没有合适的资源?快使用搜索试试~ 我知道了~
首页Oracle数据库概念11g详解
"Oracle Database Concepts 11g.pdf 是Oracle公司发布的关于11g版本数据库的概念和使用指南,由Richard Strohm为主编,多位专家共同撰写,详细介绍了Oracle数据库的核心概念、架构以及操作方法。"
Oracle数据库是全球广泛使用的大型关系型数据库管理系统之一,Oracle Database 11g是其在2007年的一个重要版本。本指南主要涵盖了以下几个方面的内容:
1. **数据库基础**:介绍数据库的基本概念,包括数据模型(如关系型模型)、数据库的组成部分(如表、索引、视图)以及数据库管理系统的功能。
2. **Oracle数据库架构**:详细解析Oracle数据库的层次结构,包括实例与数据库的区别、内存结构(如SGA和PGA)、后台进程的作用及其相互间的协作机制。
3. **数据存储**:讲解Oracle如何存储和管理数据,包括表空间、数据文件、控制文件、重做日志文件等,以及如何进行数据的物理和逻辑存储优化。
4. **SQL语言**:涵盖SQL查询语句的使用,包括DML(数据操纵语言)如INSERT、UPDATE、DELETE,以及DDL(数据定义语言)如CREATE、ALTER、DROP等,还可能涉及PL/SQL编程。
5. **事务处理与并发控制**:讨论事务的概念、ACID属性,以及Oracle中的并发控制机制,如多版本并发控制(MVCC)和锁定机制。
6. **备份与恢复**:阐述Oracle的备份策略,包括冷备份、热备份、RMAN(恢复管理器)以及如何进行数据恢复。
7. **性能调优**:提供数据库性能监控和优化的方法,包括SQL优化、索引策略、数据库设计改进、资源管理等。
8. **安全性**:介绍Oracle的用户管理、权限控制、角色、审计机制以及网络加密技术,确保数据库的安全性。
9. **高可用性与灾难恢复**:讨论高可用性解决方案,如RAC(Real Application Clusters)、Data Guard、Standby数据库等,以及灾难恢复计划的制定。
10. **Oracle服务与工具**:介绍Oracle提供的各种管理和开发工具,如SQL*Plus、Enterprise Manager等,以及如何使用这些工具进行数据库的日常维护。
Oracle Database 11g的概念手册是数据库管理员、开发人员和DBA学习和参考的重要资料,它帮助读者深入理解Oracle数据库的工作原理,提升数据库管理与应用开发的技能。通过阅读此书,读者可以全面掌握Oracle数据库的关键特性,从而更高效地设计、实施和维护Oracle数据库系统。
xvi
SQL for Analysis............................................................................................................................ 16-12
SQL for Modeling.......................................................................................................................... 16-13
Overview of OLAP Capabilities....................................................................................................... 16-13
Full Integration of Multidimensional Technology................................................................... 16-14
Ease of Application Development .............................................................................................. 16-14
Ease of Administration................................................................................................................. 16-14
Security ........................................................................................................................................... 16-15
Unmatched Performance and Scalability .................................................................................. 16-15
Reduced Costs ............................................................................................................................... 16-15
Overview of Data Mining.................................................................................................................. 16-16
17 High Availability
Introduction to High Availability ...................................................................................................... 17-1
Causes Of Downtime............................................................................................................................ 17-2
Protection Against Computer Failures.............................................................................................. 17-2
Overview of Enterprise Grids with Oracle Real Application Clusters and Oracle Clusterware ...
17-3
Fast Start Fault Recovery................................................................................................................ 17-4
Oracle Data Guard .......................................................................................................................... 17-4
Oracle Streams................................................................................................................................. 17-5
Protection Against Data Failures........................................................................................................ 17-5
Protecting Against Storage Failures ............................................................................................. 17-6
Protecting Against Human Errors................................................................................................ 17-7
Guarding Against Human Errors.......................................................................................... 17-7
Oracle Flashback Technology ................................................................................................ 17-7
LogMiner SQL-Based Log Analyzer .................................................................................. 17-10
Protecting Against Data Corruptions ................................................................................. 17-10
Protecting Against Site Failures........................................................................................... 17-13
Avoiding Downtime During Planned Maintenance .................................................................... 17-16
Avoiding Downtime for Data Changes..................................................................................... 17-16
Online Schema and Data Reorganization........................................................................... 17-17
Partitioned Tables and Indexes............................................................................................ 17-17
Dynamic Resource Provisioning.......................................................................................... 17-18
Avoiding Downtime for System Changes................................................................................. 17-18
Rolling Patch Updates........................................................................................................... 17-18
Rolling Release Upgrade....................................................................................................... 17-19
Maximum Availability Architecture (MAA) Best Practices........................................................ 17-19
18 Very Large Databases (VLDB)
Introduction to Partitioning ................................................................................................................ 18-1
Partition Key .................................................................................................................................... 18-2
Partitioned Tables ........................................................................................................................... 18-2
Partitioned Index-Organized Tables ............................................................................................ 18-3
Partitioning Methods...................................................................................................................... 18-3
Overview of Partitioned Indexes ....................................................................................................... 18-4
Local Partitioned Indexes............................................................................................................... 18-4
Global Partitioned Indexes ............................................................................................................ 18-5
xvii
Global Range Partitioned Indexes......................................................................................... 18-5
Global Hash Partitioned Indexes........................................................................................... 18-5
Maintenance of Global Partitioned Indexes......................................................................... 18-5
Global Nonpartitioned Indexes..................................................................................................... 18-6
Miscellaneous Information about Creating Indexes on Partitioned Tables ........................... 18-6
Using Partitioned Indexes in OLTP Applications...................................................................... 18-6
Using Partitioned Indexes in Data Warehousing and DSS Applications ............................... 18-6
Partitioned Indexes on Composite Partitions ............................................................................. 18-7
Partitioning to Improve Performance................................................................................................ 18-7
Partition Pruning............................................................................................................................. 18-7
Partition Pruning Example..................................................................................................... 18-8
Partition-wise Joins......................................................................................................................... 18-8
19 Content Management
Introduction to Content Management............................................................................................... 19-1
Overview of XML in Oracle Database .............................................................................................. 19-2
Overview of LOBs................................................................................................................................. 19-3
Overview of Oracle Text....................................................................................................................... 19-3
Oracle Text Index Types................................................................................................................. 19-4
Oracle Text Document Services .................................................................................................... 19-4
Oracle Text Query Package............................................................................................................ 19-5
Oracle Text Advanced Features.................................................................................................... 19-5
Overview of Oracle Ultra Search........................................................................................................ 19-5
Overview of Oracle Multimedia ........................................................................................................ 19-6
Overview of Oracle Spatial ................................................................................................................. 19-7
20 Database Security
Introduction to Database Security ..................................................................................................... 20-1
Database Users and Schemas ........................................................................................................ 20-1
Security Domain ...................................................................................................................... 20-2
Privileges .......................................................................................................................................... 20-2
Roles.................................................................................................................................................. 20-2
Storage Settings and Quotas.......................................................................................................... 20-2
Default Tablespace .................................................................................................................. 20-2
Temporary Tablespace ........................................................................................................... 20-3
Tablespace Quotas ................................................................................................................... 20-3
Profiles and Resource Limits.................................................................................................. 20-3
Overview of Transparent Data Encryption ...................................................................................... 20-3
Tablespace Encryption ................................................................................................................... 20-4
Overview of Authentication Methods ............................................................................................. 20-4
Authentication by the Operating System ................................................................................... 20-5
Authentication by the Network ................................................................................................... 20-5
Third Party-Based Authentication Technologies ................................................................ 20-5
Public-Key-Infrastructure-Based Authentication................................................................ 20-5
Remote Authentication ........................................................................................................... 20-6
Authentication by Oracle Database.............................................................................................. 20-6
xviii
Password Encryption .............................................................................................................. 20-7
Account Locking ..................................................................................................................... 20-7
Password Lifetime and Expiration ....................................................................................... 20-7
Password Complexity Verification ....................................................................................... 20-7
Multitier Authentication and Authorization ............................................................................. 20-7
Authentication by the Secure Socket Layer Protocol................................................................. 20-8
Authentication of Database Administrators .............................................................................. 20-8
Overview of Authorization ................................................................................................................ 20-9
User Resource Limits and Profiles................................................................................................ 20-9
Types of System Resources and Limits .............................................................................. 20-10
Profiles .................................................................................................................................... 20-11
Introduction to Privileges ............................................................................................................ 20-12
System Privileges ................................................................................................................... 20-12
Schema Object Privileges...................................................................................................... 20-13
Introduction to Roles .................................................................................................................... 20-13
Common Uses for Roles ....................................................................................................... 20-14
Role Mechanisms ................................................................................................................... 20-15
The Operating System and Roles ........................................................................................ 20-15
Secure Application Roles ............................................................................................................. 20-15
Overview of Access Restrictions on Tables, Views, Synonyms, or Rows................................ 20-16
Fine-Grained Access Control....................................................................................................... 20-16
Dynamic Predicates .............................................................................................................. 20-17
Application Context...................................................................................................................... 20-17
Dynamic Contexts.................................................................................................................. 20-17
Fine-Grained Auditing................................................................................................................. 20-18
Overview of Security Policies .......................................................................................................... 20-18
System Security Policy.................................................................................................................. 20-18
Database User Management................................................................................................. 20-19
User Authentication............................................................................................................... 20-19
Operating System Security................................................................................................... 20-19
Data Security Policy...................................................................................................................... 20-19
User Security Policy...................................................................................................................... 20-20
General User Security............................................................................................................ 20-20
End-User Security.................................................................................................................. 20-20
Administrator Security.......................................................................................................... 20-21
Application Developer Security...........................................................................................
20-21
Application Administrator Security.................................................................................... 20-22
Password Management Policy.................................................................................................... 20-22
Auditing Policy.............................................................................................................................. 20-22
Overview of Database Auditing....................................................................................................... 20-23
Types and Records of Auditing .................................................................................................. 20-23
Audit Records and the Audit Trails.................................................................................... 20-24
21 Data Integrity
Introduction to Data Integrity............................................................................................................. 21-1
Data Integrity Rules ....................................................................................................................... 21-1
How Oracle Database Enforces Data Integrity .......................................................................... 21-2
xix
Constraint States.............................................................................................................................. 21-2
Overview of Integrity Constraints ..................................................................................................... 21-3
Advantages of Integrity Constraints ........................................................................................... 21-4
Declarative Ease ....................................................................................................................... 21-4
Centralized Rules..................................................................................................................... 21-4
Maximum Application Development Productivity............................................................ 21-4
Immediate User Feedback ...................................................................................................... 21-5
Flexibility for Data Loads and Identification of Integrity Violations............................... 21-5
The Performance Cost of Integrity Constraints ......................................................................... 21-5
Types of Integrity Constraints ............................................................................................................ 21-5
NOT NULL Integrity Constraints ................................................................................................ 21-5
UNIQUE Key Integrity Constraints ............................................................................................ 21-6
Unique Keys.............................................................................................................................. 21-6
Combining UNIQUE Key and NOT NULL Integrity Constraints ................................... 21-6
PRIMARY KEY Integrity Constraints ......................................................................................... 21-6
Primary Keys ............................................................................................................................ 21-7
PRIMARY KEY Constraints and Indexes............................................................................. 21-7
Referential Integrity Constraints .................................................................................................. 21-7
Self-Referential Integrity Constraints.................................................................................... 21-9
Nulls and Foreign Keys........................................................................................................... 21-9
Actions Defined by Referential Integrity Constraints ........................................................ 21-9
Concurrency Control, Indexes, and Foreign Keys............................................................ 21-10
CHECK Integrity Constraints ..................................................................................................... 21-12
The Check Condition............................................................................................................. 21-12
Multiple CHECK Constraints .............................................................................................. 21-13
The Mechanisms of Constraint Checking ...................................................................................... 21-13
Default Column Values and Integrity Constraint Checking ................................................. 21-14
Deferred Constraint Checking.......................................................................................................... 21-15
Constraint Attributes ................................................................................................................... 21-15
SET CONSTRAINTS Mode ........................................................................................................ 21-15
Unique Constraints and Indexes ................................................................................................ 21-16
22 Triggers
Introduction to Triggers ....................................................................................................................... 22-1
How Triggers Are Used ................................................................................................................ 22-2
Some Cautionary Notes about Triggers .............................................................................. 22-3
Triggers Compared with Declarative Integrity Constraints ............................................. 22-3
Components of a Trigger...................................................................................................................... 22-3
The Triggering Event or Statement .............................................................................................. 22-4
Trigger Restriction .......................................................................................................................... 22-5
Trigger Action ................................................................................................................................. 22-5
Types of Triggers ................................................................................................................................... 22-5
Row Triggers and Statement Triggers ........................................................................................ 22-5
Row Triggers ........................................................................................................................... 22-6
Statement Triggers .................................................................................................................. 22-6
BEFORE and AFTER Triggers ...................................................................................................... 22-6
BEFORE Triggers .................................................................................................................... 22-6
xx
AFTER Triggers ....................................................................................................................... 22-7
Trigger Type Combinations .................................................................................................. 22-7
Compound Triggers........................................................................................................................ 22-7
INSTEAD OF Triggers ................................................................................................................... 22-8
Modify Views .......................................................................................................................... 22-8
Views That Are Not Modifiable ............................................................................................ 22-9
INSTEAD OF Triggers on Nested Tables ............................................................................ 22-9
Triggers on System Events and User Events .............................................................................. 22-9
Event Publication .................................................................................................................. 22-10
Event Attributes .................................................................................................................... 22-10
System Events ........................................................................................................................ 22-11
User Events ............................................................................................................................ 22-11
Trigger Execution................................................................................................................................. 22-12
The Execution Model for Triggers and Integrity Constraint Checking ............................... 22-13
Data Access for Triggers ............................................................................................................. 22-13
Storage of PL/SQL Triggers........................................................................................................ 22-13
Execution of Triggers ................................................................................................................... 22-13
Dependency Maintenance for Triggers ..................................................................................... 22-13
23 Information Integration
Introduction to Oracle Information Integration.............................................................................. 23-1
Federated Access.................................................................................................................................... 23-2
Distributed SQL............................................................................................................................... 23-2
Location Transparency................................................................................................................... 23-3
SQL and COMMIT Transparency................................................................................................. 23-3
Distributed Query Optimization .................................................................................................. 23-4
Information Sharing ............................................................................................................................. 23-4
Oracle Streams................................................................................................................................. 23-5
Oracle Streams Architecture................................................................................................... 23-5
Replication with Oracle Streams............................................................................................ 23-7
Oracle Streams Advanced Queuing...................................................................................... 23-8
Database Change Notification ............................................................................................. 23-10
Change Data Capture............................................................................................................ 23-10
Heterogeneous Environments.............................................................................................. 23-11
Oracle Streams Use Cases..................................................................................................... 23-11
Materialized Views ....................................................................................................................... 23-12
Data Comparison and Convergence at Oracle Databases ........................................................... 23-13
Integrating Non-Oracle Systems ...................................................................................................... 23-13
Generic Connectivity .................................................................................................................... 23-14
Oracle Database Gateways .......................................................................................................... 23-14
Part IV Oracle Database Application Development
24 SQL
Introduction to SQL .............................................................................................................................. 24-1
SQL Statements ..................................................................................................................................... 24-2
剩余551页未读,继续阅读
2022-03-01 上传
2013-12-09 上传
2013-12-26 上传
2011-08-15 上传
2008-01-22 上传
2020-05-18 上传
2012-04-28 上传
2008-02-28 上传
adewzh
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- ES管理利器:ES Head工具详解
- Layui前端UI框架压缩包:轻量级的Web界面构建利器
- WPF 字体布局问题解决方法与应用案例
- 响应式网页布局教程:CSS实现全平台适配
- Windows平台Elasticsearch 8.10.2版发布
- ICEY开源小程序:定时显示极限值提醒
- MATLAB条形图绘制指南:从入门到进阶技巧全解析
- WPF实现任务管理器进程分组逻辑教程解析
- C#编程实现显卡硬件信息的获取方法
- 前端世界核心-HTML+CSS+JS团队服务网页模板开发
- 精选SQL面试题大汇总
- Nacos Server 1.2.1在Linux系统的安装包介绍
- 易语言MySQL支持库3.0#0版全新升级与使用指南
- 快乐足球响应式网页模板:前端开发全技能秘籍
- OpenEuler4.19内核发布:国产操作系统的里程碑
- Boyue Zheng的LeetCode Python解答集
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功