Beginning SQL Server 2005 Programming
- After a quick primer on database design basics and the SQL query language (for those programmers who may be building their first database application), this book provides an overview of SQL Server itself, which has been dramatically redesigned with the 2005 release
- Once readers have grasped the fundamentals of database design and SQL concepts, they will then learn how to implement those concepts with Microsoft SQL Server 2005
- Addresses creating and changing tables, managing keys, database normalization, writing scripts, working with stored procedures, programming with XML, and using SQL Server reporting and data transformation services
- The companion Web site provides all of the code found in the book
Table of Contents
Chapter 1: RDBMS Basics: What Makes Up a SQL Server Database?
Chapter 2: Tools of the Trade.
Chapter 3: The Foundation Statements of T-SQL.
Chapter 4: JOINs.
Chapter 5: Creating and Altering Tables.
Chapter 6: Constraints.
Chapter 7: Adding More to Our Queries.
Chapter 8: Being Normal: Normalization and Other Basic Design Issues.
Chapter 9: SQL Server Storage and Index Structures.
Chapter 10: Views.
Chapter 11: Writing Scripts and Batches.
Chapter 12: Stored Procedures.
Chapter 13: User Defined Functions.
Chapter 14: Transactions and Locks.
Chapter 15: Triggers.
Chapter 16: A Brief XML Primer.
Chapter 17: Reporting for Duty, Sir!: A Look At Reporting Services.
Chapter 18: Getting Integrated With Integration Services.
Chapter 19: Playing Administrator.
Appendix A: Exercise Solutions.
Appendix B: System Functions.
Appendix C: Finding the Right Tool.
Appendix D: Very Simple Connectivity Examples.
Appendix E: Installing and Using the Samples.
Sign up now »
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Ashley Deuble: Network Security Monitoring with Security Onion
- AusCERT 2013: World needs debate about “hack-back” rules of engagement
- AusCERT 2013: Police urge banks to install ATM chip technology
- Twitter aims to become safer with two-step sign-in
- Prevent a hack attack with Twitter's new two-factor authentication