Logo

Databases, Types, and The Relational Model: The Third Manifesto

Large book cover: Databases, Types, and The Relational Model: The Third Manifesto

Databases, Types, and The Relational Model: The Third Manifesto
by

Publisher: Addison Wesley
ISBN/ASIN: 0321399420
Number of pages: 604

Description:
This is a book on database management that is based on an earlier book by the same authors, Foundation for Future Database Systems: The Third Manifesto. It can be seen as an abstract blueprint for the design of a DBMS and the language interface to such a DBMS. In particular, it serves as a basis for a model of type inheritance.

Home page url

Download or read it online for free here:
Download link
(3.4MB, PDF)

Similar books

Book cover: Data Mining Desktop Survival GuideData Mining Desktop Survival Guide
by - Togaware Pty Ltd
Data mining is about building models from data. We build models to gain insights into the world and how the world works. A data miner, in building models, deploys many different data analysis and model building techniques.
(13729 views)
Book cover: A Programmer's Guide to Data MiningA Programmer's Guide to Data Mining
by - GuideToDatamining.com
Before you is a tool for learning basic data mining techniques. If you are a programmer interested in learning a bit about data mining you might be interested in a beginner's hands-on guide as a first step. That's what this book provides.
(8131 views)
Book cover: Data Modeling Techniques for Data WarehousingData Modeling Techniques for Data Warehousing
by - IBM Redbooks
It covers data modeling techniques for data warehousing, within the context of the overall data warehouse development process. The process of data warehouse modeling, including the steps required before and after the actual modeling, is discussed.
(19620 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(18617 views)