UID connection parameter : about | Connection parameters |
UNC connection parameter : about | Connection parameters |
unchained mode : transactions | Setting autocommit or manual commit mode |
uncommitted data : avoiding using cursors | Cursor stability |
Unconditional connection parameter : about | Connection parameters |
Unicode character sets : about | Variable length character sets |
UNION operation : about | The UNION operation: combining queries |
unique columns : Java columns | Comparing Java objects |
unique cursors : about | Types of cursor |
unique keys : generating and concurrency | Primary key generation |
unique results : limiting | Eliminating duplicate query results |
UNIX : database server | Platform-specific instructions |
UNIX : deployment issues | UNIX deployment issues |
UNIX : directory structure | UNIX deployment issues |
UNIX : ODBC support | Using ODBC data sources on UNIX |
UNIX : TCP/IP | Using TCP/IP with UNIX |
UNIX : threaded applications | UNIX deployment issues |
unknown values. about | Unknown Values: NULL |
UNLOAD TABLE statement : about | Unloading data using the UNLOAD TABLE statement |
unloading : databases | Unloading a database using DBUNLOAD |
unloading : tables | Unloading a database using DBUNLOAD |
unserializable transaction scheduling : effects of | Correctness |
UPDATE permissions | Granting permissions on tables and views |
UPDATE statement | Using the LTM |
UPDATE statement : Java | Updating Java objects |
UPDATE statement : locking during | Locking during updates |
UPDATE statement : positioned | Modifying rows through a cursor |
UPDATE statement : using | Changing data using UPDATE |
UPDATE statement : using join operations | Changing data using UPDATE |
URL : database | Specifying a database on a server |
URL : jConnect | Supplying a URL for the server |
user authentication : security features | Security features overview |
user estimates : selectivity | User estimates |
user identification : security features | Security features overview |
user IDs : Adaptive Server Enterprise | Users and groups |
user IDs : case-sensitivity | Case-sensitivity |
user IDs : creating | Creating new users |
user IDs : default | The user ID default DBA authority overview |
user IDs : deleting | Revoking user permissions |
user IDs : listing | Users and permissions in the system tables |
user IDs : managing | CHAPTER 21. Managing User IDs and Permissions |
user IDs : security tip | Security tips |
user-defined classes : Java | User-defined classes |
user-defined data types : case-sensitivity | Case-sensitivity |
user-defined data types : CHECK conditions | Column CHECK conditions from user-defined data types |
user-defined functions : calling | Calling user-defined functions |
user-defined functions : creating | Creating user-defined functions |
user-defined functions : dropping | Dropping user-defined functions |
user-defined functions : execution permissions | Permissions to execute user-defined functions |
user-defined functions : external | Calling external libraries from procedures |
user-defined functions : parameters | Passing parameters to functions |
user-defined functions : using | Introduction to user-defined functions |
Userid connection parameter : about | Connection parameters |
users : adding to groups | Granting group membership to users |
users : creating | Managing individual user IDs and permissions |
users : occasionally connected | Replication and concurrency |
uses for locks | The four types of locks |
utilities | Connecting from Adaptive Server Anywhere utilities |
utility database : about | Using the utility database |
utility database : passwords | Utility database passwords |
utility database : security | Utility database server security |