Oracle Essentials: Oracle Database 12c
Robert Stackowiak, Jonathan Stern
Format: PDF / Kindle (mobi) / ePub
Written by Oracle insiders, this indispensable guide distills an enormous amount of information about the Oracle Database into one compact volume. Ideal for novice and experienced DBAs, developers, managers, and users, Oracle Essentials walks you through technologies and features in Oracle’s product line, including its architecture, data structures, networking, concurrency, and tuning.
Complete with illustrations and helpful hints, this fifth edition provides a valuable one-stop overview of Oracle Database 12c, including an introduction to Oracle and cloud computing. Oracle Essentials provides the conceptual background you need to understand how Oracle truly works.
- A complete overview of Oracle databases and data stores, and Fusion Middleware products and features
- Core concepts and structures in Oracle’s architecture, including pluggable databases
- Oracle objects and the various datatypes Oracle supports
- System and database management, including Oracle Enterprise Manager 12c
- Security options, basic auditing capabilities, and options for meeting compliance needs
- Performance characteristics of disk, memory, and CPU tuning
- Basic principles of multiuser concurrency
- Oracle’s online transaction processing (OLTP)
- Data warehouses, Big Data, and Oracle’s business intelligence tools
- Backup and recovery, and high availability and failover solutions
Hands-On Ethical Hacking and Network Defense
Programming iOS 5: Fundamentals of iPhone, iPad, and iPod touch Development
Eclipse Development using the Graphical Editing Framework and the Eclipse Modeling Framework
PHP Application Development with NetBeans: Beginner's Guide
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Cloud Definitions Common Characteristics Cloud Levels Is the Cloud New? Use Cases for Cloud Computing Oracle Database in the Cloud Oracle as a DBaaS Oracle as a PaaS Consumer and Provider Oracle Database Cloud Service History of Application Express Architecture Development with the Database Cloud Service SQL Developer and the Database Cloud Implementing Provider Clouds 351 352 353 354 356 357 357 357 358 358 360.
Placed in their own table, with a foreign key linking back to the main row for the organization. But because you want to see all the contact names every time you request contact informa‐ tion, you might decide to save the overhead and added development effort of the join Data Design | 117 and simply include the three contact names in your organization table. This technique is common in decision-support/data warehousing applications. Of course, this violation of the rules of normalization.
Expert system that provides automatic memory man‐ agement and eliminates manual adjustment of the SGA and PGA when enabled (and recommended in Oracle Database 11g or more recent releases). If just auto‐ matic shared memory is enabled instead, you will have access to the Shared Pool (SGA) Advisor and PGA Advisor. Finally, if you are manually managing shared 140 | Chapter 5: Managing Oracle memory, you will have access to the Shared Pool (SGA) Advisor, Buffer Cache Advisor, and PGA Advisor.
And look at how databases evolved, how we arrived at the relational model, and Oracle’s history. We’ll then take an initial look at Oracle Database packaging and key Oracle features today. 2 | Chapter 1: Introducing Oracle The Evolution of the Relational Database The relational database concept was described first by Dr. Edgar F. Codd in an IBM research publication entitled “System R4 Relational” that was published in 1970. Ini‐ tially, it was unclear whether any system based on this concept.
Security policies implemented as PL/SQL functions can be associated with tables or views enabling creation of a virtual private database (VPD). A security policy returns a condition that’s dynamically associated with a particular SQL statement, which transparently limits the data that’s returned. In the HR example, suppose that each representative supports employees with a last name in a particular alphabetic range, such as A through G. The security policy would return part of a WHERE clause,.