Summary: Designed for students learning databases for the first time, Database Systems: An Application Oriented Approach, Complete Version, Second Edition presents the principles underlying the design and implementation of databases and database applications. The second edition of the Complete Version is designed for use in either a one semester introductory database course, or a longer sequence covering advanced material on databases or transaction processing. Chapters 1-1 ...show more5 cover the core material for an introductory course. Chapters 16-29 cover advanced database topics such as Object Databases, Security, XML and Data Mining. A new chapter 28 covers Web Services topics. A practical case study is integrated throughout giving students an opportunity to work with a rich database application and implement technical concepts such as database design, query processing and, transaction processing.Edition/Copyright: 2ND 06
New To This Edition
- Added new chapter on Web Services.
- Includes encryption, authentication, and e-commerce transaction coverage.
- In-depth coverage of XML, object-oriented databases, and database tuning.
- Comprehensive discussion on ODBC, JDBC, Dynamic SQL, SQLJ.
- Complete coverage of UML with technical detail.
- Early coverage of Schema Refinement (functional dependencies and normal forms).
- Includes Triggers and Active Databases coverage.
- Complete coverage on the architecture of transaction processing systems and transaction models.
- Integrated application, ''the student registration system'', illustrating topics being covered.
- A new chapter onData Mining has been added.
- A new chapter on Web Services that contains material on SOAP, WSDL, BPEL, UDDI, and XML-based transaction processing using WS-Coordination and WS-Transaction has been added.
- More sections covering Security in XML-Based Web Services.
- Coverage of SQL updated to the latest standard.
- Added material on Web Application Servers and J2EE.
- A new chapter on Database Tuning has been added.
- More coverage on XML-based encryption, using XML-Encryption, XML-Signature, WS-Security and SAML.
- Added material on UML.
Publisher: Addison-Wesley Longman, Inc.