1368
Index
partitions (cont inued)
creating, 1122–1123
indexes, 1128
performance, 1117
queries, 1123
switching, 1125–1127
vertical, 1110
views, 1110–1116
local, 1111–1116
UNION ALL, 1114
UPDATE, 1115–1116
WHERE, 1114
windowing data, 258
PARTITION BY, 258
pass-through distributed queries,
380–381
password, 575
passwords
backup, 561
encryption, 855
expired, 79
SQL authentication, 837
SSAS, 1227
patches, 68
PATH
EXPLICIT, 361–363
multiple assignment variables,
399
PowerShell, 769
Path Editor, 1176
PATINDEX(), 198
PBM. See Policy-Based Management
peer-to-peer replication, 731,
740–741
Percentage Sampling, SSIS Data
Flow, 1182
PerfMon. See Performance Monitor
performance
backup compression, 669
bulk-loaded recovery model, 553
data compression, 1098
database, 19–20
system, 17
DBCC CHECKDB, 592
iterative code, 26
normalization, 147
operational database, 21
partitioned tables, 1117
queries, 383–386
Resource Governor, 1138–1139
Smart Database Design, 28
SQL Profi ler, 922
stored procedures, 431, 432
transactions, 1093–1095
UDFs, 464–465
views, 283
Performance Analysis for Logs
(PAL), 914
Performance Monitor (PerfMon), 10,
861–869, 1138–1139
Counter Logs, 925–926
Data Collector Sets, 913–914
PowerShell, 914–917
SQL Profi le, 919, 925–926
System Monitor, 910–913
permissions
chains, 841–842
item-level, 1273–1274
objects, 844–847
with code, 846–847
row-level security, 863–868
checking, 870–875
securables, 843–844
SSRS, 1273–1274
PersonLogin, 872, 873
Security table, 874
perspectives
cubes, 1217–1218
PowerPivot, 1315–1317
pessimistic locks, 1088
Physical Disk, 911
physical fl ow query statement,
116–117
physical layer, 146
physical schema
indexes, 25
Smart Database Design, 24
physical security, 20
/PID, 59
PK. See primary key
Plan Cache
DMVs, 1043–1044
execution plans, 1043–1044
memory, 1044
Plato, 3
point-in-time restore, 82
poison message, Service Broker, 656
POISON_MESSAGE_HANDLING(),
poison message, 656
Policy Management, Object
Explorer, 92
Policy-Based Management (PBM), 4,
531–545
conditions, 535–538
facets, 533–535
Object Explorer, 92, 538
policies, 538–545
server groups, 88
ports, 73
fi rewalls, 34
Power View
ad hoc reports, 1327
BISM, 1235, 1329
connection fi le, 1332–1334
bubble charts, 1340–1342
cards, 1342–1344
charts, 1335–1338
client-side requirements, 1328
connection fi le library, 1330
horizontal multiples, 1339–1340
PowerPivot Gallery, 1328–1329
Report Data Source fi le, 1330–
1332
reports, 1327–1346
deploying, 1344–1345
scatter charts, 1340–1342
server-side requirements,
1327–1328
slicers, 1335–1338
SSRS, 1235, 1327
tables, 1334
vertical multiples, 1339–1340
views, 1338
PowerPivot
BISM
creating model, 1303–1307
extending model, 1307–1317
Gallery, 1328–1329
hierarchies, 1311–1315
KPI, 1308–1311
perspectives, 1315–1317
SharePoint
automatic data refresh,
1318–1319
BISM, 1301
SSAS, 1223
PowerShell
arrays, 772
authentication, 845
batches, 769
cmdlets, 770–777
comments, 773
comparison operators, 773
control fl ow commands, 774
CSV, 917
directories, 784
extensions, 781–785
foreach, 772
language features, 770–777
modules
cmdlets, 784–785
import, 782
lists, 782
scripts, 778
.NET Framework, 769
bindex July 23, 2012 2:44 PM V1
bindex.indd 1368bindex.indd 1368 7/31/2012 10:39:58 AM7/31/2012 10:39:58 AM
http://www.it-ebooks.info