PDF (US Ltr)
- 35.1Mb
PDF (A4)
- 35.2Mb
Man Pages (TGZ)
- 256.4Kb
Man Pages (Zip)
- 361.3Kb
Info (Gzip)
- 3.4Mb
Info (Zip)
- 3.4Mb
Search Results
https://dev.mysql.com/doc/refman/5.7/en/alter-view.html
ALTER [ALGORITHM = {UNDEFINED | MERGE | TEMPTABLE}] [DEFINER = user] [SQL SECURITY { DEFINER | INVOKER }] VIEW view_name [(column_list)] AS select_statement [WITH [CASCADED | LOCAL] CHECK OPTION] This statement changes the definition of a view, ...
https://dev.mysql.com/doc/refman/5.7/en/apache.html
There are programs that let you authenticate your users from a MySQL database and also let you write your log files into a MySQL table.
https://dev.mysql.com/doc/refman/5.7/en/audit-log-logging-configuration.html
For best security, write the audit log to a directory accessible only to the MySQL server and to users with a legitimate reason to view the log. Encryption is based on a user-defined password (with the exception of the initial password, which the ...
https://dev.mysql.com/doc/refman/5.7/en/backup-strategy-example.html
Information about this recovery process is conveyed to the user through the MySQL error log. You should include such options as necessary to enable client programs to connect to the MySQL server. Assume that data is stored in the InnoDB storage ...
https://dev.mysql.com/doc/refman/5.7/en/calculating-days.html
The following example shows how you can use the bit group functions to calculate the number of days per month a user has visited a Web page. CREATE TABLE t1 (year YEAR, month INT UNSIGNED, day INT UNSIGNED); INSERT INTO t1 ...
https://dev.mysql.com/doc/refman/5.7/en/can-not-connect-to-server.html
Locate the following key in the registry: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters On the Edit menu, click Add Value, and then add the following registry value: Value Name: MaxUserPort Data Type: REG_DWORD Value: 65534 ... A MySQL client on Unix can connect to the mysqld server in two different ways: By using a Unix socket file to connect through a file in the file system (default /tmp/mysql.sock), or by using TCP/IP, which connects through a port ...
https://dev.mysql.com/doc/refman/5.7/en/charset-connection.html
Thus, users can configure the locale in their environment for use by MySQL clients. C applications can use character set autodetection based on the OS setting by invoking mysql_options() as follows before connecting to the server: ... A ...
https://dev.mysql.com/doc/refman/5.7/en/checking-gpg-signature.html
Another method of verifying the integrity and authenticity of a package is to use cryptographic signatures. This is more reliable than using MD5 checksums, but requires more work. GnuPG is an Open Source alternative to the well-known Pretty Good ...
https://dev.mysql.com/doc/refman/5.7/en/checking-rpm-signature.html
Rather, RPM maintains a separate keyring because it is a system-wide application and a user's GPG public keyring is a user-specific file. RPM 4.1 no longer uses your personal GPG keyring (or GPG itself). To import the MySQL public key into the RPM ...
https://dev.mysql.com/doc/refman/5.7/en/create-table-generated-columns.html
A function is deterministic if, given the same data in tables, multiple invocations produce the same result, independently of the connected user. Examples of functions that are nondeterministic and fail this definition: CONNECTION_ID(), ...Values of ...