early release of locks | Two-phase locking Typical transactions at various isolation levels Early release of read locks—an exception |
effects of : transaction scheduling | Correctness |
effects of : unserializable transaction scheduling | Correctness |
efficiency : improving and locks | Reducing the impact of locking |
efficiency : improving using indexes | Special optimizations |
eliminating lost updates | Transactions for which no updates are lost |
embedded databases : connectin | Connecting to an embedded database |
embedded databases : connection parameters | Connection parameter priorities |
embedded databases : deploying | Deploying embedded database applications |
embedded databases : Java | Connecting to an embedded database |
embedded databases : starting | Connecting to an embedded database |
Embedded SQL : connections | Introduction to connections |
Embedded SQL : cursor types | Availability of cursors |
Embedded SQL : interface library | Locating the interface library |
Embedded SQL : SQL statements | Executing SQL statements in applications |
ENC connection parameter : about | Connection parameters |
encoding : character sets | Overview of language issues |
encoding : multibyte character sets | The Encodings section |
EncryptedPassword connection parameter : about | Connection parameters |
encryption : communications | Encrypting client/server communications |
encryption : passwords | Increasing password security |
Encryption connection parameter : about | Connection parameters |
ending transactions | Using transactions |
ENG connection parameter : about | Connection parameters |
EngineName connection parameter : about | Connection parameters |
EngineName connection parameter : character sets | Connection parameters |
ENP connection parameter : about | Connection parameters |
Enterprise : Adaptive Server Enterprise | CHAPTER 30. Transact-SQL Compatibility |
entities : about | Entities |
entities : attributes | Entities |
entities : choosing | Step 1: Identify entities and relationships |
entities : definition of | Database design concepts |
entities : identifiers | Entities |
entities : Java | Entities and attributes in relational and object-oriented data |
entity integrity : enforcing | Enforcing entity and referential integrity |
entity-relationship diagrams : definition of | Database design concepts |
entity-relationship diagrams : reading | Relationships |
entity-relationship modeling | CHAPTER 13. Designing Your Database |
enumeration of joins | Join enumeration |
environment variables | Connecting from Adaptive Server Anywhere utilities |
environment variables : SQLCONNECT | Connecting from Adaptive Server Anywhere utilities |
equality : Java objects | Comparing Java fields and objects |
equals operator : comparison operator | Using comparison operators in the WHERE clause |
erasing databases | Erasing a database |
error handling : Jave | Java error handling |
error handling : ON EXCEPTION RESUME | Error handling with ON EXCEPTION RESUME |
error handling : procedures and triggers | Default error handling in procedures and triggers |
error messages : character set translation | Character translation for database messages |
error messages : redirecting to files | Using output redirection |
errors : conversion | Handling conversion errors on data import |
errors : procedures and triggers | Errors and warnings in procedures and triggers |
errors : Transact-SQL | Error handling in Transact-SQL procedures Transact-SQL-like error handling in the Watcom-SQL dialect |
escape characters : Java | Java escape characters in SQL statements |
escape characters : SQL | Java escape characters in SQL statements |
estimates : providing | Providing estimates to improve query performance |
estimates of cost during optimization | Cost estimation |
ethernet | A checklist of common problems |
examples : implications of locking | Tutorial 4 - Practical locking implications |
examples : non-repeatable read | Tutorial 2 - The non-repeatable read |
examples : non-repeatable reads | Tutorial 1: The dirty read Tutorial 2 - The non-repeatable read |
examples : phantom rows | Tutorial 3 - A phantom row Tutorial 4 - Practical locking implications |
Excel : remote data access | Microsoft Excel (Microsoft 3.51.171300) |
exception handlers : procedures and triggers | Using exception handlers in procedures and triggers |
exceptions : declaring | Default error handling in procedures and triggers |
exceptions : Java | Java error handling |
Exceptions window : Java debugger | The debugger windows |
exclusive locks | The four types of locks The four types of locks |
exclusive versus shared locks | The four types of locks |
executable directory : about | Installed files |
EXECUTE IMMEDIATE statement : procedures | Using the EXECUTE IMMEDIATE statement in procedures |
executeQuery method : about | Queries using JDBC |
executeUpdate JDBC method : using | How to use prepared statements |
executeUpdate method : about | Inserts, updates, and deletes using JDBC |
exporting data : about | Exporting data from a database |
exporting data : dbunload utility | Unloading a database using DBUNLOAD |
exporting data : OUTPUT statement | Exporting query results using Interactive SQL |
exporting data : overview | Import and export overview |
exporting data : UNLOAD TABLE statement | Unloading data using the UNLOAD TABLE statement |
expressions : NULL values | Properties of NULL |
external functions : prototypes | External function prototypes |
external functions : return types | External function return types |
external logins : about | Working with external logins |
external logins : creating | Creating external logins Creating external logins from Sybase Central |
external logins : dropping | Dropping external logins |
external procedures : about | Calling external libraries from procedures |