買這商品的人也買了...
-
$680$537 -
$580$458 -
$880$695 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$1,890$1,796 -
$780$741 -
$760$600 -
$590$466 -
$690$538 -
$720$569 -
$990$782 -
$750$675 -
$490$382 -
$560$504 -
$780$663 -
$450$356 -
$390$304 -
$560$476 -
$490$417 -
$850$723 -
$480$379 -
$750$593 -
$620$490 -
$675LPIC 1 Exam Cram 2: Linux Professional Institute Certification Exams 101 and 102 (Paperback)
-
$650$507
相關主題
商品描述
Summary
Expert One-on-One Oracle offers the knowledge required for both those who build applications that run against the Oracle database and those who administer the database. It is critical that the DBA knows what the developers are trying to accomplish and the best developers know how to exploit the DBA's data management strategies.
Tom Kyte has a simple philosophy: You can treat Oracle as a black box and just stick data into it or you can understand how it works and exploit it as a powerful computing environment. If you choose the latter, then you will find that there are few information management problems that you cannot solve quickly and elegantly. Kyte has selected the most important features and techniques to discuss in Expert One-on-One Oracle and he teaches in a proof-by-example manner, not only discussing the features available, but also how to implement software using these features and indicating potential pitfalls.
Table of Contents
Chapter 1: Developing Successful Oracle Applications
Chapter 2: Architecture
Chapter 3: Locking and Concurrency
Chapter 4: Transactions
Chapter 5: Redo and Rollback
Chapter 6: Database Tables
Chapter 7: Indexes
Chapter 8: Import and Export
Chapter 9: Data Loading
Chapter 10: Tuning Strategies and Tools
Chapter 11: Optimizer Plan Stability
Chapter 12: Analytic Functions
Chapter 13: Materialized Views
Chapter 14: Partitioning
Chapter 15: Autonomous Transactions
Chapter 16: Dynamic SQL
Chapter 17: interMedia
Chapter 18: C-Based External Procedures
Chapter 19: Java Stored Procedures
Chapter 20: Using Object Relational Features
Chapter 21: Fine Grained Access Control
Chapter 22: n-Tier Authentication
Chapter 23: Invoker and Definer Rights
Appendix A: Necessary Supplied Packages
Appendix B: Support and Errata