
| table names : fully qualified | Use fully-qualified names for tables in procedures |
| table names : international aspects | International aspects of case sensitivity |
| table names : local | Specifying proxy table locations |
| table names : procedures and triggers | Use fully-qualified names for tables in procedures |
| tables : adding keys to | Creating primary and foreign keys |
| tables : altering | Altering tables |
| tables : column names | Choosing column names |
| tables : constraints | Choosing constraints |
| tables : copying rows | Adding new rows with SELECT |
| tables : correlation names | The FROM clause: specifying tables Self-joins and correlation names |
| tables : creating | Creating tables |
| tables : defining proxy | Using the CREATE EXISTING TABLE statement Using the CREATE TABLE statement |
| tables : dropping | Deleting tables |
| tables : group owners | Referring to tables owned by groups |
| tables : joining many | Joining more than two tables |
| tables : listing remote | Listing the remote tables on a server |
| tables : loading | Loading data using the LOAD TABLE statement |
| tables : names, in joins | The FROM clause Self-joins and correlation names |
| tables : naming in queries | The FROM clause: specifying tables |
| tables : owner | Ownership permissions overview |
| tables : permissions | RESOURCE authority overview Table and views permissions overview |
| tables : properties | Designing the database table properties |
| tables : proxy | Creating proxy tables using Sybase Central |
| tables : qualified names | Referring to tables owned by groups Database object names and prefixes |
| tables : remote access | Basic concepts |
| tables : renaming | Altering tables |
| tables : replicating | Create the table for the primary database Configuring tables for replication |
| tables : structure | Altering tables |
| tables : Transact-SQL | Creating compatible tables |
| tables : Transact-SQL outer joins | Transact-SQL outer joins |
| tables : unloading | Unloading data using the UNLOAD TABLE statement Unloading a database using DBUNLOAD |
| tables : working with | Working with tables |
| tabular data stream : about | Open Clients, Open Servers, and TDS |
| TCP/IP : about | The network layer Using the TCP/IP protocol |
| TCP/IP : addresses | Adding or changing the server address |
| TCP/IP : Open Server | Starting the database server as an Open Server |
| TCP/IP : OS/2 | Using TCP/IP with OS/2 |
| TCP/IP : performance | Tuning TCP/IP performance |
| TCP/IP : testing | Testing a TCP/IP protocol stack |
| TCP/IP : transport protocol | The transport layer |
| TCP/IP : troubleshooting | Testing a TCP/IP protocol stack |
| TCP/IP : UNIX | Using TCP/IP with UNIX |
| TCP/IP : Windows 3.x | Using TCP/IP with Windows 3.x |
| TCP/IP : Windows 95 | Using TCP/IP with Windows 95 and Windows NT |
| TCP/IP : Windows NT | Using TCP/IP with Windows 95 and Windows NT |
| TCP/IP : Winsock standard | Using TCP/IP with Windows 3.x |
| TCP/IP protocol : starting | Selecting communications protocols |
| TDS : about | Open Clients, Open Servers, and TDS |
| telnet : TCP/IP testing | Testing a TCP/IP protocol stack |
| telnet : testing networks | Ensure that network communication software is running |
| TEMP environment variable : disk space | Ensure that you have sufficient disk space for your temporary file |
| temporary tables : and result sets | Returning result sets from Transact-SQL procedures |
| temporary tables : importing data | Loading data that does not match the table structure |
| temporary tables : in procedures | Returning result sets from Transact-SQL procedures |
| temporary tables : query processing | Temporary tables used in query processing |
| temporary tables : Transact-SQL | Creating compatible tables |
| testing : database design | Step 3: Normalize the data Step 5: Verify the design |
| theorems : two-phase locking | Two-phase locking |
| threaded applications : UNIX | UNIX deployment issues |
| times : procedures and triggers | Specifying dates and times in procedures |
| timestamp : data type | The special Transact-SQL timestamp column and data type |
| timestamp : timestamp column | The special Transact-SQL timestamp column and data type |
| TIMESTAMP data type : skipping | Inserting values into specific columns |
| TIMESTAMP data type : Transact-SQL | The special Transact-SQL timestamp column and data type |
| timestamps : Transact-SQL | The special Transact-SQL timestamp column and data type |
| tips : security | Security tips |
| TMP environment variable : disk space | Ensure that you have sufficient disk space for your temporary file |
| tools : Interactive SQL | Tools for working with database objects |
| tools : SQL Modeler | Tools for working with database objects |
| TOP clause : queries | Retrieving the first few rows of a query |
| TRACEBACK function | Default error handling in procedures and triggers |
| trailing blanks : comparisons | Using comparison operators in the WHERE clause |
| trailing blanks : creating databases | Creating a Transact-SQL-compatible database |
| trailing blanks : Transact-SQL | Creating a Transact-SQL-compatible database |
| Transact-SQL : about | CHAPTER 30. Transact-SQL Compatibility |
| Transact-SQL : batches | Transact-SQL batch overview |
| Transact-SQL : creating databases | Creating a Transact-SQL-compatible database |
| Transact-SQL : IDENTITY column | The special IDENTITY column |
| Transact-SQL : joins | Compatibility of joins |
| Transact-SQL : overview | An overview of Transact-SQL support |
| Transact-SQL : procedures | Transact-SQL stored procedure overview |
| Transact-SQL : result sets | Returning result sets from Transact-SQL procedures |
| Transact-SQL : timestamp column | The special Transact-SQL timestamp column and data type |
| Transact-SQL : trailing blanks | Creating a Transact-SQL-compatible database |
| Transact-SQL : triggers | Transact-SQL trigger overview |
| Transact-SQL : variables | Variables in Transact-SQL procedures |
| Transact-SQL : writing portable SQL | General guidelines for writing portable SQL |
| Transact-SQL compatibility : databases | Case-sensitivity |
| transaction log : about | CHAPTER 20. Backup and Data Recovery |
| transaction log : allocating space | Preallocating space for database files |
| transaction log : Log Transfer Manager | Primary site components |
| transaction log : management | Using the LTM |
| transaction log : media failure | Media failure on the transaction log |
| transaction log : mirror | Using a transaction log mirror Transaction log and backup management |
| transaction log : overview | The transaction log |
| transaction log : primary keys | The transaction log |
| transaction log : role in data replication | Replication and concurrency |
| transaction log : size | The transaction log |
| transaction log : switch | Running in special modes |
| transaction log : uncommitted changes | Recovering uncommitted changes |
| transaction log : validating | Validating the transaction log on database startup |
| transaction log mirror : purpose | Using a transaction log mirror |
| transaction logs : performance | Always use a transaction log |
| transaction management | Transaction management and remote data |
| transaction processing | An overview of transactions Improving concurrency |
| transaction processing : and data recovery | Transactions and data recovery |
| transaction processing : and performance | Improving concurrency |
| transaction processing : benefits of concurrency | Introduction to concurrency |
| transaction processing : concurrent | Introduction to concurrency |
| transaction processing : effects of scheduling | Correctness |
| transaction processing : scheduling | Correctness |
| transaction processing : serializable scheduling | Correctness |
| transaction processing : speeding up concurrent | Improving concurrency |
| transaction processing : transaction log based replication | Replication and concurrency |
| transaction processing : two-phase locking | Two-phase locking |
| transaction scheduling : effects of | Correctness |
| transactions : about | CHAPTER 15. Using Transactions and Locks |
| transactions : and concurrency | Introduction to concurrency |
| transactions : and data recovery | Transactions and data recovery |
| transactions : and lost updates | Transactions for which no updates are lost |
| transactions : application control | Controlling transactions in applications |
| transactions : autocommit | Setting autocommit or manual commit mode |
| transactions : benefits of concurrency | Introduction to concurrency |
| transactions : blocking | Transaction blocking Locking conflicts Transaction blocking and deadlock |
| transactions : chained mode | Setting autocommit or manual commit mode |
| transactions : committing | An overview of transactions An overview of transactions |
| transactions : completing | Using transactions |
| transactions : concurrent | Introduction to concurrency |
| transactions : cursors | Cursors and transactions |
| transactions : data modification | Transactions and data modification |
| transactions : deadlock | Transaction blocking and deadlock |
| transactions : definition of | An overview of transactions |
| transactions : interference between | Transaction blocking Locking conflicts |
| transactions : isolation level | Controlling the isolation level |
| transactions : managing | Restrictions on transaction management |
| transactions : more than one at once | Introduction to concurrency |
| transactions : overview | An overview of transactions |
| transactions : procedures and triggers | Transactions and savepoints in procedures and triggers |
| transactions : processing | An overview of transactions |
| transactions : remote data access | Remote transaction management overview |
| transactions : replicating concurrent | Replication and concurrency |
| transactions : rolling back, definition of | An overview of transactions |
| transactions : savepoints | Savepoints within transactions |
| transactions : speeding up concurrent | Improving concurrency |
| transactions : starting | Using transactions |
| transactions : sub-transactions and savepoints | Savepoints within transactions |
| transactions : typical inconsistencies | Typical inconsistencies |
| transactions processing : blocking | Transaction blocking Locking conflicts |
| translation driver : ODI and NDIS | The data link layer |
| translation drivers : about | Working with multiple protocol stacks |
| translation drivers : limitations | Working with multiple protocol stacks |
| translation drivers : multiple protocol stacks | Working with multiple protocol stacks |
| translation drivers : ODBC | ODBC code page translation |
| transport layer : about | The transport layer |
| trees : and indexes | How indexes work |
| triggers : about | CHAPTER 10. Using Procedures, Triggers, and Batches Procedure and trigger overview |
| triggers : benefits of | Benefits of procedures and triggers |
| triggers : command delimiter | Check if you need to change the command delimiter |
| triggers : creating | Creating triggers |
| triggers : cursors | Using cursors in procedures and triggers |
| triggers : dates | Specifying dates and times in procedures |
| triggers : dropping | Dropping triggers |
| triggers : error handling | Errors and warnings in procedures and triggers |
| triggers : exception handlers | Using exception handlers in procedures and triggers |
| triggers : executing | Executing triggers |
| triggers : execution permissions | Trigger execution permissions |
| triggers : permissions | RESOURCE authority overview Execution permissions of triggers |
| triggers : permissions for creating | RESOURCE authority overview |
| triggers : recursion | Transact-SQL trigger overview |
| triggers : ROLBACK statement | Transact-SQL trigger overview |
| triggers : savepoints | Transactions and savepoints in procedures and triggers |
| triggers : SQL statements allowed in | SQL statements allowed in procedures and triggers |
| triggers : statement-level | Transact-SQL trigger overview |
| triggers : structure | The structure of procedures and triggers |
| triggers : times | Specifying dates and times in procedures |
| triggers : Transact-SQL | Ensuring compatible object names Transact-SQL trigger overview |
| triggers : using | Introduction to triggers |
| triggers : warnings | Default handling of warnings in procedures and triggers |
| trouble shooting : selectivity estimates | Diagnosing and solving selectivity problems |
| troubleshooting : common problems | A checklist of common problems |
| troubleshooting : cursor positioning | Cursor management overview |
| troubleshooting : database connections | Troubleshooting connections |
| troubleshooting : protocols | Troubleshooting network communications |
| troubleshooting : remote data access | Troubleshooting remote data access |
| troubleshooting : server address | Verifying the server address |
| troubleshooting : server startup | Troubleshooting server startup Ensure that network communication software is running Debugging network communications startup problems |
| troubleshooting : wiring problems | Diagnosing wiring problems |
| TRUNCATE TABLE statement : about | Deleting all rows from a table |
| try block : Java | Java error handling |
| tsequal function | The special Transact-SQL timestamp column and data type |
| TSQL_HEX_CONSTANT option : Open Client | Characteristics of Open Client and jConnect connections |
| TSQL_VARIABLES option : Open Client | Characteristics of Open Client and jConnect connections |
| tutorials : implications of locking | Tutorial 4 - Practical locking implications |
| tutorials : non-repeatable reads | Tutorial 1: The dirty read Tutorial 2 - The non-repeatable read |
| tutorials : phantom rows | Tutorial 3 - A phantom row Tutorial 4 - Practical locking implications |
| two-phase locking | Two-phase locking |
| two-phase locking : protocol | Two-phase locking |
| two-phase locking theorem | Two-phase locking |
| type : objects | Java classes and objects |
| typical inconsistencies | Typical inconsistencies |