Logo

The Relational Model for Database Management

Large book cover: The Relational Model for Database Management

The Relational Model for Database Management
by

Publisher: Addison-Wesley
ISBN/ASIN: 0201141922
ISBN-13: 9780201141924
Number of pages: 567

Description:
Written by the originator of the relational model, this book covers the practical aspects of the design of relational databases. The author defines twelve rules that database management systems need to follow in order to be described as truly relational and then gives the motivation behind these rules. This book is a perfect resource for students and professionals in the field.

Home page url

Download or read it online for free here:
Download link
(no longer freely available)

Similar books

Book cover: Data Modeling Techniques for Data WarehousingData Modeling Techniques for Data Warehousing
by - IBM Redbooks
It covers data modeling techniques for data warehousing, within the context of the overall data warehouse development process. The process of data warehouse modeling, including the steps required before and after the actual modeling, is discussed.
(22360 views)
Book cover: A Programmer's Guide to Data MiningA Programmer's Guide to Data Mining
by - GuideToDatamining.com
Before you is a tool for learning basic data mining techniques. If you are a programmer interested in learning a bit about data mining you might be interested in a beginner's hands-on guide as a first step. That's what this book provides.
(10655 views)
Book cover: Natural Language Interfaces to Databases: An IntroductionNatural Language Interfaces to Databases: An Introduction
by - arXiv
This paper is an introduction to natural language interfaces to databases (NLIDBs). Some advantages and disadvantages of NLIDBs are then discussed, comparing NLIDBs to formal query languages, form-based interfaces, and graphical interfaces.
(15370 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21148 views)