Foreword |
|
xiii | |
Preface |
|
xv | |
|
Part 1 DB2 UDB Certification |
|
|
|
IBM DB2 Universal Database Certification |
|
|
3 | (32) |
|
DB2 Universal Database Certification Roles |
|
|
3 | (13) |
|
IBM Certified Database Associate---DB2 Universal Database V8.1 Family |
|
|
4 | (1) |
|
IBM Certified Database Administrator---DB2 Universal Database V8.1 for Linux, UNIX, and Windows |
|
|
5 | (2) |
|
IBM Certified Database Administrator---DB2 Universal Database V8.1 for z/OS and OS/390 |
|
|
7 | (2) |
|
IBM Certified Application Developer---DB2 Universal Database V8.1 Family |
|
|
9 | (3) |
|
IBM Certified Advanced Database Administrator---DB2 Universal Database V8.1 for Linux, UNIX, and Windows |
|
|
12 | (1) |
|
IBM Certified Solution Designer---Business Intelligence V8.1 |
|
|
13 | (3) |
|
The Certification Process |
|
|
16 | (19) |
|
Preparing for the Certification Exams |
|
|
16 | (2) |
|
Arranging to Take a Certification Exam |
|
|
18 | (2) |
|
Taking an IBM Certification Exam |
|
|
20 | (15) |
|
Part 2 DB2 UDB Linux, UNIX, and Windows Database Administration |
|
|
|
|
35 | (86) |
|
|
37 | (4) |
|
|
39 | (2) |
|
Detaching from an Instance |
|
|
41 | (1) |
|
The DB2 Administration Server (DAS) |
|
|
41 | (2) |
|
Distributed Connections and Communications |
|
|
43 | (11) |
|
Configuring Communications |
|
|
44 | (3) |
|
The DB2COMM Registry Variable |
|
|
47 | (2) |
|
|
49 | (5) |
|
Controlling Database Access |
|
|
54 | (1) |
|
|
54 | (4) |
|
Where Does Authentication Take Place? |
|
|
55 | (2) |
|
Trusted Clients versus Untrusted Clients |
|
|
57 | (1) |
|
Authorities and Privileges |
|
|
58 | (18) |
|
|
59 | (5) |
|
|
64 | (11) |
|
Requirements for Granting and Revoking Authorities and Privileges |
|
|
75 | (1) |
|
Granting Authorities and Privileges |
|
|
76 | (13) |
|
Granting and Revoking Authorities and Privileges from the Control Center |
|
|
77 | (1) |
|
Granting Authorities and Privileges with the Grant SQL Statement |
|
|
78 | (6) |
|
Revoking Authorities and Privileges with the Revoke SQL Statement |
|
|
84 | (5) |
|
Authorities and Privileges Needed to Perform Common Tasks |
|
|
89 | (2) |
|
Taking Control of a Server |
|
|
91 | (6) |
|
Finding Out Who is Using an Instance or a Database |
|
|
91 | (2) |
|
The Force Application Command |
|
|
93 | (1) |
|
The Quiesce and Unquiesce Commands |
|
|
94 | (3) |
|
|
97 | (2) |
|
|
99 | (1) |
|
|
100 | (11) |
|
Obtaining Information about an Error Code |
|
|
101 | (1) |
|
First Failure Data Capture (FFDC) |
|
|
102 | (9) |
|
|
111 | (6) |
|
|
117 | (4) |
|
|
121 | (50) |
|
|
123 | (1) |
|
|
124 | (4) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (3) |
|
Database (or Data) Objects |
|
|
128 | (1) |
|
Creating a DB2 UDB Database with the Create Database Command |
|
|
128 | (9) |
|
What Happens When a DB2 UDB Database is Created |
|
|
129 | (5) |
|
The Create Database Command |
|
|
134 | (3) |
|
Creating a DB2 UDB Database with the Create Database Wizard |
|
|
137 | (3) |
|
The Configuration Advisor |
|
|
139 | (1) |
|
Creating Additional Storage Objects |
|
|
140 | (15) |
|
|
141 | (1) |
|
Modifying Existing Buffer Pools |
|
|
142 | (2) |
|
|
144 | (5) |
|
Modifying Existing Tablespaces |
|
|
149 | (3) |
|
|
152 | (2) |
|
|
154 | (1) |
|
Obtaining Information About Existing Tablespaces |
|
|
155 | (6) |
|
Obtaining Information about the Containers Used by a Tablespace |
|
|
158 | (3) |
|
|
161 | (5) |
|
|
166 | (5) |
|
|
171 | (68) |
|
|
174 | (1) |
|
|
175 | (25) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (2) |
|
|
181 | (1) |
|
Referential Integrity Constraints |
|
|
182 | (14) |
|
Informational Constraints |
|
|
196 | (1) |
|
Temporarily Suspending Constraint Checking with the Set Integrity SQL Statement |
|
|
197 | (3) |
|
|
200 | (13) |
|
|
206 | (2) |
|
Creating Tables That Are Similar to Existing Tables |
|
|
208 | (1) |
|
A Word about Declared Temporary Tables |
|
|
209 | (1) |
|
Create Table SQL Statement Examples |
|
|
210 | (3) |
|
|
213 | (8) |
|
|
218 | (1) |
|
Maltidimensional Clustering (MDC) Table Indexes |
|
|
219 | (1) |
|
Type-1 and Type-2 Indexes |
|
|
220 | (1) |
|
|
221 | (4) |
|
The Task Center (Revisited) |
|
|
225 | (3) |
|
|
228 | (7) |
|
|
235 | (4) |
|
|
239 | (94) |
|
Configuring the DB2 System Environment |
|
|
242 | (5) |
|
Configuring Instances and Databases |
|
|
247 | (31) |
|
The DB2 Database Manager Instance Configuration |
|
|
247 | (17) |
|
|
264 | (14) |
|
The Database System Monitor |
|
|
278 | (20) |
|
|
280 | (6) |
|
|
286 | (12) |
|
The Health Monitor and the Health Center |
|
|
298 | (3) |
|
Monitoring SQL with the Explain Facility |
|
|
301 | (18) |
|
|
302 | (1) |
|
|
303 | (7) |
|
|
310 | (9) |
|
Managing SQL Statement Execution with the DB2 Governor and the DB2 Query Patroller |
|
|
319 | (2) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
321 | (6) |
|
|
327 | (6) |
|
|
333 | (86) |
|
DB2 UDB's Data Movement Utilities and the File Formats They Support |
|
|
335 | (54) |
|
|
336 | (1) |
|
Non-Delimited ASCII (ASC) |
|
|
337 | (1) |
|
|
338 | (1) |
|
PC Integrated Exchange Format (IXF) |
|
|
338 | (1) |
|
Extracting Columnar Data from External Files |
|
|
339 | (2) |
|
The DB2 UDB Export Utility |
|
|
341 | (7) |
|
The DB2 UDB Import Utility |
|
|
348 | (17) |
|
|
365 | (23) |
|
|
388 | (1) |
|
Data Maintenance Utilities |
|
|
389 | (21) |
|
|
389 | (6) |
|
|
395 | (3) |
|
|
398 | (3) |
|
|
401 | (5) |
|
|
406 | (4) |
|
|
410 | (5) |
|
|
415 | (4) |
|
|
419 | (50) |
|
|
421 | (4) |
|
|
425 | (6) |
|
|
426 | (5) |
|
Database Recovery Concepts |
|
|
431 | (4) |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
Recoverable and Non-recoverable Databases |
|
|
433 | (1) |
|
Online versus Offline Backup and Recovery |
|
|
434 | (1) |
|
Incremental Backup and Recovery |
|
|
434 | (1) |
|
Performing a Crash Recovery Operation |
|
|
435 | (3) |
|
A Word about Soft Checkpoints |
|
|
438 | (1) |
|
|
438 | (19) |
|
The DB2 UDB Backup Utility |
|
|
439 | (3) |
|
The Recovery History File |
|
|
442 | (3) |
|
The DB2 UDB Restore Utility |
|
|
445 | (6) |
|
The DB2 UDB Rollforward Utility |
|
|
451 | (5) |
|
Rebuilding Invalid Indexes |
|
|
456 | (1) |
|
Backing Up a Database with Split Mirroring |
|
|
457 | (3) |
|
Initializing a Split Mirror with db2inidb |
|
|
459 | (1) |
|
|
460 | (5) |
|
|
465 | (4) |
|
Appendix A DB2 UDB V8.1 for Linux, UNIX, and Windows Database Administration Certification Exam (Exam 701) Objectives |
|
|
469 | (4) |
|
DB2 Server Management (19%) |
|
|
469 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
Monitoring DB2 Activity (16%) |
|
|
470 | (1) |
|
|
471 | (1) |
|
Backup and Recovery (14%) |
|
|
471 | (2) |
|
Appendix B DB2 UDB V8.1 for Linux, UNIX, and Windows Database Administration Certification Upgrade Exam (Exam 706) Objectives |
|
|
473 | (4) |
|
DB2 Server Management (20%) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
474 | (1) |
|
Monitoring DB2 Activity (14%) |
|
|
474 | (1) |
|
|
474 | (1) |
|
Backup and Recovery (17%) |
|
|
474 | (3) |
Index |
|
477 | |