Index

P

packages : installing Installing a JAR
packages : Java A Java glossary
Use of import statements
packages : jConnect The jConnect driver files
packets : network communications The network layer
packets : size limit Tuning IPX performance
page size : performance Use a larger page size
page size : switch Setting a maximum page size
parentheses : in arithmetic statements Computing values in the select list
Computing values in the select list
parentheses : UNION operators The UNION operation: combining queries
password : default DBA authority overview
Password connection parameter : about Connection parameters
passwords : case sensitivity Case-sensitivity
passwords : changing Changing a password
passwords : encryption Increasing password security
passwords : length Security tips
passwords : Lotus Notes Lotus Notes SQL 2.0 (2.04.0203))
passwords : security features Increasing password security
passwords : security tips Security tips
passwords : utility database Utility database passwords
performance : about CHAPTER 24. Monitoring and Improving Performance
performance : and page size How indexes work
performance : autocommit Turn off autocommit mode
performance : bulk loading Tuning bulk loading of data
performance : bulk operations Use bulk operations methods
performance : cache Increase the cache size
performance : cursors Prefetching rows
performance : database design Normalize your table structure
performance : disk fragmentation Preallocating space for database files
performance : file fragmentation Defragment your drives
performance : file management Place different files on different devices
performance : improving concurrency Improving concurrency
performance : improving versus locks Reducing the impact of locking
performance : indexes Working with indexes
Use indexes effectively
performance : IPX Tuning IPX performance
performance : Java values How Java objects are stored
performance : JDBC Using prepared statements for more efficient access
performance : joins and Performance considerations
performance : keys Using keys to improve query performance
performance : monitoring Monitoring database performance
Monitoring database statistics from the Windows NT Performance Monitor
performance : monitoring in Sybase Central Monitoring database statistics from Sybase Central
performance : multiple table queries Search strategies for queries from more than one table
performance : network Evaluating network performance
performance : of LTM Replicating transactions in batches
performance : page size Use a larger page size
performance : prepared statements Preparing statements
performance : server options What else is there to it?
performance : switches Controlling performance and memory from the command line
performance : TCP/IP Tuning TCP/IP performance
performance : temporary tables Temporary tables used in query processing
performance : tips Top performance tips
performance : transaction log The transaction log
Always use a transaction log
performance : transaction log mirrors Using a transaction log mirror
performance : using Interactive SQL to examine Using Interactive SQL to examine query performance
performance monitor : starting Monitoring database statistics from the Windows NT Performance Monitor
performance monitor : Windows NT Monitoring database statistics from the Windows NT Performance Monitor
permissions : about Controlling the tasks users can perform
permissions : Adaptive Server Enterprise Users and groups
permissions : conflicts How user permissions are assessed
permissions : connect Creating new users
permissions : data modification Permissions for data modification
permissions : DBA authority DBA authority overview
permissions : debugging Requirements for using the Java debugger
permissions : external procedures Creating procedures and functions with external calls
permissions : file administration statements Permission to execute file administration statements
permissions : granting passwords Creating new users
permissions : group Managing groups
permissions : group membership Granting group membership to users
permissions : groups Group permissions overview
Permissions of groups
permissions : in Sybase Central Granting permissions on tables and views
permissions : individual Managing individual user IDs and permissions
permissions : inheriting Granting users the right to grant permissions
Managing groups
permissions : JDBC Miscellaneous JDBC notes
permissions : listing Users and permissions in the system tables
permissions : managing CHAPTER 21. Managing User IDs and Permissions
permissions : negative Controlling the tasks users can perform
permissions : overview Database permissions overview
permissions : passwords Changing a password
permissions : procedure result sets Returning result sets from procedures
permissions : procedures Permissions to execute procedures
Granting permissions on procedures
Granting permissions on procedures
permissions : RESOURCE authority RESOURCE authority overview
Granting DBA and RESOURCE authority
permissions : revoking Revoking user permissions
permissions : scheme Controlling database access
permissions : security features Controlling database access
permissions : switches Controlling permissions from the command line
permissions : Sybase Central Granting permissions on procedures
permissions : tables Table and views permissions overview
Granting permissions on tables and views
permissions : the right to grant Granting users the right to grant permissions
permissions : triggers Trigger execution permissions
RESOURCE authority overview
Execution permissions of triggers
permissions : user-defined functions Permissions to execute user-defined functions
permissions : views Permissions on views
Table and views permissions overview
Granting permissions on tables and views
Using views and procedures for extra security
permissions : WITH GRANT OPTION Granting users the right to grant permissions
persistence : Java classes Scope and persistence
personal server : about Introduction
personal server : deploying Deploying personal servers
phantom : locks The four types of locks
Locking during deletes
Locking during deletes
phantom : rows Three typical types of inconsistency
Tutorial 3 - A phantom row
Tutorial 4 - Practical locking implications
How Adaptive Server Anywhere implements locking
Selecting at isolation level 2
Selecting at isolation level 3
phantom : write locks The four types of locks
phantom locks The four types of locks
phantom rows : versus isolation levels Isolation levels and consistency
Tutorial 3 - A phantom row
Tutorial 4 - Practical locking implications
How Adaptive Server Anywhere implements locking
physical data model : generating Step 4: Resolve the relationships
physical data organiation Physical data organization and access
physical layer : about The physical layer
physical layer : troubleshooting Diagnosing wiring problems
ping : TCP/IP Testing a TCP/IP protocol stack
ping : testing networks Ensure that network communication software is running
ping : testing Open Client Verifying the server address
plus operator : NULL values Properties of NULL
polling frequency : for services Setting the service polling frequency
port numbers : TCP/IP Starting the database server as an Open Server
portable computers : replicating databases Replication and concurrency
portable SQL General guidelines for writing portable SQL
positioned delete operation : about Modifying rows through a cursor
positioned update operation : about Modifying rows through a cursor
PowerBuilder : remote data access Accessing remote data from PowerBuilder DataWindows
PowerBuilder : using AUTOINCREMENT Primary key generation
predicates : about The WHERE clause: specifying rows
predicates : analysis of Predicate analysis
predicates : selectivity estimation Selectivity estimation
prefetch : about Fetching multiple rows
prefetch : cursors Prefetching rows
PREFETCH option : performance Prefetching rows
PREPARE statement : remote data access Remote transaction management overview
prepared statements : bind parameters How to use prepared statements
prepared statements : connection limit Managing the resources connections use
prepared statements : cursors Steps in using a cursor
prepared statements : dropping How to use prepared statements
prepared statements : Java objects Inserting an object from Java
prepared statements : JDBC Using prepared statements for more efficient access
prepared statements : using Preparing statements
PreparedStatement class : setObject method Inserting an object from Java
PreparedStatement interface : about Using prepared statements for more efficient access
prepareStatement method : using How to use prepared statements
preserved table : outer joins Transact-SQL left-outer joins
primary keys : concurrency Particular concurrency issues
primary keys : creating Creating primary and foreign keys
primary keys : entity integrity Primary keys enforce entity integrity
primary keys : generation Primary key generation
primary keys : Java columns Comparing Java objects
primary keys : order of columns Creating primary and foreign keys
primary keys : performance Using keys to improve query performance
primary keys : transaction log The transaction log
primary site : adding Replication Server information Add Replication Server information to the primary database
primary site : Replication Server Replicate sites and primary sites
primary site : uses of LTM at Primary site components
primary sites : creating Set up the Adaptive Server Anywhere databases
primary sites : Replication Server Primary site components
print : Java Printing to the command line
println method : Java Printing to the command line
private : Java access A Java glossary
procedure language : overview Transact-SQL procedure language overview
procedure not found error : Java methods Passing arguments to Java methods
procedures : about CHAPTER 10. Using Procedures, Triggers, and Batches
Procedure and trigger overview
procedures : and the Adaptive Server Anywhere LTM Using the LTM
procedures : benefits of Benefits of procedures and triggers
procedures : calling Calling procedures
procedures : command delimiter Check if you need to change the command delimiter
procedures : creating Creating procedures
procedures : cursors Using cursors in procedures and triggers
procedures : dates Specifying dates and times in procedures
procedures : default error handling Default error handling in procedures and triggers
procedures : dropping Dropping procedures
procedures : error handling Errors and warnings in procedures and triggers
Error handling in Transact-SQL procedures
Transact-SQL-like error handling in the Watcom-SQL dialect
procedures : exception handlers Using exception handlers in procedures and triggers
procedures : EXECUTE IMMEDIATE statement Using the EXECUTE IMMEDIATE statement in procedures
procedures : execution permissions Permissions to execute procedures
procedures : external Calling external libraries from procedures
procedures : multiple result sets from Returning multiple result sets from procedures
procedures : parameters Declaring parameters for procedures
Passing parameters to procedures
procedures : permissions Granting permissions on procedures
procedures : permissions for creating RESOURCE authority overview
procedures : permissions for result sets Returning result sets from procedures
procedures : replicating Preparing procedures and functions for replication
SQL Statements for controlling procedure replication
SQL Statements for controlling procedure replication
procedures : result sets Returning procedure results in result sets
Returning result sets from procedures
procedures : returning results Returning results from procedures
Returning results as procedure parameters
procedures : returning results from Returning procedure results in parameters
procedures : savepoints Transactions and savepoints in procedures and triggers
procedures : security Using views and procedures for extra security
procedures : SQL statements allowed SQL statements allowed in procedures and triggers
procedures : structure The structure of procedures and triggers
procedures : table names Use fully-qualified names for tables in procedures
procedures : times Specifying dates and times in procedures
procedures : tips Some tips for writing procedures
procedures : Transact-SQL Automatic translation of stored procedures
procedures : Transact-SQL overview Transact-SQL stored procedure overview
procedures : translation Automatic translation of stored procedures
Using Sybase Central to translate stored procedures
procedures : using Introduction to procedures
procedures : using cursors in Using cursors on SELECT statements in procedures
procedures : variable result sets from Returning variable result sets from procedures
procedures : verifying input Verifying that procedure input arguments are passed correctly
procedures : warnings Default handling of warnings in procedures and triggers
procedures : writing Some tips for writing procedures
processing transactions An overview of transactions
programming interfaces : connections Introduction to connections
property : definition of Entities
property function : about Obtaining database statistics from a client application
protected : Java access A Java glossary
protected keyword : Java A Java glossary
protocol stacks : layers Network communication concepts
protocols : about CHAPTER 26. Client/Server Communications
protocols : application layer The application layer
protocols : compatibility Compatible protocol stacks
protocols : complications Real world protocol stacks
protocols : data link layer The data link layer
protocols : layers Network communication concepts
protocols : multiple stacks Working with multiple protocol stacks
protocols : network adapters Configuring your network adapter board
protocols : network layer The network layer
protocols : OSI Reference Model The protocol stack
protocols : physical layer The physical layer
protocols : stack compatibility How information is passed across a network
protocols : supported Selecting communications protocols
Supported network protocols
protocols : switch Selecting communications protocols
protocols : transport layer The transport layer
protocols : troubleshooting Troubleshooting network communications
protocols : two-phase locking Two-phase locking
prototypes : external functions External function prototypes
proxy tables : about Remote table mappings
Working with proxy tables
proxy tables : creating Remote table mappings
Working with proxy tables
Creating proxy tables using Sybase Central
Using the CREATE EXISTING TABLE statement
Using the CREATE TABLE statement
proxy tables : location Specifying proxy table locations
proxy tables : properties Creating proxy tables using Sybase Central
proxy tables : Sybase Central Creating proxy tables using Sybase Central
public : Java access A Java glossary
public fields : issues Public fields
PUBLIC group Special groups
publications : data replication and concurrency Replication and concurrency
put operation : about Modifying rows through a cursor
PUT statement : about Modifying rows through a cursor
PWD connection parameter : about Connection parameters