Cover image for DB2 UDB Exploitation of the Windows Environment.
DB2 UDB Exploitation of the Windows Environment.
Title:
DB2 UDB Exploitation of the Windows Environment.
Author:
Redbooks, IBM.
Personal Author:
Physical Description:
1 online resource (570 pages)
Contents:
Front cover -- Contents -- Figures -- Tables -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Introduction -- 1.1 DB2 UDB overview -- 1.1.1 DB2 family -- 1.1.2 DB2 UDB for Windows, UNIX, and Linux -- 1.2 DB2 UDB products on Windows -- 1.2.1 Product descriptions -- 1.2.2 Try and buy product availability -- 1.3 Planning considerations -- 1.3.1 Product selection guidelines -- 1.3.2 Sample scenarios -- 1.4 DB2 UDB Version 8 highlights -- 1.5 DB2 UDB integration with Microsoft Windows -- 1.5.1 Built for the Windows environment -- Chapter 2. Installation and deployment -- 2.1 Installation preparation and considerations -- 2.1.1 Installation overview for DB2 servers on Windows -- 2.1.2 Installation requirements -- 2.1.3 Authorization considerations -- 2.1.4 FixPak considerations -- 2.1.5 Migration considerations -- 2.2 Installation wizard (single installation) -- 2.2.1 Server installation -- 2.2.2 Client installation -- 2.3 Installation profile -- 2.3.1 Server installation -- 2.3.2 Client installation -- 2.4 Enterprise deployment with Microsoft SMS -- 2.4.1 Creating DB2 UDB packages -- 2.5 Active Directory Services -- 2.5.1 Active Directory Overview -- 2.5.2 Extending the Active Directory -- 2.5.3 Installing the MMC Snap-In Extension -- 2.5.4 Enabling DB2 Active Directory support -- 2.5.5 Managing the Active Directory -- Chapter 3. Post-installation tasks -- 3.1 Introduction -- 3.2 Using the Control Center -- 3.3 Database creation -- 3.4 Configuration advisor -- 3.5 Populating your database -- 3.5.1 Table creation -- 3.5.2 Loading data -- 3.5.3 Moving data -- 3.6 Design Advisor Wizard -- 3.6.1 Using the Design Advisor Wizard -- Chapter 4. Security -- 4.1 Understanding Windows security -- 4.1.1 Basic security concepts -- 4.1.2 Windows 2000 domains.

4.2 System level security -- 4.2.1 DB2 service accounts -- 4.2.2 DB2 user authentication -- 4.2.3 DB2 group enumeration -- 4.3 Instance level security -- 4.3.1 Default instance security -- 4.3.2 DAS Administrator Authority (DASADM) -- 4.3.3 DB2 System Administrators Authority (SYSADM) -- 4.3.4 DB2 System Control Authority (SYSCTRL) -- 4.3.5 DB2 System Maintenance Authority (SYSMAINT) -- 4.3.6 DB2 directory security -- 4.4 Database level security -- 4.4.1 Database authorities -- 4.4.2 Database privileges -- 4.4.3 Data encryption -- 4.4.4 Auditing database transactions -- Chapter 5. Performance -- 5.1 Performance tuning overview -- 5.1.1 Measuring system performance -- 5.1.2 Determining when system tuning will be cost-effective -- 5.1.3 Causes of performance problems -- 5.1.4 Deciding when to tune the system -- 5.1.5 Planning performance tuning -- 5.2 Primary Windows performance factors -- 5.2.1 System hardware -- 5.2.2 Operating system software -- 5.3 Primary DB2 performance factors -- 5.3.1 Configuration parameter introduction -- 5.3.2 Memory -- 5.3.3 Processor -- 5.3.4 Storage -- 5.3.5 Network -- 5.3.6 Other performance factors -- 5.4 System optimization -- 5.4.1 Windows system optimization -- 5.4.2 DB2 system optimization -- Chapter 6. Monitoring and management -- 6.1 General system monitoring considerations -- 6.1.1 Introduction -- 6.1.2 Things that you should consider when monitoring -- 6.1.3 Monitor types -- 6.1.4 Obtaining the data from the monitors or monitor interfaces -- 6.1.5 Information generation -- 6.2 Common resources to monitor -- 6.2.1 Memory -- 6.2.2 Disk -- 6.2.3 Network -- 6.2.4 Security -- 6.3 Windows system monitoring and tools -- 6.3.1 Task Manager -- 6.3.2 Performance Monitor and alert -- 6.3.3 Event viewer -- 6.4 DB2 monitoring capability -- 6.4.1 Log files -- 6.4.2 Health Center and Memory Visualizer.

6.4.3 DB2 Event Monitor -- 6.4.4 DB2 Governor -- Chapter 7. High availability -- 7.1 Database features for high availability -- 7.1.1 Buffer pool management -- 7.1.2 Tablespace management -- 7.1.3 Configuration parameters -- 7.1.4 Loading data -- 7.1.5 Reorganizing data -- 7.1.6 Database recovery -- 7.1.7 Application processing -- 7.2 Monitoring instances for high availability -- 7.2.1 Services Recovery -- 7.3 Standby servers for high availability -- 7.3.1 Online Split Mirror Images -- 7.4 Clustered servers for high availability -- 7.4.1 Overview of Microsoft Cluster Service -- 7.4.2 Before installing Microsoft Cluster Service -- 7.4.3 Installing Microsoft Cluster Service -- 7.4.4 After installing Microsoft Cluster Service -- 7.4.5 Before enabling DB2 MSCS support -- 7.4.6 Enabling DB2 MSCS support -- 7.4.7 After enabling DB2 MSCS support -- 7.5 Windows Datacenter Program for high availability -- Chapter 8. Application development -- 8.1 DB2 developer tools -- 8.1.1 Development Center -- 8.1.2 Project Deployment Tool -- 8.1.3 Command Center -- 8.1.4 SQL Assist -- 8.1.5 Visual Explain -- 8.1.6 Command-line Explain tools -- 8.2 Language support -- 8.2.1 Visual Basic -- 8.2.2 Visual C++ -- 8.2.3 Java -- 8.2.4 COBOL -- 8.3 Migration Toolkit (MTK) -- 8.4 Application development tips -- 8.4.1 Tips to write better SQL statements -- 8.4.2 Minimizing data movement between applications and database -- 8.4.3 Considerations for embedded SQL programs -- 8.4.4 Considerations for Call Level Interface and ODBC -- Chapter 9. Windows scripting -- 9.1 Introduction -- 9.1.1 Designing DBA scripts -- 9.1.2 Choosing which DBA tasks to include in scripts -- 9.2 Windows shell scripting (Wshell) -- 9.2.1 DB2 CLP scripting -- 9.3 Windows Script Host (WSH) -- 9.3.1 VBScript scripting -- 9.3.2 JScript scripting -- 9.3.3 Perl scripting -- 9.3.4 Object REXX.

9.4 Scripting with DB2's WMI providers -- 9.4.1 Windows Management Instrumentation (WMI) -- 9.5 Scripting with ADSI -- 9.6 Scheduling and managing scripts -- Appendix A. Advanced scripting -- Leveraging COM -- Active Data Object (ADO) -- Active Server Pages (ASP) -- Sample code -- List data dictionary (tables and columns definitions) -- Listing all DB2 objects -- List all tables, owners, schema and table creation date -- List all tables and table owners -- List table and tablespace size definitions -- List all userids in DB2 database -- Start the DB2 database service on a server -- Stop DB2 database service on a server -- Reporting tool through an interactive Web server form -- Running SQL from a batch file -- Running any SQL from a command prompt -- Running a report (static query) -- User account managment -- Appendix B. Sample REXX programs -- dbrxbackup.rexx -- dbrxbackup.wsf -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: