Logo

The Relational Model for Database Management

Large book cover: The Relational Model for Database Management

The Relational Model for Database Management
by

Publisher: Addison-Wesley
ISBN/ASIN: 0201141922
ISBN-13: 9780201141924
Number of pages: 567

Description:
Written by the originator of the relational model, this book covers the practical aspects of the design of relational databases. The author defines twelve rules that database management systems need to follow in order to be described as truly relational and then gives the motivation behind these rules. This book is a perfect resource for students and professionals in the field.

Home page url

Download or read it online for free here:
Download link
(no longer freely available)

Similar books

Book cover: Data Mining Desktop Survival GuideData Mining Desktop Survival Guide
by - Togaware Pty Ltd
Data mining is about building models from data. We build models to gain insights into the world and how the world works. A data miner, in building models, deploys many different data analysis and model building techniques.
(29269 views)
Book cover: Databases, Types, and The Relational Model: The Third ManifestoDatabases, Types, and The Relational Model: The Third Manifesto
by - Addison Wesley
This is a book on database management based on an earlier book by the same authors. It can be seen as an abstract blueprint for the design of a DBMS and the language interface to such a DBMS. It serves as a basis for a model of type inheritance.
(8947 views)
Book cover: Database design with UML and SQLDatabase design with UML and SQL
by
This text is a teaching resource for an introductory database class at California State University Long Beach, Department of Computer Engineering and Computer Science. It is also designed to be used as an individual self-study tutorial.
(22393 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(23749 views)