UNIX network programming: the sockets networking API / (Record no. 3378)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07955cam a2200181 a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788120328235 (pb) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.7/12768 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stevens, W. Richard. |
245 10 - TITLE STATEMENT | |
Title | UNIX network programming: the sockets networking API / |
Statement of responsibility, etc. | edited by W. Richard Stevens,Bill Fenner and Andrew M. Rudoff |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Upper Saddle River, NJ : |
Name of publisher, distributor, etc. | Prentice Hall PTR, |
Date of publication, distribution, etc. | 2004 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiii.991 p. |
Other physical details | ill. ; |
Dimensions | 25 cm. |
505 1# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1 An Overview of Database Management<br/>1.1 Introduction<br/>1.2 What Is a Database System?<br/>1.3 What Is a Database?<br/>1.4 Why Database?<br/>Data Independence<br/>1.6 Relatipnal Systems and Others<br/>1.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 2 Database System Architecture<br/>2.1 Introduction<br/>2.2 The Three Levels of the Architecture<br/>2.3 The External Level<br/>2.4 The Conceptual Level<br/>2.5 The Internal Level<br/>2.6 Mappings<br/>2.7 The Database Administrator<br/>The Database Management System<br/>2.9 Client/Server Architecture<br/>2.10 Utilities<br/>2.11 Distributed Processing<br/>2.12 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 3 An Introduction to Relational Databases<br/>3.1 Introduction<br/>3.2 An Informal Look at the Relational Model<br/>3.3 The Catalog<br/>3.4 Base Tables and Views<br/>3.5 Transactions<br/>3.6 The Suppliers-and-Parts Database<br/>3.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 4 -An Introduction to SQL<br/>4.1 Introduction<br/>4.2 Overview<br/>4.3 The Cat^og<br/>4.4 Views<br/>4.5 Transactions<br/>4.6 Embedded SQL<br/>4.7 Dynamic SQL and SQL/CLI<br/>4.8 SQL Is Not Perfect<br/>4.9 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 5 TYPES<br/>5.1 Iiitroduction.<br/>5.2 Values vs. Variables<br/>5.3 Type Generators<br/>5.4 SQL Facilities<br/>5.5 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 6 Relations<br/>6.1 Introduction<br/>6.2 Tuples<br/>6.3 Relation Types<br/>6.4 Relation Values<br/>6.5 Relation Variables<br/>6.6 SQL Facilities<br/>6.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 7 Relational Algebra<br/>7.1 Introduction<br/>7.2 Closure Revisited<br/>7.3 Relational Operators<br/>7.4 Examples<br/>7.5 What Is the Algebra For?<br/>7.6 Further Points<br/>7.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 8 Relational Calculus<br/>8.1 Introduction<br/>8.2 Tuple Calculus<br/>8.3 Examples<br/>8.4 Calculus vs. Algebra<br/>8.5 Computational Capabilities<br/>8.6 SQL Facilities<br/>8.7 Domain Calculus<br/>8.8 Query-By-Example<br/>8.9 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 9 Integrity<br/>9.1 Introduction<br/>9.2 Internal vs. External Predicates<br/>9.3 Correctness vs. Consistency<br/>9.4 Integrity and Views<br/>9.5 A Constraint Classification Scheme<br/>9.6 Keys<br/>9.7 Triggers (A Digression)<br/>9.8 SQL Facilities<br/>9.9 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 10 Views<br/>10.1 Introduction<br/>10.2 What Are Views For?<br/>10.3 View Retrievals<br/>10.4 View Updates<br/>10.5 SQL Facilities<br/>10.6 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 11 Functional Dependencies<br/>11.1 Introduction<br/>11.2 Basic Definitions<br/>11.3 Trivial and Nontrivial Dependencies<br/>11.4 Closure of a Set of Dependencies<br/>11.5 Closure of a Set of Attributes<br/>11.6 Irreducible Sets of Dependencies<br/>11.7 Sununary<br/>Exercises<br/>References and Bibliography<br/>Chapter 12 Further Normalization I: INF, 2NF, 3NF, BCNF<br/>12.1 Introduction<br/>12.2 Nonloss Decomposition and Functional Dependencies<br/>12.3 First, Second, and Third Normal Forms<br/>12.4 Dependency Preservation<br/>12.5 Boyce/Codd Normal Form<br/>12.6 A Note on Relation-Valued Attributes<br/>12.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 13 Further Normalization 11: Higher Normal Forms<br/>13.1 Introduction<br/>13.2 Multi-valued Dependencies and Fourth Normal Form<br/>13.3 Join Dependencies and Fifth Normal Form<br/>13.4 The Normalization Procedure Summarized<br/>13.5 A Note on Denormalization<br/>13.6 Orthogonal Design (A Digression)<br/>13.7 Other Normal Forms<br/>13.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 14 Semantic Modeling<br/>14.1 Introduction<br/>14.2 The Overall Approach<br/>14.3 The E/R Model<br/>14.4 E/R Diagrams<br/>14.5 Database Design with the E/R Model<br/>14.6 A Brief Analysis<br/>14.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 15 Recovery<br/>15.1 Introduction<br/>15.2 Transactions<br/>15.3 Transaction Recovery<br/>15.4 System Recovery<br/>15.5 Two-Phase Commit<br/>15.6 Savepoints (A Digression)<br/>15.7 SQL Facilities<br/>15.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 16 Concurrency<br/>16.1 Introduction<br/>16.2 Three Concurrency Problems<br/>16.3 Locking 388<br/>16.4 The Three Concurrency Problems Revisited<br/>16.5 Deadlock<br/>16.6 Serializability<br/>16.7 Recovery Revisited<br/>16.8 Isolation Levels<br/>16.9 Intent Locking<br/>16.10 Dropping ACID<br/>16.11 SQL Facilities 408<br/>16.12 Summary 409<br/>Exercises 410<br/>References and Bibliography<br/>412<br/>Chapter 17 Security<br/>17.1 Introduction<br/>17.2 Discretionary Access Control<br/>17.3 Mandatory Access Control<br/>17.4 Statistical Databases<br/>17.5 Data Encryption<br/>17.6 SQL Facilities<br/>17.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 18 Optimization<br/>18.1 Introduction<br/>18.2 A Motivating Example<br/>18.3 An Overview of Query Processing<br/>18.4 Expression Transformation<br/>18.5 Database Statistics<br/>18.6 A Divide-and-Conquer Strategy<br/>18.7 Implementing the Relational Operators<br/>18.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 19 Missing Information<br/>19.1 Introduction<br/>- 19.2 An Overview of the 3VL Approach<br/>Contents xix<br/>19.3<br/>19.4<br/>19.5<br/>19.6<br/>19.7<br/>19.8<br/>Some Consequences of the Foregoing Scheme<br/>Nulls and Keys<br/>Outer Join (A Digression)<br/>Special Values<br/>SQL Facilities<br/>Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 20 Type Inheritance<br/>20.1<br/>20.2<br/>20.3<br/>20.4<br/>20.5<br/>20.6<br/>20.7<br/>20.8<br/>20.9<br/>20.10<br/>20.11<br/>Introduction<br/>Type Hierarchies<br/>Polymorphism and Substitutability<br/>Variables and Assignments<br/>Specialization by Constraint<br/>Comparisons<br/>Operators, Versions, and Signatures<br/>Is a Circle an Ellipse?<br/>Specialization by Constraint Revisited<br/>SQL Facilities<br/>Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 21 Distributed Databases<br/>21.1<br/>21.2<br/>21.3<br/>21.4<br/>21.5<br/>21.6<br/>21.7<br/>21.8<br/>Introduction<br/>Some Preliminaries<br/>The Twelve Objectives<br/>Problems of Distributed Systems<br/>Client/Server Systems<br/>DBMS Independence<br/>SQL Facilities )<br/>Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 22 Dedsion Support<br/>22.1 Introduction<br/>22.2 Aspeas of Decision Support<br/>22.3 Database Design for Decision Support<br/>22.4 Data Preparation 599<br/>22.5 Data Warehouses and Data Marts<br/>22.6 Online Analytical Processing<br/>22.7 Data Mining<br/>22.8 SQL Facilities<br/>22.9 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 23 Temporal Databases<br/>23.1 Introduction<br/>23.2 What Is the Problem?<br/>23.3 Intervals<br/>23.4 Packing and Unpacking Relations<br/>23.5 Generalizing the Relational Operators<br/>23.6 Database Design<br/>23.7 Integrity Constraints<br/>23.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 24 Logic-Based Databases<br/>24.1 Introduction<br/>24.2 Overview<br/>24.3 Propositional Calculus<br/>24.4 Predicate Calculus<br/>24.5 A Proof-Theoretic View of Databases<br/>24.6 Deductive Database Systems<br/>24.7 Recursive Query Processing<br/>24.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 25 Object Databases<br/>25.1 Introduction<br/>25.2 Objects, Classes, Methods, and Messages<br/>25.3 A Closer Look<br/>25.4 A Cradle-to-Grave Example<br/>25.5 Miscellaneous Issues<br/>25.6 Sununary<br/>Exercises<br/>References and Bibliography<br/>Chapter 26 Object/Relational Databases<br/>26.1 Introduction<br/>26.2 The First Great Blunder<br/>26.3 The Second Great Blunder<br/>26.4 Implementation Issues<br/>26.5 Benefits of True Rapprochement<br/>26.6 SQL Facilities<br/>26.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 27 The World Wide Web and XML<br/>27.1 Introduction<br/>27.2 The Web and the Internet<br/>27.3 An Overview of XML<br/>27.4 XML Data Definition<br/>27.5 XML Data Manipulation<br/>27.6 XML and Databases<br/>27.7 SQL Facilities<br/>27.8 Summary<br/>Exercises<br/>References and Bibliography |
650 #0 - SUBJECT | |
Keyword | Computer Networks. |
650 #0 - SUBJECT | |
Keyword | Internet Programming. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | GN Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession number | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 22/06/2016 | 005.7/12768 | P35877 | 22/06/2016 | General Books |