Search

Download this Manual
PDF (US Ltr) - 35.1Mb
PDF (A4) - 35.2Mb
Man Pages (TGZ) - 256.4Kb
Man Pages (Zip) - 361.3Kb
Info (Gzip) - 3.4Mb
Info (Zip) - 3.4Mb


Displaying 501 to 507 of 507 total results
https://dev.mysql.com/doc/refman/5.7/en/using-innodb-tables.html
You can also access InnoDB table properties by querying the InnoDB Information Schema system tables: mysql> SELECT * FROM INFORMATION_SCHEMA.INNODB_SYS_TABLES WHERE NAME='test/t1' \G *************************** 1. row *************************** ...
https://dev.mysql.com/doc/refman/5.7/en/validate-password-installation.html
To verify plugin installation, examine the Information Schema PLUGINS table or use the SHOW PLUGINS statement (see Section 5.5.2, “Obtaining Server Plugin Information”). For example: mysql> SELECT PLUGIN_NAME, PLUGIN_STATUS FROM ... This section ...
https://dev.mysql.com/doc/refman/5.7/en/version-tokens-usage.html
Locking service locks can be monitored using the Performance Schema, so this is also true for Version Tokens locks. Before using Version Tokens, install it according to the instructions provided at Section 5.5.5.2, “Installing or Uninstalling ...
https://dev.mysql.com/doc/refman/5.7/en/view-updatability.html
The IS_UPDATABLE column in the Information Schema VIEWS table displays the status of this flag. Some views are updatable and references to them can be used to specify tables to be updated in data change statements. That is, you can use them in ...
https://dev.mysql.com/doc/refman/5.7/en/windows-pluggable-authentication.html
To verify plugin installation, examine the Information Schema PLUGINS table or use the SHOW PLUGINS statement (see Section 5.5.2, “Obtaining Server Plugin Information”). For example: mysql> SELECT PLUGIN_NAME, PLUGIN_STATUS FROM ... Note Windows ...
https://dev.mysql.com/doc/refman/5.7/en/xa-restrictions.html
To positively identify XA transactions that are still in the PREPARED state and need to be recovered, use the XA RECOVER statement rather than the Performance Schema transaction tables. XA transaction support is limited to the InnoDB storage engine. For “external XA,” a MySQL server acts as a Resource Manager and client programs act as Transaction ...
https://dev.mysql.com/doc/refman/5.7/en/xml-functions.html
Just as SQL injection attacks can be used to obtain information about database schemas, so can XPath injection be used to traverse XML files to uncover their structure, as discussed in Amit Klein's paper Blind XPath Injection (PDF file, 46KB).