Tutorials to .com

Tutorials to .com » Database » Sqlserver » Microsoft SQL Server Tutorial

Microsoft SQL Server Tutorial Articles


601: Snapshot replication
16.3.1 Overview snapshot copy Copy is a snapshot of a moment in the publication of data on a "camera", to generate a database of published data to describe the instantaneous state of the static files, and finally in the specified time wil...

602: Configuration copy
Copy in the implementation of the system before copying the configuration options, including: Publisher Subscriber Distributor Distributed database SQL Server Enterprise Manager through the provision of the Create Publication Wizard and the Con...

603: Copy of the overview and terminology
Geographical dispersion of a large enterprise organizations to build distributed computing has the typical characteristics of large-scale enterprise management information system must be solved at a very difficult problem; how between different data...

604: Database backup and recovery system
System database on the SQL Server to preserve many of the key data, the loss of the data system will bring very serious consequences, so we must also back up the database on the system. Once such a system or database failure, you can to rebuild the ...

605: SQL database to restore
2 in front, we introduced how to use SQL Server Enterprise Manager and as well as the BACKUP command to back up SQL Server to provide the Backup Wizard. This section we will introduce some of the database recovery, and how to use SQL Server Enterpri...

606: Backup Wizard
We know that the database backup and recovery is a major work of DBA, but if you are a novice DBA, we recommend that you do not understand how in the end before may wish to use the Backup Wizard. It can tell you should be doing the backup using the ...

607: SQL database backup
15.3.1 Using SQL Server Enterprise Manager Backup Management In SQL Server in both the database backup or transaction log backup, differential backup, the backup file or group of steps are the same. Use SQL Server Enterprise Manager to back up the ...

608: Create a backup device
During the backup must be created before the first backup device. Backup device is used to store database or transaction log backup files and the storage medium group. Backup device can be hard disks, magnetic tapes or pipe. SQL Server only supports...

609: An overview of backup and recovery
The main rationale is to prevent the illegal or non-authorized users who log on to the SQL Server database or data damage, but in some cases this appeared to be inadequate safety management mechanism. For example, legitimate users of the database da...

610: SQL Server security management means
When the server running SQL Server, we always should try to enable SQL Server users from illegal intrusion, to refuse access to the database, ensure data security. SQL Server provides a powerful built-in security and data protection, to help achieve...

611: The role of management
14.5.1 Role Management Since the version of SQL Server 7 introduced the concept of a new role in order to substitute the previous version of the concept of group. And the same group, SQL Server administrators can set up some users for a particular ...

612: Rights Management
14.4.1 Rights Management Profile Users log on to the following SQL Server security account number (user account) are vested in the NT group or role has been granted permission by the users to decide which database objects as well as the implementat...

613: Database users
14.3.1 Database User Profile Database user used to point out what a certain person to be able to access a database. In a database, the user ID only identifies a user, the user access to data and database objects through all the relations to the con...

614: The management of SQL Server login
14.2.1 management SQLServer Enterprise Manager with SQL Server Login In the SQL Server through SQL Server Enterprise Manager, follow these steps to manage the SQLServer Login: (1) Start SQL Server Enterprise Manager, click the login server close t...

615: Users and security management - SQL Server login authentication
Of any business organization, data security is most important. Security mainly refers to allow those with access to the data of users to log on to SQL Server and access data and database objects to the limits of the implementation of the operation, ...

616: Stored procedure outlined in
In a large database, stored procedures and triggers have a very important role. Both the stored procedure or trigger, are SQL statements and process control a collection of statements. Essentially, a stored procedure triggers. When the stored proced...

617: Database lock
11.5.1 The concept of lock lock (Lock) is a multi-user environment on a restricted resource access. Mechanism when the lock on a data source, this data source will have a certain access restrictions. We call this data source for the "lock."...

618: SQL Database Services
11.4.1 Origin of Service delete from department where dept_id ='1012 ' DELETE statement to amend Article II employee table delete from employee where dept_id ='1012 ' In the implementation of the first DELETE statement, the dat...

619: Update data
11.3.1 UPDATE syntax users can use UPDATE statement to update the table or a data value, the syntax is as follows: Each parameter as follows: SET SET clause to update the methods used to specify that the use of Replace the corresponding value of...

620: User-defined function
In addition to using the system function, users can also customize the function. User-defined function (User Defined Functions) is a new SQL Server 2000 database objects, SQL Server is a big step forward. User-defined function can not be used for t...


Page 31 of 39
[1]   [2]   [3]   [4]   [5]   [6]   [7]   [8]   [9]   [10]   [11]   [12]   [13]   [14]   [15]   [16]   [17]   [18]   [19]   [20]   [21]   [22]   [23]   [24]   [25]   [26]   [27]   [28]   [29]   [30]   [31]   [32]   [33]   [34]   [35]   [36]   [37]   [38]   [39]