UNIX network programming: the sockets networking API / (Record no. 3378)

MARC details
000 -LEADER
fixed length control field 07955cam a2200181 a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788120328235 (pb)
040 ## - CATALOGING SOURCE
Transcribing agency CUS
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.7/12768
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stevens, W. Richard.
245 10 - TITLE STATEMENT
Title UNIX network programming: the sockets networking API /
Statement of responsibility, etc. edited by W. Richard Stevens,Bill Fenner and Andrew M. Rudoff
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Upper Saddle River, NJ :
Name of publisher, distributor, etc. Prentice Hall PTR,
Date of publication, distribution, etc. 2004
300 ## - PHYSICAL DESCRIPTION
Extent xxiii.991 p.
Other physical details ill. ;
Dimensions 25 cm.
505 1# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 An Overview of Database Management<br/>1.1 Introduction<br/>1.2 What Is a Database System?<br/>1.3 What Is a Database?<br/>1.4 Why Database?<br/>Data Independence<br/>1.6 Relatipnal Systems and Others<br/>1.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 2 Database System Architecture<br/>2.1 Introduction<br/>2.2 The Three Levels of the Architecture<br/>2.3 The External Level<br/>2.4 The Conceptual Level<br/>2.5 The Internal Level<br/>2.6 Mappings<br/>2.7 The Database Administrator<br/>The Database Management System<br/>2.9 Client/Server Architecture<br/>2.10 Utilities<br/>2.11 Distributed Processing<br/>2.12 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 3 An Introduction to Relational Databases<br/>3.1 Introduction<br/>3.2 An Informal Look at the Relational Model<br/>3.3 The Catalog<br/>3.4 Base Tables and Views<br/>3.5 Transactions<br/>3.6 The Suppliers-and-Parts Database<br/>3.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 4 -An Introduction to SQL<br/>4.1 Introduction<br/>4.2 Overview<br/>4.3 The Cat^og<br/>4.4 Views<br/>4.5 Transactions<br/>4.6 Embedded SQL<br/>4.7 Dynamic SQL and SQL/CLI<br/>4.8 SQL Is Not Perfect<br/>4.9 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 5 TYPES<br/>5.1 Iiitroduction.<br/>5.2 Values vs. Variables<br/>5.3 Type Generators<br/>5.4 SQL Facilities<br/>5.5 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 6 Relations<br/>6.1 Introduction<br/>6.2 Tuples<br/>6.3 Relation Types<br/>6.4 Relation Values<br/>6.5 Relation Variables<br/>6.6 SQL Facilities<br/>6.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 7 Relational Algebra<br/>7.1 Introduction<br/>7.2 Closure Revisited<br/>7.3 Relational Operators<br/>7.4 Examples<br/>7.5 What Is the Algebra For?<br/>7.6 Further Points<br/>7.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 8 Relational Calculus<br/>8.1 Introduction<br/>8.2 Tuple Calculus<br/>8.3 Examples<br/>8.4 Calculus vs. Algebra<br/>8.5 Computational Capabilities<br/>8.6 SQL Facilities<br/>8.7 Domain Calculus<br/>8.8 Query-By-Example<br/>8.9 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 9 Integrity<br/>9.1 Introduction<br/>9.2 Internal vs. External Predicates<br/>9.3 Correctness vs. Consistency<br/>9.4 Integrity and Views<br/>9.5 A Constraint Classification Scheme<br/>9.6 Keys<br/>9.7 Triggers (A Digression)<br/>9.8 SQL Facilities<br/>9.9 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 10 Views<br/>10.1 Introduction<br/>10.2 What Are Views For?<br/>10.3 View Retrievals<br/>10.4 View Updates<br/>10.5 SQL Facilities<br/>10.6 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 11 Functional Dependencies<br/>11.1 Introduction<br/>11.2 Basic Definitions<br/>11.3 Trivial and Nontrivial Dependencies<br/>11.4 Closure of a Set of Dependencies<br/>11.5 Closure of a Set of Attributes<br/>11.6 Irreducible Sets of Dependencies<br/>11.7 Sununary<br/>Exercises<br/>References and Bibliography<br/>Chapter 12 Further Normalization I: INF, 2NF, 3NF, BCNF<br/>12.1 Introduction<br/>12.2 Nonloss Decomposition and Functional Dependencies<br/>12.3 First, Second, and Third Normal Forms<br/>12.4 Dependency Preservation<br/>12.5 Boyce/Codd Normal Form<br/>12.6 A Note on Relation-Valued Attributes<br/>12.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 13 Further Normalization 11: Higher Normal Forms<br/>13.1 Introduction<br/>13.2 Multi-valued Dependencies and Fourth Normal Form<br/>13.3 Join Dependencies and Fifth Normal Form<br/>13.4 The Normalization Procedure Summarized<br/>13.5 A Note on Denormalization<br/>13.6 Orthogonal Design (A Digression)<br/>13.7 Other Normal Forms<br/>13.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 14 Semantic Modeling<br/>14.1 Introduction<br/>14.2 The Overall Approach<br/>14.3 The E/R Model<br/>14.4 E/R Diagrams<br/>14.5 Database Design with the E/R Model<br/>14.6 A Brief Analysis<br/>14.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 15 Recovery<br/>15.1 Introduction<br/>15.2 Transactions<br/>15.3 Transaction Recovery<br/>15.4 System Recovery<br/>15.5 Two-Phase Commit<br/>15.6 Savepoints (A Digression)<br/>15.7 SQL Facilities<br/>15.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 16 Concurrency<br/>16.1 Introduction<br/>16.2 Three Concurrency Problems<br/>16.3 Locking 388<br/>16.4 The Three Concurrency Problems Revisited<br/>16.5 Deadlock<br/>16.6 Serializability<br/>16.7 Recovery Revisited<br/>16.8 Isolation Levels<br/>16.9 Intent Locking<br/>16.10 Dropping ACID<br/>16.11 SQL Facilities 408<br/>16.12 Summary 409<br/>Exercises 410<br/>References and Bibliography<br/>412<br/>Chapter 17 Security<br/>17.1 Introduction<br/>17.2 Discretionary Access Control<br/>17.3 Mandatory Access Control<br/>17.4 Statistical Databases<br/>17.5 Data Encryption<br/>17.6 SQL Facilities<br/>17.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 18 Optimization<br/>18.1 Introduction<br/>18.2 A Motivating Example<br/>18.3 An Overview of Query Processing<br/>18.4 Expression Transformation<br/>18.5 Database Statistics<br/>18.6 A Divide-and-Conquer Strategy<br/>18.7 Implementing the Relational Operators<br/>18.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 19 Missing Information<br/>19.1 Introduction<br/>- 19.2 An Overview of the 3VL Approach<br/>Contents xix<br/>19.3<br/>19.4<br/>19.5<br/>19.6<br/>19.7<br/>19.8<br/>Some Consequences of the Foregoing Scheme<br/>Nulls and Keys<br/>Outer Join (A Digression)<br/>Special Values<br/>SQL Facilities<br/>Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 20 Type Inheritance<br/>20.1<br/>20.2<br/>20.3<br/>20.4<br/>20.5<br/>20.6<br/>20.7<br/>20.8<br/>20.9<br/>20.10<br/>20.11<br/>Introduction<br/>Type Hierarchies<br/>Polymorphism and Substitutability<br/>Variables and Assignments<br/>Specialization by Constraint<br/>Comparisons<br/>Operators, Versions, and Signatures<br/>Is a Circle an Ellipse?<br/>Specialization by Constraint Revisited<br/>SQL Facilities<br/>Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 21 Distributed Databases<br/>21.1<br/>21.2<br/>21.3<br/>21.4<br/>21.5<br/>21.6<br/>21.7<br/>21.8<br/>Introduction<br/>Some Preliminaries<br/>The Twelve Objectives<br/>Problems of Distributed Systems<br/>Client/Server Systems<br/>DBMS Independence<br/>SQL Facilities )<br/>Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 22 Dedsion Support<br/>22.1 Introduction<br/>22.2 Aspeas of Decision Support<br/>22.3 Database Design for Decision Support<br/>22.4 Data Preparation 599<br/>22.5 Data Warehouses and Data Marts<br/>22.6 Online Analytical Processing<br/>22.7 Data Mining<br/>22.8 SQL Facilities<br/>22.9 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 23 Temporal Databases<br/>23.1 Introduction<br/>23.2 What Is the Problem?<br/>23.3 Intervals<br/>23.4 Packing and Unpacking Relations<br/>23.5 Generalizing the Relational Operators<br/>23.6 Database Design<br/>23.7 Integrity Constraints<br/>23.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 24 Logic-Based Databases<br/>24.1 Introduction<br/>24.2 Overview<br/>24.3 Propositional Calculus<br/>24.4 Predicate Calculus<br/>24.5 A Proof-Theoretic View of Databases<br/>24.6 Deductive Database Systems<br/>24.7 Recursive Query Processing<br/>24.8 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 25 Object Databases<br/>25.1 Introduction<br/>25.2 Objects, Classes, Methods, and Messages<br/>25.3 A Closer Look<br/>25.4 A Cradle-to-Grave Example<br/>25.5 Miscellaneous Issues<br/>25.6 Sununary<br/>Exercises<br/>References and Bibliography<br/>Chapter 26 Object/Relational Databases<br/>26.1 Introduction<br/>26.2 The First Great Blunder<br/>26.3 The Second Great Blunder<br/>26.4 Implementation Issues<br/>26.5 Benefits of True Rapprochement<br/>26.6 SQL Facilities<br/>26.7 Summary<br/>Exercises<br/>References and Bibliography<br/>Chapter 27 The World Wide Web and XML<br/>27.1 Introduction<br/>27.2 The Web and the Internet<br/>27.3 An Overview of XML<br/>27.4 XML Data Definition<br/>27.5 XML Data Manipulation<br/>27.6 XML and Databases<br/>27.7 SQL Facilities<br/>27.8 Summary<br/>Exercises<br/>References and Bibliography
650 #0 - SUBJECT
Keyword Computer Networks.
650 #0 - SUBJECT
Keyword Internet Programming.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type GN Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Accession number Date last seen Koha item type
        Central Library, Sikkim University Central Library, Sikkim University General Book Section 22/06/2016 005.7/12768 P35877 22/06/2016 General Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha