Theme Options

NEWSLETTER

Database Management System

BI 1396

New

According to New Revised Syllabus w.e.f. 2012 PUNE, Maharashtra (INDIA)

Text Book of

Database Management System

MCA Sem-II

Author : Anjali Bhatnagar & Dipali Mali

Book ID : 1396

More details

Rs.165

Contents 

1 Basic Concepts 

1.1 Database and Database Users    

1.2 Data Independence  

 

2 Database Design Using ER MODEL

2.1 Data Models  

2.2 ER Model for Conceptual Design 

2.3 Relationships, Relationship Sets     

2.4 Mapping Cardinalities    

2.5 Types of Keys

2.6 ER – Diagram 

 

3 Relational Model     

3.1 Relational Data Model    

3.2 Relational Algebra 

3.3 SQL- A Relational Database Language  

3.4 Indexing     

3.5 Views  

3.6 Security in SQL    

3.7 Triggers

     

4 Conventional Data Models and Systems   

4.1 Network Data Models and IDMS Systems 

4.2 Hierarchical Data Model

     

5 Relational Database Design 

5.1 Introduction 

5.2 Functional Dependencies  

5.3 Undesirable Properties of A Bad Database Design  

5.4 E.F. Codd’s Rules  

5.5 Steps followed By Application Developer….        

5.6 Normalization Process    

5.7 Denormalisation    

5.8 Loseless Joins     

5.9 Decompositions

     

6 Storage and File Structure 

6.1 Introduction 

6.2 Overview of Physical Storage Media   

6.3 Magnetic Disks     

6.4 Raid   

6.5 Tertiary Storage   

6.6 Storage Access     

6.7 File Organization  

6.8 Organization of Records in Files     

6.9 Data Dictionary Storage  

6.10 Factors Used for Evaluation of the Above Techniques   

  

7 Transaction and Concurrency Control    

7.1 Concept of Transaction   

7.2 Properties of Transaction

7.3 State of Transaction     

7.4 Implementation of Atomicity and Durability 

7.5 Concurrent Executions    

7.6 Concurrency Control Techniques 

7.7 Concurrency Control

 

8 Crash Recovery and Backup

8.1 Why Recover Is Needed?   

8.2 Storage Structure  

8.3 Recovery and Atomicity   

8.4 Failure with Loss of Nonvolatile Storage   

8.5 Recovery from Catastrophic Failure   

8.6 Remote Backup Systems    

 

9 Security and Privacy 

9.1 Introduction 

9.2 Discretionary Access Control Method  

9.3 Mandatory Access Control Method

9.4 Uses of Views in Security Enforcement

9.5 Overview of Encryption Technique for Database    

9.6 Statistical Database Security  

  

10 NON-SQL DATABASE    

10.1 A Relational Database Management System   

10.2 NoSQL Emerged From a Need     

10.3 What is NoSQL     

No customer comments for the moment.

Write a review

Write a review

5 other products in the same category: