[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
scripts, downloading
SCSI versus IDE disks
secondary indexes
security
accounts
columns_priv table
data encryption
database-specific passwords
db table
encryption application-level encryption
encrypted filesystems
hashing passwords
general guidelines
GRANT command
grant tables
2nd
fields used for matching records in
host table
LOAD DATA INFILE... command
logins
MySQL in chroot environments
networks
automatic host blocking
connection encryption and tunneling
firewalls
localhost and MySQL
localhost-only connections
MySQL in DMZs
SSL
TCP wrappers
VPNs
operating systems
passwords
privileges
average employee accounts
database administrator accounts
logging, write-only access
operations and monitoring personnel
privilege checks
revocation, limitations
system administrator account
problems and limitations
host and database matching
privileges and dropped databases
revocation of specific privileges
REVOKE command
SHOW PROCESSLIST command
source code modification
tables_priv table
user table
host matching
seek time
select privilege
serializable isolation level
server ID
server IDs, slaves
server variables displaying
SESSION and GLOBAL syntax
server-wide privileges
servers hardware, buying
health checks
masters and slaves
[See replication] performance limiting factors
CPU cache
disks
duplex mismatch
I/O channels
master and slaves replication setup
memory
memory speed
networks
redundant power supplies
replication
[See replication] tuning
bottlenecks identifying
caching
CPU bottlenecks, solving
I/O bottlenecks, solving
kernel bottlenecks, solving
load-balancing
memory needs, calculating
queries using the wrong index
temporary tables
versus query optimization
SESSION syntax
SET TRANSACTION ISOLATION LEVEL command
SHA1( )
shared locks
SHOW commands
SHOW CREATE TABLE
SHOW INDEXES FROM
SHOW INNODB STATUS
2nd
SHOW MASTER LOGS
SHOW MASTER STATUS
SHOW PROCESSLIST
commands in output
security concerns
SHOW SLAVE STATUS
SHOW STATUS
2nd
command counters
data access patterns
file descriptors
handler counters
MyISAM key buffer statistics counters
query cache statistics counters
SELECT queries, tracking
sorts
status counters
table locking
temporary files and tables counters
thread and connection statistics counters
SHOW TABLE STATUS
SHOW VARIABLES
shutdown privilege
slave with two masters replication configuration
slaves connection to wrong master
manual data changes to
slow query log
smack file
soft updates
software RAID
spatial indexes
SQL_BIG_RESULT hint
SQL_BUFFER_RESULT hint
SQL_CACHE hint
2nd
SQL_NO_CACHE hint
SSH tunneling
SSL (Secure Sockets Layer)
status files
2nd
stock quotes, use of storage engines for
storage engines
2nd
Berkeley DB (BDB) storage engine
features
Heap (in-memory) tables
InnoDB storage engine
locking and concurrency
referential integrity
storage
mixing in transactions
MyISAM storage engine
compressed tables
Merge tables
RAID tables
storage
NDB
selecting
backups, considerations
special features, based on
transactions and concurrency, considerations
table conversions
table types, determining
transaction safe MySQL engines
use, examples
bulletin boards
catalogs
CD-ROM applications
logging
order processing
stock quotes
threaded discussion forums
stress testing versus performance testing
striping
super privilege
super-smack
[See MySQL super-smack] support-files directory
swap
systat
system administrator accounts, database privileges for
system versions
|