Your cart is empty now.
Welcome to Prashant Publications
| INTERNATIONAL | XS | S | M | L | XL | XXL | XXXL |
|---|---|---|---|---|---|---|---|
| EUROPE | 32 | 34 | 36 | 38 | 40 | 42 | 44 |
| US | 0 | 2 | 4 | 6 | 8 | 10 | 12 |
| CHEST FIT (INCHES) | 28" | 30" | 32" | 34" | 36" | 38" | 40" |
| CHEST FIT (CM) | 716 | 76 | 81 | 86 | 91.5 | 96.5 | 101.1 |
| WAIST FIR (INCHES) | 21" | 23" | 25" | 27" | 29" | 31" | 33" |
| WAIST FIR (CM) | 53.5 | 58.5 | 63.5 | 68.5 | 74 | 79 | 84 |
| HIPS FIR (INCHES) | 33" | 34" | 36" | 38" | 40" | 42" | 44" |
| HIPS FIR (CM) | 81.5 | 86.5 | 91.5 | 96.5 | 101 | 106.5 | 111.5 |
| SKORT LENGTHS (SM) | 36.5 | 38 | 39.5 | 41 | 42.5 | 44 | 45.5 |
foundation as well as practical understanding of database systems.
Databases form the backbone of almost every modern software application, and a sound understanding of DBMS concepts is essential for every computer science student. This textbook covers the essential principles, models, and techniques of database systems through a structured and progressive approach. The book emphasizes not only theoretical concepts but also the practical implementation aspects that are crucial for developing real-world applications.
1. Relational Database Design Using PL/PGSQL..........................7
1.1 Introduction
1.2 PL/PGSQL: Data types, Language Structure
1.3 Controlling the program flow.
1.3.1 Conditional Statements
1.3.2 Loops
1.4 Stored Procedures
1.5 Functions
1.6 Handling Errors and Exceptions
1.7 Cursors
1.8 Triggers
2. Transaction Concepts and Concurrency Control ..................24
2.1 Transaction - Concept, Properties of transaction, States of transaction
2.2 Transaction Execution
2.2.1 Types of Execution
2.2.2 Associated Problem in Concurrent execution.
2.3 Schedules – Concept
2.3.1 Types of Schedule
2.3.2 Concept of Serializability
2.3.3 Precedence Graph for Serializability.
2.4 Ensuring Serializability by Locks,
2.4.1 Different Lock Modes
2.4.2 2PL and its variations.
2.5 Basic timestamp method for concurrency, Thomas Write Rule.
2.6 Locks with Multiple Granularity, Dynamic Database Concurrency (Phantom Problem).
2.7 Timestamps vs Locking.
2.8 Deadlock and Deadlock Handling –
2.8.1 Deadlock Avoidance (Wait-Die, Wound-Wait),
2.8.2 Deadlock Detection (Wait for Graph).
2.8.3 Deadlock Recovery
3. Database Integrity and Security Concepts............................36
3.1 Constraints
3.1.1 Domain Constraints
3.1.2 Referential Integrity Constraint
3.2 Database Security Concepts.
3.3 Methods for Database Security
3.3.1 Discretionary Access Control (DAC)
3.3.2 Mandatory Access Control (MAC)
3.3.3 Role Base Access Control for Multilevel Security.
3.4 Use of views in Security Enforcement.
3.5 Overview of Encryption Technique for Security.
3.6 Statistical Database Security.
4. Crash Recovery...........................................................61
4.1 Concepts of failure, Failure Classification
4.2 Recovery Concepts
4.3 Log Base Recovery Techniques
4.3.1 Deferred
4.3.2 Immediate Update
4.4 Checkpoints, Relationship between Database Manager and Buffer Cache
4.5 Aries Recovery Algorithm.
4.6 Recovery with Concurrent Transactions (Rollback, Checkpoints, Commit)
4.7 Database Backup and Recovery from Catastrophic Failure.
5. Other Databases....................................78
5.1 Introduction to Parallel and Distributed Databases
5.2 Object Based Databases
5.3 XML Databases
5.4 NoSQL Database
5.5 Multimedia Databases
5.6 Big Data Databases
Important Questions.................................................90