packages : installing | Installing a JAR |
packages : Java | A Java glossary Use of import statements |
packages : jConnect | The jConnect driver files |
packets : network communications | The network layer |
packets : size limit | Tuning IPX performance |
page size : performance | Use a larger page size |
page size : switch | Setting a maximum page size |
parentheses : in arithmetic statements | Computing values in the select list Computing values in the select list |
parentheses : UNION operators | The UNION operation: combining queries |
password : default | DBA authority overview |
Password connection parameter : about | Connection parameters |
passwords : case sensitivity | Case-sensitivity |
passwords : changing | Changing a password |
passwords : encryption | Increasing password security |
passwords : length | Security tips |
passwords : Lotus Notes | Lotus Notes SQL 2.0 (2.04.0203)) |
passwords : security features | Increasing password security |
passwords : security tips | Security tips |
passwords : utility database | Utility database passwords |
performance : about | CHAPTER 24. Monitoring and Improving Performance |
performance : and page size | How indexes work |
performance : autocommit | Turn off autocommit mode |
performance : bulk loading | Tuning bulk loading of data |
performance : bulk operations | Use bulk operations methods |
performance : cache | Increase the cache size |
performance : cursors | Prefetching rows |
performance : database design | Normalize your table structure |
performance : disk fragmentation | Preallocating space for database files |
performance : file fragmentation | Defragment your drives |
performance : file management | Place different files on different devices |
performance : improving concurrency | Improving concurrency |
performance : improving versus locks | Reducing the impact of locking |
performance : indexes | Working with indexes Use indexes effectively |
performance : IPX | Tuning IPX performance |
performance : Java values | How Java objects are stored |
performance : JDBC | Using prepared statements for more efficient access |
performance : joins and | Performance considerations |
performance : keys | Using keys to improve query performance |
performance : monitoring | Monitoring database performance Monitoring database statistics from the Windows NT Performance Monitor |
performance : monitoring in Sybase Central | Monitoring database statistics from Sybase Central |
performance : multiple table queries | Search strategies for queries from more than one table |
performance : network | Evaluating network performance |
performance : of LTM | Replicating transactions in batches |
performance : page size | Use a larger page size |
performance : prepared statements | Preparing statements |
performance : server options | What else is there to it? |
performance : switches | Controlling performance and memory from the command line |
performance : TCP/IP | Tuning TCP/IP performance |
performance : temporary tables | Temporary tables used in query processing |
performance : tips | Top performance tips |
performance : transaction log | The transaction log Always use a transaction log |
performance : transaction log mirrors | Using a transaction log mirror |
performance : using Interactive SQL to examine | Using Interactive SQL to examine query performance |
performance monitor : starting | Monitoring database statistics from the Windows NT Performance Monitor |
performance monitor : Windows NT | Monitoring database statistics from the Windows NT Performance Monitor |
permissions : about | Controlling the tasks users can perform |
permissions : Adaptive Server Enterprise | Users and groups |
permissions : conflicts | How user permissions are assessed |
permissions : connect | Creating new users |
permissions : data modification | Permissions for data modification |
permissions : DBA authority | DBA authority overview |
permissions : debugging | Requirements for using the Java debugger |
permissions : external procedures | Creating procedures and functions with external calls |
permissions : file administration statements | Permission to execute file administration statements |
permissions : granting passwords | Creating new users |
permissions : group | Managing groups |
permissions : group membership | Granting group membership to users |
permissions : groups | Group permissions overview Permissions of groups |
permissions : in Sybase Central | Granting permissions on tables and views |
permissions : individual | Managing individual user IDs and permissions |
permissions : inheriting | Granting users the right to grant permissions Managing groups |
permissions : JDBC | Miscellaneous JDBC notes |
permissions : listing | Users and permissions in the system tables |
permissions : managing | CHAPTER 21. Managing User IDs and Permissions |
permissions : negative | Controlling the tasks users can perform |
permissions : overview | Database permissions overview |
permissions : passwords | Changing a password |
permissions : procedure result sets | Returning result sets from procedures |
permissions : procedures | Permissions to execute procedures Granting permissions on procedures Granting permissions on procedures |
permissions : RESOURCE authority | RESOURCE authority overview Granting DBA and RESOURCE authority |
permissions : revoking | Revoking user permissions |
permissions : scheme | Controlling database access |
permissions : security features | Controlling database access |
permissions : switches | Controlling permissions from the command line |
permissions : Sybase Central | Granting permissions on procedures |
permissions : tables | Table and views permissions overview Granting permissions on tables and views |
permissions : the right to grant | Granting users the right to grant permissions |
permissions : triggers | Trigger execution permissions RESOURCE authority overview Execution permissions of triggers |
permissions : user-defined functions | Permissions to execute user-defined functions |
permissions : views | Permissions on views Table and views permissions overview Granting permissions on tables and views Using views and procedures for extra security |
permissions : WITH GRANT OPTION | Granting users the right to grant permissions |
persistence : Java classes | Scope and persistence |
personal server : about | Introduction |
personal server : deploying | Deploying personal servers |
phantom : locks | The four types of locks Locking during deletes Locking during deletes |
phantom : write locks | The four types of locks |
phantom locks | The four types of locks |
phantom rows : versus isolation levels | Isolation levels and consistency Tutorial 3 - A phantom row Tutorial 4 - Practical locking implications How Adaptive Server Anywhere implements locking |
physical data model : generating | Step 4: Resolve the relationships |
physical data organiation | Physical data organization and access |
physical layer : about | The physical layer |
physical layer : troubleshooting | Diagnosing wiring problems |
ping : TCP/IP | Testing a TCP/IP protocol stack |
ping : testing networks | Ensure that network communication software is running |
ping : testing Open Client | Verifying the server address |
plus operator : NULL values | Properties of NULL |
polling frequency : for services | Setting the service polling frequency |
port numbers : TCP/IP | Starting the database server as an Open Server |
portable computers : replicating databases | Replication and concurrency |
portable SQL | General guidelines for writing portable SQL |
positioned delete operation : about | Modifying rows through a cursor |
positioned update operation : about | Modifying rows through a cursor |
PowerBuilder : remote data access | Accessing remote data from PowerBuilder DataWindows |
PowerBuilder : using AUTOINCREMENT | Primary key generation |
predicates : about | The WHERE clause: specifying rows |
predicates : analysis of | Predicate analysis |
predicates : selectivity estimation | Selectivity estimation |
prefetch : about | Fetching multiple rows |
prefetch : cursors | Prefetching rows |
PREFETCH option : performance | Prefetching rows |
PREPARE statement : remote data access | Remote transaction management overview |
prepared statements : bind parameters | How to use prepared statements |
prepared statements : connection limit | Managing the resources connections use |
prepared statements : cursors | Steps in using a cursor |
prepared statements : dropping | How to use prepared statements |
prepared statements : Java objects | Inserting an object from Java |
prepared statements : JDBC | Using prepared statements for more efficient access |
prepared statements : using | Preparing statements |
PreparedStatement class : setObject method | Inserting an object from Java |
PreparedStatement interface : about | Using prepared statements for more efficient access |
prepareStatement method : using | How to use prepared statements |
preserved table : outer joins | Transact-SQL left-outer joins |
primary keys : concurrency | Particular concurrency issues |
primary keys : creating | Creating primary and foreign keys |
primary keys : entity integrity | Primary keys enforce entity integrity |
primary keys : generation | Primary key generation |
primary keys : Java columns | Comparing Java objects |
primary keys : order of columns | Creating primary and foreign keys |
primary keys : performance | Using keys to improve query performance |
primary keys : transaction log | The transaction log |
primary site : adding Replication Server information | Add Replication Server information to the primary database |
primary site : Replication Server | Replicate sites and primary sites |
primary site : uses of LTM at | Primary site components |
primary sites : creating | Set up the Adaptive Server Anywhere databases |
primary sites : Replication Server | Primary site components |
print : Java | Printing to the command line |
println method : Java | Printing to the command line |
private : Java access | A Java glossary |
procedure language : overview | Transact-SQL procedure language overview |
procedure not found error : Java methods | Passing arguments to Java methods |
procedures : about | CHAPTER 10. Using Procedures, Triggers, and Batches Procedure and trigger overview |
procedures : and the Adaptive Server Anywhere LTM | Using the LTM |
procedures : benefits of | Benefits of procedures and triggers |
procedures : calling | Calling procedures |
procedures : command delimiter | Check if you need to change the command delimiter |
procedures : creating | Creating procedures |
procedures : cursors | Using cursors in procedures and triggers |
procedures : dates | Specifying dates and times in procedures |
procedures : default error handling | Default error handling in procedures and triggers |
procedures : dropping | Dropping procedures |
procedures : error handling | Errors and warnings in procedures and triggers Error handling in Transact-SQL procedures Transact-SQL-like error handling in the Watcom-SQL dialect |
procedures : exception handlers | Using exception handlers in procedures and triggers |
procedures : EXECUTE IMMEDIATE statement | Using the EXECUTE IMMEDIATE statement in procedures |
procedures : execution permissions | Permissions to execute procedures |
procedures : external | Calling external libraries from procedures |
procedures : multiple result sets from | Returning multiple result sets from procedures |
procedures : parameters | Declaring parameters for procedures Passing parameters to procedures |
procedures : permissions | Granting permissions on procedures |
procedures : permissions for creating | RESOURCE authority overview |
procedures : permissions for result sets | Returning result sets from procedures |
procedures : replicating | Preparing procedures and functions for replication SQL Statements for controlling procedure replication SQL Statements for controlling procedure replication |
procedures : result sets | Returning procedure results in result sets Returning result sets from procedures |
procedures : returning results | Returning results from procedures Returning results as procedure parameters |
procedures : returning results from | Returning procedure results in parameters |
procedures : savepoints | Transactions and savepoints in procedures and triggers |
procedures : security | Using views and procedures for extra security |
procedures : SQL statements allowed | SQL statements allowed in procedures and triggers |
procedures : structure | The structure of procedures and triggers |
procedures : table names | Use fully-qualified names for tables in procedures |
procedures : times | Specifying dates and times in procedures |
procedures : tips | Some tips for writing procedures |
procedures : Transact-SQL | Automatic translation of stored procedures |
procedures : Transact-SQL overview | Transact-SQL stored procedure overview |
procedures : translation | Automatic translation of stored procedures Using Sybase Central to translate stored procedures |
procedures : using | Introduction to procedures |
procedures : using cursors in | Using cursors on SELECT statements in procedures |
procedures : variable result sets from | Returning variable result sets from procedures |
procedures : verifying input | Verifying that procedure input arguments are passed correctly |
procedures : warnings | Default handling of warnings in procedures and triggers |
procedures : writing | Some tips for writing procedures |
processing transactions | An overview of transactions |
programming interfaces : connections | Introduction to connections |
property : definition of | Entities |
property function : about | Obtaining database statistics from a client application |
protected : Java access | A Java glossary |
protected keyword : Java | A Java glossary |
protocol stacks : layers | Network communication concepts |
protocols : about | CHAPTER 26. Client/Server Communications |
protocols : application layer | The application layer |
protocols : compatibility | Compatible protocol stacks |
protocols : complications | Real world protocol stacks |
protocols : data link layer | The data link layer |
protocols : layers | Network communication concepts |
protocols : multiple stacks | Working with multiple protocol stacks |
protocols : network adapters | Configuring your network adapter board |
protocols : network layer | The network layer |
protocols : OSI Reference Model | The protocol stack |
protocols : physical layer | The physical layer |
protocols : stack compatibility | How information is passed across a network |
protocols : supported | Selecting communications protocols Supported network protocols |
protocols : switch | Selecting communications protocols |
protocols : transport layer | The transport layer |
protocols : troubleshooting | Troubleshooting network communications |
protocols : two-phase locking | Two-phase locking |
prototypes : external functions | External function prototypes |
proxy tables : about | Remote table mappings Working with proxy tables |
proxy tables : creating | Remote table mappings Working with proxy tables Creating proxy tables using Sybase Central Using the CREATE EXISTING TABLE statement Using the CREATE TABLE statement |
proxy tables : location | Specifying proxy table locations |
proxy tables : properties | Creating proxy tables using Sybase Central |
proxy tables : Sybase Central | Creating proxy tables using Sybase Central |
public : Java access | A Java glossary |
public fields : issues | Public fields |
PUBLIC group | Special groups |
publications : data replication and concurrency | Replication and concurrency |
put operation : about | Modifying rows through a cursor |
PUT statement : about | Modifying rows through a cursor |
PWD connection parameter : about | Connection parameters |