
| packages : installing | Installing a JAR |
| packages : Java | A Java glossary Use of import statements |
| packages : jConnect | The jConnect driver files |
| packets : network communications | The network layer |
| packets : size limit | Tuning IPX performance |
| page size : performance | Use a larger page size |
| page size : switch | Setting a maximum page size |
| parentheses : in arithmetic statements | Computing values in the select list Computing values in the select list |
| parentheses : UNION operators | The UNION operation: combining queries |
| password : default | DBA authority overview |
| Password connection parameter : about | Connection parameters |
| passwords : case sensitivity | Case-sensitivity |
| passwords : changing | Changing a password |
| passwords : encryption | Increasing password security |
| passwords : length | Security tips |
| passwords : Lotus Notes | Lotus Notes SQL 2.0 (2.04.0203)) |
| passwords : security features | Increasing password security |
| passwords : security tips | Security tips |
| passwords : utility database | Utility database passwords |
| performance : about | CHAPTER 24. Monitoring and Improving Performance |
| performance : and page size | How indexes work |
| performance : autocommit | Turn off autocommit mode |
| performance : bulk loading | Tuning bulk loading of data |
| performance : bulk operations | Use bulk operations methods |
| performance : cache | Increase the cache size |
| performance : cursors | Prefetching rows |
| performance : database design | Normalize your table structure |
| performance : disk fragmentation | Preallocating space for database files |
| performance : file fragmentation | Defragment your drives |
| performance : file management | Place different files on different devices |
| performance : improving concurrency | Improving concurrency |
| performance : improving versus locks | Reducing the impact of locking |
| performance : indexes | Working with indexes Use indexes effectively |
| performance : IPX | Tuning IPX performance |
| performance : Java values | How Java objects are stored |
| performance : JDBC | Using prepared statements for more efficient access |
| performance : joins and | Performance considerations |
| performance : keys | Using keys to improve query performance |
| performance : monitoring | Monitoring database performance Monitoring database statistics from the Windows NT Performance Monitor |
| performance : monitoring in Sybase Central | Monitoring database statistics from Sybase Central |
| performance : multiple table queries | Search strategies for queries from more than one table |
| performance : network | Evaluating network performance |
| performance : of LTM | Replicating transactions in batches |
| performance : page size | Use a larger page size |
| performance : prepared statements | Preparing statements |
| performance : server options | What else is there to it? |
| performance : switches | Controlling performance and memory from the command line |
| performance : TCP/IP | Tuning TCP/IP performance |
| performance : temporary tables | Temporary tables used in query processing |
| performance : tips | Top performance tips |
| performance : transaction log | The transaction log Always use a transaction log |
| performance : transaction log mirrors | Using a transaction log mirror |
| performance : using Interactive SQL to examine | Using Interactive SQL to examine query performance |
| performance monitor : starting | Monitoring database statistics from the Windows NT Performance Monitor |
| performance monitor : Windows NT | Monitoring database statistics from the Windows NT Performance Monitor |
| permissions : about | Controlling the tasks users can perform |
| permissions : Adaptive Server Enterprise | Users and groups |
| permissions : conflicts | How user permissions are assessed |
| permissions : connect | Creating new users |
| permissions : data modification | Permissions for data modification |
| permissions : DBA authority | DBA authority overview |
| permissions : debugging | Requirements for using the Java debugger |
| permissions : external procedures | Creating procedures and functions with external calls |
| permissions : file administration statements | Permission to execute file administration statements |
| permissions : granting passwords | Creating new users |
| permissions : group | Managing groups |
| permissions : group membership | Granting group membership to users |
| permissions : groups | Group permissions overview Permissions of groups |
| permissions : in Sybase Central | Granting permissions on tables and views |
| permissions : individual | Managing individual user IDs and permissions |
| permissions : inheriting | Granting users the right to grant permissions Managing groups |
| permissions : JDBC | Miscellaneous JDBC notes |
| permissions : listing | Users and permissions in the system tables |
| permissions : managing | CHAPTER 21. Managing User IDs and Permissions |
| permissions : negative | Controlling the tasks users can perform |
| permissions : overview | Database permissions overview |
| permissions : passwords | Changing a password |
| permissions : procedure result sets | Returning result sets from procedures |
| permissions : procedures | Permissions to execute procedures Granting permissions on procedures Granting permissions on procedures |
| permissions : RESOURCE authority | RESOURCE authority overview Granting DBA and RESOURCE authority |
| permissions : revoking | Revoking user permissions |
| permissions : scheme | Controlling database access |
| permissions : security features | Controlling database access |
| permissions : switches | Controlling permissions from the command line |
| permissions : Sybase Central | Granting permissions on procedures |
| permissions : tables | Table and views permissions overview Granting permissions on tables and views |
| permissions : the right to grant | Granting users the right to grant permissions |
| permissions : triggers | Trigger execution permissions RESOURCE authority overview Execution permissions of triggers |
| permissions : user-defined functions | Permissions to execute user-defined functions |
| permissions : views | Permissions on views Table and views permissions overview Granting permissions on tables and views Using views and procedures for extra security |
| permissions : WITH GRANT OPTION | Granting users the right to grant permissions |
| persistence : Java classes | Scope and persistence |
| personal server : about | Introduction |
| personal server : deploying | Deploying personal servers |
| phantom : locks | The four types of locks Locking during deletes Locking during deletes |
| phantom : write locks | The four types of locks |
| phantom locks | The four types of locks |
| phantom rows : versus isolation levels | Isolation levels and consistency Tutorial 3 - A phantom row Tutorial 4 - Practical locking implications How Adaptive Server Anywhere implements locking |
| physical data model : generating | Step 4: Resolve the relationships |
| physical data organiation | Physical data organization and access |
| physical layer : about | The physical layer |
| physical layer : troubleshooting | Diagnosing wiring problems |
| ping : TCP/IP | Testing a TCP/IP protocol stack |
| ping : testing networks | Ensure that network communication software is running |
| ping : testing Open Client | Verifying the server address |
| plus operator : NULL values | Properties of NULL |
| polling frequency : for services | Setting the service polling frequency |
| port numbers : TCP/IP | Starting the database server as an Open Server |
| portable computers : replicating databases | Replication and concurrency |
| portable SQL | General guidelines for writing portable SQL |
| positioned delete operation : about | Modifying rows through a cursor |
| positioned update operation : about | Modifying rows through a cursor |
| PowerBuilder : remote data access | Accessing remote data from PowerBuilder DataWindows |
| PowerBuilder : using AUTOINCREMENT | Primary key generation |
| predicates : about | The WHERE clause: specifying rows |
| predicates : analysis of | Predicate analysis |
| predicates : selectivity estimation | Selectivity estimation |
| prefetch : about | Fetching multiple rows |
| prefetch : cursors | Prefetching rows |
| PREFETCH option : performance | Prefetching rows |
| PREPARE statement : remote data access | Remote transaction management overview |
| prepared statements : bind parameters | How to use prepared statements |
| prepared statements : connection limit | Managing the resources connections use |
| prepared statements : cursors | Steps in using a cursor |
| prepared statements : dropping | How to use prepared statements |
| prepared statements : Java objects | Inserting an object from Java |
| prepared statements : JDBC | Using prepared statements for more efficient access |
| prepared statements : using | Preparing statements |
| PreparedStatement class : setObject method | Inserting an object from Java |
| PreparedStatement interface : about | Using prepared statements for more efficient access |
| prepareStatement method : using | How to use prepared statements |
| preserved table : outer joins | Transact-SQL left-outer joins |
| primary keys : concurrency | Particular concurrency issues |
| primary keys : creating | Creating primary and foreign keys |
| primary keys : entity integrity | Primary keys enforce entity integrity |
| primary keys : generation | Primary key generation |
| primary keys : Java columns | Comparing Java objects |
| primary keys : order of columns | Creating primary and foreign keys |
| primary keys : performance | Using keys to improve query performance |
| primary keys : transaction log | The transaction log |
| primary site : adding Replication Server information | Add Replication Server information to the primary database |
| primary site : Replication Server | Replicate sites and primary sites |
| primary site : uses of LTM at | Primary site components |
| primary sites : creating | Set up the Adaptive Server Anywhere databases |
| primary sites : Replication Server | Primary site components |
| print : Java | Printing to the command line |
| println method : Java | Printing to the command line |
| private : Java access | A Java glossary |
| procedure language : overview | Transact-SQL procedure language overview |
| procedure not found error : Java methods | Passing arguments to Java methods |
| procedures : about | CHAPTER 10. Using Procedures, Triggers, and Batches Procedure and trigger overview |
| procedures : and the Adaptive Server Anywhere LTM | Using the LTM |
| procedures : benefits of | Benefits of procedures and triggers |
| procedures : calling | Calling procedures |
| procedures : command delimiter | Check if you need to change the command delimiter |
| procedures : creating | Creating procedures |
| procedures : cursors | Using cursors in procedures and triggers |
| procedures : dates | Specifying dates and times in procedures |
| procedures : default error handling | Default error handling in procedures and triggers |
| procedures : dropping | Dropping procedures |
| procedures : error handling | Errors and warnings in procedures and triggers Error handling in Transact-SQL procedures Transact-SQL-like error handling in the Watcom-SQL dialect |
| procedures : exception handlers | Using exception handlers in procedures and triggers |
| procedures : EXECUTE IMMEDIATE statement | Using the EXECUTE IMMEDIATE statement in procedures |
| procedures : execution permissions | Permissions to execute procedures |
| procedures : external | Calling external libraries from procedures |
| procedures : multiple result sets from | Returning multiple result sets from procedures |
| procedures : parameters | Declaring parameters for procedures Passing parameters to procedures |
| procedures : permissions | Granting permissions on procedures |
| procedures : permissions for creating | RESOURCE authority overview |
| procedures : permissions for result sets | Returning result sets from procedures |
| procedures : replicating | Preparing procedures and functions for replication SQL Statements for controlling procedure replication SQL Statements for controlling procedure replication |
| procedures : result sets | Returning procedure results in result sets Returning result sets from procedures |
| procedures : returning results | Returning results from procedures Returning results as procedure parameters |
| procedures : returning results from | Returning procedure results in parameters |
| procedures : savepoints | Transactions and savepoints in procedures and triggers |
| procedures : security | Using views and procedures for extra security |
| procedures : SQL statements allowed | SQL statements allowed in procedures and triggers |
| procedures : structure | The structure of procedures and triggers |
| procedures : table names | Use fully-qualified names for tables in procedures |
| procedures : times | Specifying dates and times in procedures |
| procedures : tips | Some tips for writing procedures |
| procedures : Transact-SQL | Automatic translation of stored procedures |
| procedures : Transact-SQL overview | Transact-SQL stored procedure overview |
| procedures : translation | Automatic translation of stored procedures Using Sybase Central to translate stored procedures |
| procedures : using | Introduction to procedures |
| procedures : using cursors in | Using cursors on SELECT statements in procedures |
| procedures : variable result sets from | Returning variable result sets from procedures |
| procedures : verifying input | Verifying that procedure input arguments are passed correctly |
| procedures : warnings | Default handling of warnings in procedures and triggers |
| procedures : writing | Some tips for writing procedures |
| processing transactions | An overview of transactions |
| programming interfaces : connections | Introduction to connections |
| property : definition of | Entities |
| property function : about | Obtaining database statistics from a client application |
| protected : Java access | A Java glossary |
| protected keyword : Java | A Java glossary |
| protocol stacks : layers | Network communication concepts |
| protocols : about | CHAPTER 26. Client/Server Communications |
| protocols : application layer | The application layer |
| protocols : compatibility | Compatible protocol stacks |
| protocols : complications | Real world protocol stacks |
| protocols : data link layer | The data link layer |
| protocols : layers | Network communication concepts |
| protocols : multiple stacks | Working with multiple protocol stacks |
| protocols : network adapters | Configuring your network adapter board |
| protocols : network layer | The network layer |
| protocols : OSI Reference Model | The protocol stack |
| protocols : physical layer | The physical layer |
| protocols : stack compatibility | How information is passed across a network |
| protocols : supported | Selecting communications protocols Supported network protocols |
| protocols : switch | Selecting communications protocols |
| protocols : transport layer | The transport layer |
| protocols : troubleshooting | Troubleshooting network communications |
| protocols : two-phase locking | Two-phase locking |
| prototypes : external functions | External function prototypes |
| proxy tables : about | Remote table mappings Working with proxy tables |
| proxy tables : creating | Remote table mappings Working with proxy tables Creating proxy tables using Sybase Central Using the CREATE EXISTING TABLE statement Using the CREATE TABLE statement |
| proxy tables : location | Specifying proxy table locations |
| proxy tables : properties | Creating proxy tables using Sybase Central |
| proxy tables : Sybase Central | Creating proxy tables using Sybase Central |
| public : Java access | A Java glossary |
| public fields : issues | Public fields |
| PUBLIC group | Special groups |
| publications : data replication and concurrency | Replication and concurrency |
| put operation : about | Modifying rows through a cursor |
| PUT statement : about | Modifying rows through a cursor |
| PWD connection parameter : about | Connection parameters |