pruning Example................................................................................................... 18-14
Partition-wise Joins....................................................................................................................... 18-14
Parallel DML.................................................................................................................................. 18-14
19 Content Management
Introduction to Content Management............................................................................................... 19-1
Overview of XML in Oracle ................................................................................................................ 19-2
Overview of LOBs................................................................................................................................. 19-3
xviii
Overview of Oracle Text....................................................................................................................... 19-3
Oracle Text Index Types................................................................................................................. 19-4
Oracle Text Document Services .................................................................................................... 19-4
Oracle Text Query Package............................................................................................................ 19-4
Oracle Text Advanced Features.................................................................................................... 19-4
Overview of Oracle Ultra Search........................................................................................................ 19-5
Overview of Oracle interMedia.......................................................................................................... 19-5
Overview of Oracle Spatial ................................................................................................................. 19-6
20 Database Security
Introduction to Database Security ..................................................................................................... 20-1
Database Users and Schemas ........................................................................................................ 20-1
Security Domain ...................................................................................................................... 20-1
Privileges .......................................................................................................................................... 20-2
Roles.................................................................................................................................................. 20-2
Storage Settings and Quotas.......................................................................................................... 20-2
Default Tablespace .................................................................................................................. 20-2
Temporary Tablespace ........................................................................................................... 20-2
Tablespace Quotas ................................................................................................................... 20-2
Profiles and Resource Limits.................................................................................................. 20-2
Overview of Transparent Data Encryption ...................................................................................... 20-3
Overview of Authentication Methods ............................................................................................. 20-4
Authentication by the Operating System ................................................................................... 20-4
Authentication by the Network ................................................................................................... 20-4
Third Party-Based Authentication Technologies ................................................................ 20-5
Public-Key-Infrastructure-Based Authentication................................................................ 20-5
Remote Authentication ........................................................................................................... 20-5
Authentication by the Oracle Database ...................................................................................... 20-5
Password Encryption .............................................................................................................. 20-6
Account Locking ..................................................................................................................... 20-6
Password Lifetime and Expiration ....................................................................................... 20-6
Password Complexity Verification ....................................................................................... 20-6
Multitier Authentication and Authorization ............................................................................. 20-7
Authentication by the Secure Socket Layer Protocol................................................................. 20-7
Authentication of Database Administrators .............................................................................. 20-7
Overview of Authorization ................................................................................................................ 20-8
User Resource Limits and Profiles................................................................................................ 20-9
Types of System Resources and Limits ................................................................................ 20-9
Profiles .................................................................................................................................... 20-11
Introduction to Privileges ............................................................................................................ 20-11
System Privileges ................................................................................................................... 20-12
Schema Object Privileges...................................................................................................... 20-12
Introduction to Roles .................................................................................................................... 20-12
Common Uses for Roles ....................................................................................................... 20-13
Role Mechanisms ................................................................................................................... 20-14
The Operating System and Roles ........................................................................................ 20-14
Secure Application Roles ............................................................................................................. 20-15
xix
Overview of Access Restrictions on Tables, Views, Synonyms, or Rows................................ 20-15
Fine-Grained Access Control....................................................................................................... 20-15
Dynamic Predicates .............................................................................................................. 20-16
Application Context...................................................................................................................... 20-16
Dynamic Contexts.................................................................................................................. 20-16
Fine-Grained Auditing................................................................................................................. 20-17
Overview of Security Policies .......................................................................................................... 20-17
System Security Policy ................................................................................................................. 20-18
Database User Management................................................................................................. 20-18
User Authentication............................................................................................................... 20-18
Operating System Security................................................................................................... 20-18
Data Security Policy...................................................................................................................... 20-18
User Security Policy...................................................................................................................... 20-19
General User Security............................................................................................................ 20-19
End-User Security .................................................................................................................. 20-19
Administrator Security.......................................................................................................... 20-20
Application Developer Security........................................................................................... 20-20
Application Administrator Security.................................................................................... 20-21
Password Management Policy.................................................................................................... 20-21
Auditing Policy.............................................................................................................................. 20-21
Overview of Database Auditing....................................................................................................... 20-21
Types and Records of Auditing .................................................................................................. 20-22
Audit Records and the Audit Trails.................................................................................... 20-23
21 Data Integrity
Introduction to Data Integrity............................................................................................................. 21-1
Types of Data Integrity .................................................................................................................. 21-3
Null Rule ................................................................................................................................... 21-3
Unique Column Values........................................................................................................... 21-3
Primary Key Values................................................................................................................. 21-3
Referential Integrity Rules...................................................................................................... 21-3
Complex Integrity Checking.................................................................................................. 21-3
How Oracle Enforces Data Integrity ........................................................................................... 21-3
Integrity Constraints Description.......................................................................................... 21-4
Database Triggers .................................................................................................................... 21-4
Overview of Integrity Constraints ..................................................................................................... 21-4
Advantages of Integrity Constraints ........................................................................................... 21-5
Declarative Ease ....................................................................................................................... 21-5
Centralized Rules..................................................................................................................... 21-5
Maximum Application Development Productivity............................................................ 21-5
Immediate User Feedback ...................................................................................................... 21-5
Superior Performance.............................................................................................................. 21-5
Flexibility for Data Loads and Identification of Integrity Violations............................... 21-6
The Performance Cost of Integrity Constraints ......................................................................... 21-6
Types of Integrity Constraints ............................................................................................................ 21-6
NOT NULL Integrity Constraints ................................................................................................ 21-6
UNIQUE Key Integrity Constraints ............................................................................................ 21-7
xx
Unique Keys.............................................................................................................................. 21-7
UNIQUE Key Constraints and Indexes................................................................................ 21-8
Combine UNIQUE Key and NOT NULL Integrity Constraints....................................... 21-9
PRIMARY KEY Integrity Constraints ......................................................................................... 21-9
Primary Keys ............................................................................................................................ 21-9
PRIMARY KEY Constraints and Indexes........................................................................... 21-10
Referential Integrity Constraints ................................................................................................ 21-10
Self-Referential Integrity Constraints.................................................................................. 21-12
Nulls and Foreign Keys......................................................................................................... 21-13
Actions Defined by Referential Integrity Constraints...................................................... 21-13
Concurrency Control, Indexes, and Foreign Keys............................................................ 21-14
CHECK Integrity Constraints ..................................................................................................... 21-16
The Check Condition............................................................................................................. 21-16
Multiple CHECK Constraints .............................................................................................. 21-17
The Mechanisms of Constraint Checking ...................................................................................... 21-17
Default Column Values and Integrity Constraint Checking ................................................. 21-19
Deferred Constraint Checking.......................................................................................................... 21-19
Constraint Attributes ................................................................................................................... 21-19
SET CONSTRAINTS Mode ........................................................................................................ 21-19
Unique Constraints and Indexes ................................................................................................ 21-20
Constraint States.................................................................................................................................. 21-20
Constraint State Modification...................................................................................................... 21-21
22 Triggers
Introduction to Triggers ...................................................................................................................... 22-1
How Triggers Are Used ................................................................................................................ 22-2
Some Cautionary Notes about Triggers .............................................................................. 22-3
Triggers Compared with Declarative Integrity Constraints ............................................. 22-4
Parts of a Trigger.................................................................................................................................... 22-5
The Triggering Event or Statement ............................................................................................. 22-5
Trigger Restriction .......................................................................................................................... 22-6
Trigger Action ................................................................................................................................. 22-6
Types of Triggers ................................................................................................................................... 22-7
Row Triggers and Statement Triggers ........................................................................................ 22-7
Row Triggers ........................................................................................................................... 22-7
Statement Triggers .................................................................................................................. 22-7
BEFORE and AFTER Triggers ...................................................................................................... 22-7
BEFORE Triggers .................................................................................................................... 22-8
AFTER Triggers ....................................................................................................................... 22-8
Trigger Type Combinations .................................................................................................. 22-8
INSTEAD OF Triggers ................................................................................................................... 22-9
Modify Views .......................................................................................................................... 22-9
Views That Are Not Modifiable ............................................................................................ 22-9
INSTEAD OF Triggers on Nested Tables .......................................................................... 22-10
Triggers on System Events and User Events ............................................................................ 22-10
Event Publication .................................................................................................................. 22-11
Event Attributes .................................................................................................................... 22-11
剩余541页未读,继续阅读
324 浏览量
2014-10-19 上传
2014-10-10 上传
2009-11-09 上传
2008-07-03 上传
2010-04-28 上传
850 浏览量
wwei198602
- 粉丝: 3
- 资源: 41
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- Angular程序高效加载与展示海量Excel数据技巧
- Argos客户端开发流程及Vue配置指南
- 基于源码的PHP Webshell审查工具介绍
- Mina任务部署Rpush教程与实践指南
- 密歇根大学主题新标签页壁纸与多功能扩展
- Golang编程入门:基础代码学习教程
- Aplysia吸引子分析MATLAB代码套件解读
- 程序性竞争问题解决实践指南
- lyra: Rust语言实现的特征提取POC功能
- Chrome扩展:NBA全明星新标签壁纸
- 探索通用Lisp用户空间文件系统clufs_0.7
- dheap: Haxe实现的高效D-ary堆算法
- 利用BladeRF实现简易VNA频率响应分析工具
- 深度解析Amazon SQS在C#中的应用实践
- 正义联盟计划管理系统:udemy-heroes-demo-09
- JavaScript语法jsonpointer替代实现介绍
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功