
Mastering SQL ServerTM 2005 Reporting Services Infrastructure Design
by Joseph L. Jorden-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
Summary
Author Biography
Table of Contents
Introduction | p. xvii |
Designing the Reporting Infrastructure | p. 1 |
Principles of a Reporting Infrastructure | p. 3 |
Reporting Infrastructure Basics | p. 3 |
What Is a Reporting Infrastructure? | p. 3 |
Do You Need a Reporting Infrastructure? | p. 5 |
Why Use Reporting Services | p. 6 |
What Reporting Services Can Do for You | p. 7 |
Inside Reporting Services | p. 8 |
Licensing Reporting Services | p. 11 |
The Bottom Line | p. 13 |
Determining Business Requirements | p. 15 |
Determining Current Business Requirements | p. 16 |
Understanding the Current Business Model | p. 17 |
Analyzing Business Processes | p. 17 |
Analyzing the Company Model and Geographic Scope | p. 20 |
Analyzing Organizational Structures | p. 21 |
Identifying New Business Requirements | p. 24 |
Gathering Accurate User Requirements | p. 25 |
Identifying Key Project Stakeholders | p. 26 |
Determining Business Priorities | p. 26 |
Determining Risk Tolerance | p. 27 |
Creating a Scope Document | p. 27 |
Identifying Internal and External Dependencies | p. 28 |
Creating Data-Flow Diagrams | p. 29 |
Assessing Training Needs | p. 29 |
Determining Regulatory Requirements | p. 30 |
Defining Report Requirements | p. 31 |
Planning for the Future | p. 32 |
Accurate Prognostication | p. 33 |
The Bottom Line | p. 34 |
Planning and Developing Role-Based Security | p. 35 |
Planning Role-Based Security | p. 35 |
Gathering Security Requirements | p. 36 |
Setting Security Scope | p. 37 |
Analyzing Your Security Requirements | p. 37 |
Dealing with Conflicting Requirements | p. 38 |
Analyzing the Costs, Benefits, and Risks of Requirements | p. 39 |
Implementing Role-Based Security | p. 40 |
Understanding Securable Items | p. 41 |
Understanding Tasks and Permissions | p. 41 |
Understanding Role Definitions | p. 44 |
Creating Role Assignments | p. 52 |
Exploring Minimum Access Permissions | p. 58 |
The Bottom Line | p. 59 |
Managing User Expectations | p. 61 |
Understanding Your Users | p. 62 |
Communicating with Your Users | p. 63 |
Communicate Early and Often | p. 63 |
Be Honest and Forthright | p. 65 |
Educate Your Users | p. 65 |
Prototyping and Storyboarding | p. 66 |
Training Classes | p. 68 |
Listen to Your Users | p. 70 |
Using Service-Level Agreements | p. 71 |
Preparing the SLA | p. 72 |
Writing Documentation for Users | p. 73 |
The Bottom Line | p. 74 |
Change Management | p. 75 |
Understanding Change-Management Theory | p. 75 |
Unfreezing/Changing/Refreezing | p. 76 |
ADKAR | p. 76 |
Putting Change Management into Practice | p. 77 |
Understanding Management's Role | p. 77 |
Necessary Skills for You | p. 79 |
Change-Management Strategies | p. 82 |
Managing Ongoing Change | p. 83 |
The Bottom Line | p. 84 |
Business Intelligence and Reporting | p. 85 |
Business Intelligence in SQL Server 2005 | p. 85 |
Online Analytical Processing | p. 86 |
Data Mining | p. 88 |
Installing and Configuring Analysis Services | p. 88 |
Installing Analysis Services | p. 89 |
Creating and Configuring a Project | p. 92 |
Creating a Cube | p. 96 |
Creating a Report Based on a Cube | p. 98 |
Creating a Report Based on a Data-Mining Model | p. 103 |
Creating a Data-Mining Model | p. 103 |
Creating a Report Based on a Data-Mining Model | p. 106 |
The Bottom Line | p. 111 |
Using Reporting Services in Your Infrastructure | p. 113 |
Deploying Reporting Services | p. 115 |
Planning a Reporting Services Deployment | p. 116 |
Standard Deployments | p. 116 |
Scaled-Out Deployments | p. 120 |
Playing Nice with SharePoint | p. 125 |
Automating Deployment | p. 129 |
Automating the Installation and Configuration Steps | p. 129 |
Postdeployment Configuration | p. 132 |
Custom Authorization Cookies | p. 132 |
Advanced E-mail Delivery Settings | p. 133 |
Internet Access | p. 135 |
A Deployment Checklist | p. 136 |
The Bottom Line | p. 137 |
Ad Hoc Reporting | p. 139 |
Preparing the Systems | p. 139 |
Preparing the Clients | p. 139 |
Preparing the Servers | p. 140 |
Working with Report Models | p. 143 |
Using Model Designer | p. 144 |
Using Report Manager and Management Studio | p. 156 |
Using Report Builder | p. 158 |
Creating and Designing Reports | p. 158 |
The Bottom Line | p. 161 |
Subscriptions | p. 163 |
Understanding Subscriptions | p. 164 |
Configuring the Servers | p. 165 |
Configuring a File Share | p. 165 |
Configuring E-mail Delivery | p. 165 |
Configuring the Default Delivery Extension | p. 167 |
Creating Subscriptions | p. 168 |
Standard | p. 169 |
Data Driven | p. 172 |
SharePoint Integrated | p. 179 |
Managing Subscriptions | p. 180 |
Preloading the Report Cache | p. 181 |
The Bottom Line | p. 183 |
Maintenance and Administration | p. 185 |
Managing the Report Server | p. 186 |
Administering the Services | p. 186 |
Performing Backups | p. 189 |
Managing Encryption Keys | p. 195 |
Managing Processing and Content | p. 197 |
Report Settings | p. 198 |
My Reports | p. 199 |
Managing Resources | p. 199 |
Managing Folders | p. 201 |
Managing a Running Process | p. 201 |
Troubleshooting | p. 202 |
Working with Log Files | p. 202 |
Tips for Common Problems | p. 207 |
The Bottom Line | p. 212 |
Advanced Topics | p. 215 |
Managing Reports Using Program Code | p. 217 |
Accessing Reports from within Your Code | p. 217 |
Accessing Reports with a URL | p. 218 |
Viewing Reports | p. 218 |
Using the rs:Command Parameter | p. 220 |
The rs Utility | p. 221 |
Using the rc Parameters | p. 223 |
Passing Report Parameters in a URL | p. 224 |
The Report Server Web Service | p. 225 |
Accessing the Report Server from within .NET Applications | p. 226 |
Selected Management Methods | p. 231 |
Selected Execution Methods | p. 236 |
Specifying Device Information Settings | p. 240 |
The Bottom Line | p. 243 |
Extending Reporting Services | p. 245 |
Understanding Extension Types | p. 246 |
Building a Security Extension | p. 246 |
The IAuthenticationExtension Interface | p. 247 |
The IAuthorizationExtension Interface | p. 250 |
Deploying a Custom Security Extension | p. 254 |
Building a Data Processing Extension | p. 258 |
The IDbCommand Interface | p. 259 |
The IDbConnection Interface | p. 260 |
The IDataReader Interface | p. 261 |
Deploying a Data Processing Interface | p. 263 |
Deploying a Data Processing Extension to Report Designer | p. 264 |
The Bottom Line | p. 265 |
Report Definition Language | p. 267 |
What's in an RDL File | p. 267 |
The Structure of an RDL File | p. 269 |
Creating a Report Definition File | p. 272 |
Deploying the New Report | p. 279 |
Specifying Report Parameters | p. 280 |
Creating Reports in Code | p. 281 |
Embedding Images | p. 287 |
Exploring the RDL Elements | p. 289 |
The Report Element | p. 289 |
The EmbeddedImage Element | p. 289 |
The ReportParameters Element | p. 290 |
The ReportParameter Element | p. 290 |
The ParameterValue Element | p. 290 |
The DataSet Element | p. 290 |
The Fields Element | p. 290 |
The Field Element | p. 291 |
The Query Element | p. 291 |
The QueryParameters Element | p. 291 |
The QueryParameter Element | p. 291 |
The DataSources Element | p. 291 |
The DataSource Element | p. 291 |
The Body Element | p. 292 |
The PageHeader Element | p. 292 |
The PageFooter Element | p. 292 |
The Table Element | p. 293 |
The TableColumns Element | p. 293 |
The TableColumn Element | p. 293 |
The Header Element | p. 293 |
The Footer Element | p. 293 |
The TableGroups Element | p. 294 |
The TableGroup Element | p. 294 |
The Details Element | p. 294 |
The TableRows Element | p. 294 |
The TableRow Element | p. 294 |
The TableCells Element | p. 294 |
The TableCell Element | p. 295 |
The Textbox Element | p. 295 |
The Image Element | p. 295 |
The Style Element | p. 295 |
Global Variables | p. 296 |
The Bottom Line | p. 296 |
Report Server Security | p. 299 |
Authentication | p. 299 |
Types of Authentication | p. 300 |
Configuring Report Server for SSL | p. 301 |
Changing Service Accounts and Passwords | p. 303 |
Authorization | p. 305 |
Securing Folders | p. 307 |
Securing Models | p. 308 |
Securing My Reports | p. 311 |
Preventing SQL Injection Attacks | p. 312 |
The Bottom Line | p. 313 |
Data Sources and Data Sets | p. 315 |
Defining Report Data Sources | p. 315 |
Creating a Shared Data Source | p. 317 |
Using Data Source Expressions | p. 321 |
Defining Report Data Sets | p. 321 |
SQL Server Relational Database Data Sets | p. 322 |
Analysis Services Data Sets | p. 323 |
SQL Server Integration Services Data Sets | p. 327 |
XML Data Sets | p. 328 |
Oracle Relational Database Data Sets | p. 329 |
SAP Relational Database and NetWeaver BI System Data Sets | p. 330 |
Hyperion Essbase Data Sets | p. 332 |
Report Model Data Sets | p. 332 |
The Bottom Line | p. 333 |
Performance Tuning | p. 335 |
Using the Performance Console | p. 335 |
Modifying Configuration Files | p. 343 |
ReportingServicesService | p. 343 |
RSReportDesigner | p. 343 |
RSWebApplication | p. 346 |
RSReportServer | p. 348 |
Tips and Techniques | p. 356 |
Setting a Measurement Baseline | p. 356 |
Data Archiving and Trend Tracking | p. 356 |
Manually Configuring Available Memory | p. 356 |
The Bottom Line | p. 357 |
p. 359 | |
SharePoint Integration | p. 391 |
Report Server Web Service Reference | p. 417 |
Index | p. 463 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.