table names : fully qualified | Use fully-qualified names for tables in procedures |
table names : international aspects | International aspects of case sensitivity |
table names : local | Specifying proxy table locations |
table names : procedures and triggers | Use fully-qualified names for tables in procedures |
tables : adding keys to | Creating primary and foreign keys |
tables : altering | Altering tables |
tables : column names | Choosing column names |
tables : constraints | Choosing constraints |
tables : copying rows | Adding new rows with SELECT |
tables : correlation names | The FROM clause: specifying tables Self-joins and correlation names |
tables : creating | Creating tables |
tables : defining proxy | Using the CREATE EXISTING TABLE statement Using the CREATE TABLE statement |
tables : dropping | Deleting tables |
tables : group owners | Referring to tables owned by groups |
tables : joining many | Joining more than two tables |
tables : listing remote | Listing the remote tables on a server |
tables : loading | Loading data using the LOAD TABLE statement |
tables : names, in joins | The FROM clause Self-joins and correlation names |
tables : naming in queries | The FROM clause: specifying tables |
tables : owner | Ownership permissions overview |
tables : permissions | RESOURCE authority overview Table and views permissions overview |
tables : properties | Designing the database table properties |
tables : proxy | Creating proxy tables using Sybase Central |
tables : qualified names | Referring to tables owned by groups Database object names and prefixes |
tables : remote access | Basic concepts |
tables : renaming | Altering tables |
tables : replicating | Create the table for the primary database Configuring tables for replication |
tables : structure | Altering tables |
tables : Transact-SQL | Creating compatible tables |
tables : Transact-SQL outer joins | Transact-SQL outer joins |
tables : unloading | Unloading data using the UNLOAD TABLE statement Unloading a database using DBUNLOAD |
tables : working with | Working with tables |
tabular data stream : about | Open Clients, Open Servers, and TDS |
TCP/IP : about | The network layer Using the TCP/IP protocol |
TCP/IP : addresses | Adding or changing the server address |
TCP/IP : Open Server | Starting the database server as an Open Server |
TCP/IP : OS/2 | Using TCP/IP with OS/2 |
TCP/IP : performance | Tuning TCP/IP performance |
TCP/IP : testing | Testing a TCP/IP protocol stack |
TCP/IP : transport protocol | The transport layer |
TCP/IP : troubleshooting | Testing a TCP/IP protocol stack |
TCP/IP : UNIX | Using TCP/IP with UNIX |
TCP/IP : Windows 3.x | Using TCP/IP with Windows 3.x |
TCP/IP : Windows 95 | Using TCP/IP with Windows 95 and Windows NT |
TCP/IP : Windows NT | Using TCP/IP with Windows 95 and Windows NT |
TCP/IP : Winsock standard | Using TCP/IP with Windows 3.x |
TCP/IP protocol : starting | Selecting communications protocols |
TDS : about | Open Clients, Open Servers, and TDS |
telnet : TCP/IP testing | Testing a TCP/IP protocol stack |
telnet : testing networks | Ensure that network communication software is running |
TEMP environment variable : disk space | Ensure that you have sufficient disk space for your temporary file |
temporary tables : and result sets | Returning result sets from Transact-SQL procedures |
temporary tables : importing data | Loading data that does not match the table structure |
temporary tables : in procedures | Returning result sets from Transact-SQL procedures |
temporary tables : query processing | Temporary tables used in query processing |
temporary tables : Transact-SQL | Creating compatible tables |
testing : database design | Step 3: Normalize the data Step 5: Verify the design |
theorems : two-phase locking | Two-phase locking |
threaded applications : UNIX | UNIX deployment issues |
times : procedures and triggers | Specifying dates and times in procedures |
timestamp : data type | The special Transact-SQL timestamp column and data type |
timestamp : timestamp column | The special Transact-SQL timestamp column and data type |
TIMESTAMP data type : skipping | Inserting values into specific columns |
TIMESTAMP data type : Transact-SQL | The special Transact-SQL timestamp column and data type |
timestamps : Transact-SQL | The special Transact-SQL timestamp column and data type |
tips : security | Security tips |
TMP environment variable : disk space | Ensure that you have sufficient disk space for your temporary file |
tools : Interactive SQL | Tools for working with database objects |
tools : SQL Modeler | Tools for working with database objects |
TOP clause : queries | Retrieving the first few rows of a query |
TRACEBACK function | Default error handling in procedures and triggers |
trailing blanks : comparisons | Using comparison operators in the WHERE clause |
trailing blanks : creating databases | Creating a Transact-SQL-compatible database |
trailing blanks : Transact-SQL | Creating a Transact-SQL-compatible database |
Transact-SQL : about | CHAPTER 30. Transact-SQL Compatibility |
Transact-SQL : batches | Transact-SQL batch overview |
Transact-SQL : creating databases | Creating a Transact-SQL-compatible database |
Transact-SQL : IDENTITY column | The special IDENTITY column |
Transact-SQL : joins | Compatibility of joins |
Transact-SQL : overview | An overview of Transact-SQL support |
Transact-SQL : procedures | Transact-SQL stored procedure overview |
Transact-SQL : result sets | Returning result sets from Transact-SQL procedures |
Transact-SQL : timestamp column | The special Transact-SQL timestamp column and data type |
Transact-SQL : trailing blanks | Creating a Transact-SQL-compatible database |
Transact-SQL : triggers | Transact-SQL trigger overview |
Transact-SQL : variables | Variables in Transact-SQL procedures |
Transact-SQL : writing portable SQL | General guidelines for writing portable SQL |
Transact-SQL compatibility : databases | Case-sensitivity |
transaction log : about | CHAPTER 20. Backup and Data Recovery |
transaction log : allocating space | Preallocating space for database files |
transaction log : Log Transfer Manager | Primary site components |
transaction log : management | Using the LTM |
transaction log : media failure | Media failure on the transaction log |
transaction log : mirror | Using a transaction log mirror Transaction log and backup management |
transaction log : overview | The transaction log |
transaction log : primary keys | The transaction log |
transaction log : role in data replication | Replication and concurrency |
transaction log : size | The transaction log |
transaction log : switch | Running in special modes |
transaction log : uncommitted changes | Recovering uncommitted changes |
transaction log : validating | Validating the transaction log on database startup |
transaction log mirror : purpose | Using a transaction log mirror |
transaction logs : performance | Always use a transaction log |
transaction management | Transaction management and remote data |
transaction processing | An overview of transactions Improving concurrency |
transaction processing : and data recovery | Transactions and data recovery |
transaction processing : and performance | Improving concurrency |
transaction processing : benefits of concurrency | Introduction to concurrency |
transaction processing : concurrent | Introduction to concurrency |
transaction processing : effects of scheduling | Correctness |
transaction processing : scheduling | Correctness |
transaction processing : serializable scheduling | Correctness |
transaction processing : speeding up concurrent | Improving concurrency |
transaction processing : transaction log based replication | Replication and concurrency |
transaction processing : two-phase locking | Two-phase locking |
transaction scheduling : effects of | Correctness |
transactions : about | CHAPTER 15. Using Transactions and Locks |
transactions : and concurrency | Introduction to concurrency |
transactions : and data recovery | Transactions and data recovery |
transactions : and lost updates | Transactions for which no updates are lost |
transactions : application control | Controlling transactions in applications |
transactions : autocommit | Setting autocommit or manual commit mode |
transactions : benefits of concurrency | Introduction to concurrency |
transactions : blocking | Transaction blocking Locking conflicts Transaction blocking and deadlock |
transactions : chained mode | Setting autocommit or manual commit mode |
transactions : committing | An overview of transactions An overview of transactions |
transactions : completing | Using transactions |
transactions : concurrent | Introduction to concurrency |
transactions : cursors | Cursors and transactions |
transactions : data modification | Transactions and data modification |
transactions : deadlock | Transaction blocking and deadlock |
transactions : definition of | An overview of transactions |
transactions : interference between | Transaction blocking Locking conflicts |
transactions : isolation level | Controlling the isolation level |
transactions : managing | Restrictions on transaction management |
transactions : more than one at once | Introduction to concurrency |
transactions : overview | An overview of transactions |
transactions : procedures and triggers | Transactions and savepoints in procedures and triggers |
transactions : processing | An overview of transactions |
transactions : remote data access | Remote transaction management overview |
transactions : replicating concurrent | Replication and concurrency |
transactions : rolling back, definition of | An overview of transactions |
transactions : savepoints | Savepoints within transactions |
transactions : speeding up concurrent | Improving concurrency |
transactions : starting | Using transactions |
transactions : sub-transactions and savepoints | Savepoints within transactions |
transactions : typical inconsistencies | Typical inconsistencies |
transactions processing : blocking | Transaction blocking Locking conflicts |
translation driver : ODI and NDIS | The data link layer |
translation drivers : about | Working with multiple protocol stacks |
translation drivers : limitations | Working with multiple protocol stacks |
translation drivers : multiple protocol stacks | Working with multiple protocol stacks |
translation drivers : ODBC | ODBC code page translation |
transport layer : about | The transport layer |
trees : and indexes | How indexes work |
triggers : about | CHAPTER 10. Using Procedures, Triggers, and Batches Procedure and trigger overview |
triggers : benefits of | Benefits of procedures and triggers |
triggers : command delimiter | Check if you need to change the command delimiter |
triggers : creating | Creating triggers |
triggers : cursors | Using cursors in procedures and triggers |
triggers : dates | Specifying dates and times in procedures |
triggers : dropping | Dropping triggers |
triggers : error handling | Errors and warnings in procedures and triggers |
triggers : exception handlers | Using exception handlers in procedures and triggers |
triggers : executing | Executing triggers |
triggers : execution permissions | Trigger execution permissions |
triggers : permissions | RESOURCE authority overview Execution permissions of triggers |
triggers : permissions for creating | RESOURCE authority overview |
triggers : recursion | Transact-SQL trigger overview |
triggers : ROLBACK statement | Transact-SQL trigger overview |
triggers : savepoints | Transactions and savepoints in procedures and triggers |
triggers : SQL statements allowed in | SQL statements allowed in procedures and triggers |
triggers : statement-level | Transact-SQL trigger overview |
triggers : structure | The structure of procedures and triggers |
triggers : times | Specifying dates and times in procedures |
triggers : Transact-SQL | Ensuring compatible object names Transact-SQL trigger overview |
triggers : using | Introduction to triggers |
triggers : warnings | Default handling of warnings in procedures and triggers |
trouble shooting : selectivity estimates | Diagnosing and solving selectivity problems |
troubleshooting : common problems | A checklist of common problems |
troubleshooting : cursor positioning | Cursor management overview |
troubleshooting : database connections | Troubleshooting connections |
troubleshooting : protocols | Troubleshooting network communications |
troubleshooting : remote data access | Troubleshooting remote data access |
troubleshooting : server address | Verifying the server address |
troubleshooting : server startup | Troubleshooting server startup Ensure that network communication software is running Debugging network communications startup problems |
troubleshooting : wiring problems | Diagnosing wiring problems |
TRUNCATE TABLE statement : about | Deleting all rows from a table |
try block : Java | Java error handling |
tsequal function | The special Transact-SQL timestamp column and data type |
TSQL_HEX_CONSTANT option : Open Client | Characteristics of Open Client and jConnect connections |
TSQL_VARIABLES option : Open Client | Characteristics of Open Client and jConnect connections |
tutorials : implications of locking | Tutorial 4 - Practical locking implications |
tutorials : non-repeatable reads | Tutorial 1: The dirty read Tutorial 2 - The non-repeatable read |
tutorials : phantom rows | Tutorial 3 - A phantom row Tutorial 4 - Practical locking implications |
two-phase locking | Two-phase locking |
two-phase locking : protocol | Two-phase locking |
two-phase locking theorem | Two-phase locking |
type : objects | Java classes and objects |
typical inconsistencies | Typical inconsistencies |