Logo

The Relational Model for Database Management

Large book cover: The Relational Model for Database Management

The Relational Model for Database Management
by

Publisher: Addison-Wesley
ISBN/ASIN: 0201141922
ISBN-13: 9780201141924
Number of pages: 567

Description:
Written by the originator of the relational model, this book covers the practical aspects of the design of relational databases. The author defines twelve rules that database management systems need to follow in order to be described as truly relational and then gives the motivation behind these rules. This book is a perfect resource for students and professionals in the field.

Home page url

Download or read it online for free here:
Download link
(no longer freely available)

Similar books

Book cover: Data Mining and Knowledge Discovery in Real Life ApplicationsData Mining and Knowledge Discovery in Real Life Applications
by - InTech
This book presents different ways of theoretical and practical advances and applications of data mining in different promising areas. The book will serve as a Data Mining bible to show a right way for the students, researchers and practitioners.
(12917 views)
Book cover: Database design with UML and SQLDatabase design with UML and SQL
by
This text is a teaching resource for an introductory database class at California State University Long Beach, Department of Computer Engineering and Computer Science. It is also designed to be used as an individual self-study tutorial.
(15311 views)
Book cover: Data Mining Algorithms In RData Mining Algorithms In R
- Wikibooks
Data mining comprises techniques and algorithms, for determining interesting patterns from large datasets. There are currently hundreds algorithms that perform tasks such as frequent pattern mining, clustering, and classification, among others.
(14514 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(16974 views)