Books
in black and white
Main menu
Share a book About us Home
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Introduction to the Teradata® RDBMS for UNIX® Version 2 Release 2.1 - NCR

NCR Introduction to the Teradata® RDBMS for UNIX® Version 2 Release 2.1 - NCR, 1998. - 315 p.
Download (direct link): inntroduktionteradata1998.pdf
Previous << 1 .. 3 4 5 6 7 8 < 9 > 10 11 12 13 14 15 .. 76 >> Next


For More Information...............................................9-13

Chapter 10

Concurrency Control and Recovery

About This Chapter................................................10-1

Introduction..................................................10-1

Concurrency Control...........................................10-1

Recovery......................................................10-1

The Concept of the Transaction....................................10-2

Introduction..................................................10-2

Definition of a Transaction...................................10-2

Definition of Serializability.................................10-2

Transaction Semantics.........................................10-2

ANSI Transactions.............................................10-2

Rolling Back an ANSI Transaction..............................10-3

Teradata Transactions.........................................10-4

How to Undo an Update.........................................10-4

The Concept of the Lock...........................................10-5

Introduction..................................................10-5

Overview of Teradata RDBMS Locking............................10-5

Why is Locking Required for

Database Management Systems?..............................10-6

Teradata Lock Levels..........................................10-6

Teradata Lock Types...........................................10-7

Teradata Automatic RDBMS Lock Levels..........................10-8

Deadlocks.....................................................10-8

Host Utility Locks................................................10-9

Introduction..................................................10-9

HUT Lock Types................................................10-9

HUT Lock Characteristics......................................10-9

System and Media Recovery........................................10-10

Introduction.................................................10-10

System Restarts..............................................10-10

Transaction Recovery.........................................10-10

Down AMP Recovery............................................10-11

Two-Phase Commit.................................................10-12

Introduction.................................................10-12

xxii

Introduction to the Teradata RDBMS for UNIX
Table of Contents

Definitions...................................................10-12

Two-Phase Commit..............................................10-12

Limitations on Number of Sessions.............................10-14

Two-Phase Commit Processing...................................10-15

For More Information..............................................10-16

Chapter 11

Security and Integrity

About This Chapter...................................................11-1

Introduction.....................................................11-1

Definition of Security...........................................11-1

Definition of Integrity..........................................11-1

Tools for Enforcing System Security..............................11-1

Tools for Enforcing System Integrity.............................11-2

Resource Access Control..............................................11-3

Introduction.....................................................11-3

User Identifiers.................................................11-3

Client Identifiers...............................................11-3

Logon Policies...................................................11-3

TDP Security.....................................................11-5

Password Security................................................11-5

DBC.SysSecDefaults...............................................11-6

Password Encryption..............................................11-7

Logon Control Using GRANT and REVOKE LOGON.......................11-8

Controlling Data Access by Granting or Revoking Access .... 11-8

Establishing a Security Policy and Physical Access Control.........11-12

Introduction....................................................11-12

Key Ingredients of a Security Policy............................11-12

Establishing a Security Policy..................................11-12

Identifying Security Needs......................................11-13

Controlling Physical Access.....................................11-13

Auditing and Accountability.........................................11-14

Introduction....................................................11-14

System Views....................................................11-14

For More Information................................................11-15

Introduction to the Teradata RDBMS for UNIX

xxiii
Table of Contents

Chapter 12

System Administration

About This Chapter................................................12-1
Previous << 1 .. 3 4 5 6 7 8 < 9 > 10 11 12 13 14 15 .. 76 >> Next