Related Topics: Microsoft Cloud, Microservices Expo, Silverlight

Microsoft Cloud: Book Review

Book Review: Microsoft SQL Server 2012 Unleashed

Another Unleashed behemoth!!!

Another Unleashed behemoth!!! It is a whopping 1683 of printed pages and 2765 pages when you include the additional chapters available in the eBook you get with the printed book. If this book doesn't contain the information you need about SQL Server 2012, then you probably won't find it anywhere.

Just like I am not a server administrator, I am not a Database Administrator (DBA). I don't want to be a DBA, nothing against DBAs, but I just think it is a full time job. It is not possible for me to keep up with my .NET, iOS, Enterprise Architecture, and Software Architecture skills and also be an effective DBA.

Of course I have to be familiar enough with them to architect scalable, secure, high performing software, so I chose this book as my learning resource. It is a great resource. I have not gone too it and come away disappointed yet.

What does make this nice is there is a lot of developer content included with the book in addition to the DBA topics.

The book is broken down into 10 parts. Below is the entire Table of Contents-

Part I: Welcome to Microsoft SQL Server
Chapter 1. SQL Server 2012 Overview
Chapter 2. What’s New in SQL Server 2012
Chapter 3. Examples of SQL Server Implementations

Part II: SQL Server Tools and Utilities
Chapter 4. SQL Server Management Studio
Chapter 5. SQL Server Command-Line Utilities
Chapter 6. SQL Server Profiler

Part III: SQL Server Administration
Chapter 7. SQL Server System and Database Administration
Chapter 8. Installing SQL Server 2012
Chapter 9. Upgrading to SQL Server 2012
Chapter 10. Client Installation and Configuration
Chapter 11. Database Backup and Restore
Chapter 12. Database Mail
Chapter 13. SQL Server Agent
Chapter 14. Administering SQL Server 2012 with PowerShell
Chapter 15. SQL Server Policy-Based Management

Part IV: SQL Server Security Administration
Chapter 16. Security and Compliance
Chapter 17. Security and User Administration
Chapter 18. Data Encryption

Part V: Database Administration
Chapter 19. Creating and Managing Databases
Chapter 20. Creating and Managing Tables
Chapter 21. Creating and Managing Indexes
Chapter 22. Implementing Data Integrity
Chapter 23. Creating and Managing Views
Chapter 24. Creating and Managing Stored Procedures
Chapter 25. Creating and Managing User-Defined Functions
Chapter 26. Creating and Managing Triggers
Chapter 27. Transaction Management and the Transaction Log
Chapter 28. Database Snapshots
Chapter 29. Database Maintenance

Part VI: SQL Server Performance and Optimization
Chapter 30. Data Structures, Indexes, and Performance
Chapter 31. Understanding Query Optimization
Chapter 32. Query Analysis
Chapter 33. Locking and Performance
Chapter 34. Database Design and Performance
Chapter 35. Monitoring SQL Server Performance
Chapter 36. SQL Server Database Engine Tuning Advisor
Chapter 37. Managing Workloads with the Resource Governor
Chapter 38. A Performance and Tuning Methodology

Part VII: SQL Server High Availability
Chapter 39. SQL Server High Availability Fundamentals
Chapter 40. Data Replication
Chapter 41. Database Mirroring
Chapter 42. SQL Server Failover Clustering
Chapter 43. SQL Server AlwaysOn and Availability Groups

Part VIII: SQL Server Application Development
Chapter 44. What’s New for Transact-SQL in SQL Server 2012
Chapter 45. Transact-SQL Programming Guidelines, Tips, and Tricks
Chapter 46. Advanced Stored Procedure Programming and Optimization
Chapter 47. SQL Server and the .NET Framework
Chapter 48. SQLCLR: Developing SQL Server Objects in .NET
Chapter 49. Using XML in SQL Server 2012
Chapter 50. SQL Server Service Broker
Chapter 51. SQL Server Full-Text Search
Chapter 52. Working with SQL Azure

Part IX: SQL Server Business Intelligence Features
Chapter 53. SQL Server 2012 Analysis Services
Chapter 54. SQL Server Integration Services
Chapter 55. SQL Server 2012 Reporting Services
Chapter 56. Master Data Services and Data Quality Services
Chapter 57. Parallel Data Warehouse

Part X: Bonus Chapters
Chapter 58. Managing Linked Servers
Chapter 59. SQL Server Disaster Recovery Planning
Chapter 60. SQL Server Configuration Options

Almost every chapter begins with a section that covers what is new in SQL Server 2012. There are a ton of diagrams that are really helpful with learning the topics, and a ton of great tables that help to summarize topics.

The thing I like most about this book is the quantity of information about profiling, tracing, monitoring, and performance. There is a whole chapter on locking!!! The authors writing style makes it an easy to read book, or at least as easy as server reading can get.

My only gripe about the book is that over 1000 of the pages are only available in eBook format. It is time to break this book down into 2, or maybe 3 printed volumes. I use eBooks for searching for topics, but do not read them. After 8 - 10 hours a day staring at a computer I don't want to read a book on one. This will be my last edition of this awesome book if I can't get it all in print when the next edition is released.

The code downloads are organized by chapter and usable are very usable. Each chapter has a folder.

If you are in anyway involved with SQL Server 2012, you owe it to yourself to get this book. It will not leave my side!!!!

I highly recommend this book for DBA's, developers, and architects.

Microsoft SQL Server 2012 Unleashed

Microsoft SQL Server 2012 Unleashed

More Stories By Tad Anderson

Tad Anderson has been doing Software Architecture for 18 years and Enterprise Architecture for the past few.

Latest Stories
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall responsibility. In his session at 19th Cloud Expo, Simon Bain, CEO of SearchYourCloud, will address security compliance issues associated with cloud applications and how document-level encryption is critical for sup...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today that Impiger Technologies will exhibit in Booth #109 at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Impiger Technologies is a world-class, enterprise software product engineering company specializing in Mobile Application Development, Cloud Applications, Microsoft Technology Solutions, Web Technology and Telecom Services. Impiger Technologies helps enterprises improve busi...
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
SYS-CON Events announced today that Enzu will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their online busine...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will advance interoperability between connected devices from both groups, enabling the full operating potential of IoT and representing a significant step towards a connected ecosystem.
Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Governments around the world are adopting Safe Harbor privacy provisions to protect customer data from leaving sovereign territories. Increasingly, global companies are required to create new instances of their server clusters in multiple countries to keep abreast of these new Safe Harbor laws. Is it worth it? In his session at 19th Cloud Expo, Adam Rogers, Managing Director of Anexia, Inc., will discuss how to keep your data legal and still stay in business.