Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Woody B. — Administrator's Guide to SQL Server 2005
Woody B. — Administrator's Guide to SQL Server 2005



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Administrator's Guide to SQL Server 2005

Автор: Woody B.

Аннотация:

"SQL Server 2005 is a landmark release and this title does an awesome job of hitting everything new in SQL 2005. It covers new and improved administration tools, and contains an overview of Notification Services, SQL Server Service Broker, Reporting Services, Integration Services, and Analysis Services. As a result, you'll be able to work on your own SQL Server 2005 solutions quickly and painlessly. Ultimately, this book provides you with a starting point, a roadmap, and then the tools and knowledge to exploit this powerful new database server to its fullest power. So, start your computer and get ready to learn SQL Server 2005!"


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 1-st

Год издания: 2006

Количество страниц: 626

Добавлена в каталог: 23.10.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
abstraction objects, schemas      
ACCESS      
access, Analysis Services      
access, Reporting Services      
accounts      
accounts, policies      
accounts, Reporting Services      
accounts, security      
accounts, services      
accounts, SQL Server Agent      
accounts, user      
accounts, Windows      
accounts, Windows, connecting      
accounts, Windows, creating      
accounts, Windows, logins      
ActiveX Database Objects (ADO)      
Activity, monitoring      
ad hoc reports      
adding      
adding, logins      
adding, passwords      
adding, roles      
ADF (Application Definition File)      
ADO (ActiveX Database Objects)      
ADO.NET      
agents, replication      
Aggregation      
alerts      
alerts, automation      
Algebrizer      
ALTER INDEX command      
ALTER permission      
AMO (analysis management objects)      
analysis management objects (AMO)      
Analysis Services      
Analysis Services, BI      
Analysis Services, BI, Analysis Services      
Analysis Services, BI, databases      2nd 3rd
Analysis Services, BI, implementing      
Analysis Services, BI, Integration Services      
Analysis Services, BI, Reporting Services      
Analysis Services, maintenance      
Analysis Services, maintenance, backups      
Analysis Services, maintenance, infrastructure      
Analysis Services, maintenance, job processing      2nd
Analysis Services, maintenance, monitoring      2nd
Analysis Services, maintenance, security      2nd
Analysis Services, maintenance, storage      
Analysis Services, maintenance, synchronization      
analysis, growth      
APIs (application programming interfaces)      2nd
APIs, connections      
Application Definition File (ADF)      
Application programming interfaces (APIs)      2nd
application programming interfaces (APIs), connections      
ApplicationName element      
applications      
Applications element      
applications, architecture      
applications, architecture, client/server      
applications, architecture, distributed computing      
applications, architecture, monolithic      
applications, architecture, service-oriented      
applications, architecture, three-tier      
applications, communication processes      
applications, definition files      
applications, installation      
applications, installation, operating system variables      
applications, installation, post-installation configuration      
applications, layers      
applications, monitoring      
applications, Notification Services      
applications, optimizing      
applications, reports      
applications, roles      
applications, security      
applications, tools      
Architecture      2nd
architecture, client/server      
architecture, CPUs      
architecture, distributed computing      
architecture, Integration Services      
architecture, Integration Services, command-line utilities      
architecture, Integration Services, components      2nd
architecture, Integration Services, tools      
architecture, Integration Services, wizards      
architecture, monitoring      
architecture, monolithic      
architecture, Notification Services      
architecture, objects      
architecture, objects, communication processes      
architecture, objects, databases      
architecture, physical footprints      
architecture, physical footprints, data files      
architecture, physical footprints, operational files      
architecture, queries      
architecture, replication      
architecture, Reporting Services      
architecture, service-oriented      
architecture, SOA      
architecture, three-tier      
Attach Database      
attaching databases      2nd
Auditing      
auditing, reviewing      
auditing, security      
auditing, servers      
Automation      
automation, alerts      
automation, jobs      
automation, maintenance      
automation, multiple-system      
automation, operators      
automation, SQL Server Agent      
Backups      
backups, alternate methods of      
backups, Analysis Services      
backups, bulk-logged recovery models      
backups, copying      
backups, databases      2nd
backups, differential      
backups, full backups      
backups, full recovery models      
backups, locations      
backups, mirroring      
backups, passwords      
backups, reports      
backups, security      
backups, simple recovery models      
backups, strategies      
backups, Transaction Log      
baselines, configuring      
bcp (Bulk Copy Program)      2nd
BI (business intelligence)      2nd
BI (business intelligence), Analysis Services      2nd
BI (business intelligence), Analysis Services, databases      2nd 3rd
BI (business intelligence), Analysis Services, implementing      
BI (business intelligence), Analysis Services, Integration Services      
BI (business intelligence), Reporting Services      
binaries      
building variables      
Bulk Copy Program (bcp)      2nd
bulk-logged recovery models      2nd
Business intelligence (BI)      2nd
business intelligence (BI), Analysis Services      
business intelligence (BI), Analysis Services, databases      2nd 3rd 4th
business intelligence (BI), Analysis Services, implementing      
business intelligence (BI), Analysis Services, Integration Services      
business intelligence (BI), Reporting Services      
Business Intelligence Development Studio      2nd
business logic layers      
Caches      
calculus, relational      
calling jobs      
central processing units (CPUs), configuring      
certificates      
CHECKDB command      
cleansing data      
Clients      
clients, architecture      
clients, network libraries      
CLR (Common Language Runtime)      2nd 3rd 4th
CLR, Analysis Services      
CLR, security      
Clustering      2nd 3rd
clustering, indexes      
clustering, installing      
clustering, requirements      
clustering, two-node (on VM)      2nd
comma-separated value (CSV) files      
command-line utilities, Integration Services      
command-prompt utilities      
command-prompt utilities, bcp      
command-prompt utilities, sqlcmd      
Commands      
commands, ALTER INDEX      
commands, CHECKDB      
commands, CREATE APPLICATION ROLE      
commands, CREATE FULLTEXT CATALOG      
commands, CREATE LOGIN      
commands, CREATE ROLE      
commands, DBCC CHECKALLOC      
commands, DBCC CHECKCATALOG      
commands, DBCC CHECKCONSTRAINTS      
commands, DBCC CHECKDB      
commands, DBCC CHECKFILEGROUP      
commands, DBCC CHECKIDENT      
commands, DBCC CHECKTABLE      
commands, DBCC DBREINDEX      
commands, DBCC INDEXDEFRAG      
commands, DBCC SHOWCONTIG      
commands, DENY      
commands, GRANT      
commands, MIRROR TO      
commands, NET USER      
commands, operating systems      
commands, restore      
commands, REVOKE      
commands, sp_configure      
commands, T-SQL      
Common Language Runtime (CLR)      2nd 3rd 4th
Common Language Runtime (CLR), Analysis Services      
Common Language Runtime (CLR), security      
communication processes      
complete restores      
components      
components, Integration Services      
components, Integration Services, control flow      
components, Integration Services, data flow      
components, Integration Services, event handlers      
components, Integration Services, packages      
components, Integration Services, precedence      
components, Integration Services, variables      
components, monitoring      
components, WMI      
Configuration      
configuration, applications      
configuration, architecture      
configuration, architecture, client/server      
configuration, architecture, distributed computing      
configuration, architecture, monolithic      
configuration, architecture, service-oriented      
configuration, architecture, three-tier      
configuration, baselines      
configuration, clustering two-node (on VM)      2nd 3rd
configuration, databases (mirroring)      
configuration, editions (SQL Server)      
configuration, editions (SQL Server), Enterprise      
configuration, editions (SQL Server), Express      
configuration, editions (SQL Server), Mobile      
configuration, editions (SQL Server), software requirements      
configuration, editions (SQL Server), Standard      
configuration, editions (SQL Server), Workgroup      
configuration, files      
configuration, hardware      
configuration, hardware, CPUs      
configuration, hardware, I/O      
configuration, hardware, memory      
configuration, hardware, networks      
configuration, landscapes      
configuration, landscapes, departments      
configuration, landscapes, enterprise      
configuration, landscapes, farms      
configuration, log shipping      2nd
configuration, post-installation      
configuration, recovery models      
configuration, replication      2nd
configuration, reports      
configuration, SAC      2nd 3rd 4th
configuration, SQL Server Configuration Manager      
configuration, systems      
configuration, systems, checks      
configuration, systems, selecting use of      
configuration, systems, sizing      
Connection Manager      
Connections      
connections, accounts      
connections, containers      
connections, methods      
connections, security      
consistency checks      
constraints, precedence      
containers, connecting      
control flow, Integration Services      
conversion, Integration Services      
Copy Database Wizard      
copying      
copying, backups      
copying, bcp      
copying, log shipping      
counters, performance      
CPUs (central processing units), configuring      
CREATE APPLICATION ROLE command      
CREATE FULLTEXT CATALOG command      
CREATE LOGIN command      
CREATE ROLE command      
CVS (comma-separated value) files      
DAOs (Data Access Object)s      
data definition changes, monitoring      
Data Definition Language (DDL)      2nd
Data Definition Language (DDL), permissions      
Data Definition Language (DDL), triggers      
data files      
data flow      
data layers      
Data manipulation language (DML)      2nd 3rd
Data Manipulation Language (DML), permissions      
data mart databases      
Data Mining      
data mining, databases      
data mining, expressions (DMXs)      
data paths, security      
Data Source Name (DSN)      
data sources, Integration Services      
data structures, optimizing      
Data Transformation Services (DTS)      2nd
Data Transformation Services (DTS), Integration Services      
database administrators (DBAs)      
database administrators (DBAs), maintenance      
Database Definition elements      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте