
| laptop computers: and transactions | Replication and concurrency |
| leaf pages | Improving index performance |
| least distance problems | Least distance problem |
| LEAVE statement: syntax | Control statements |
| left outer joins: about | Outer joins |
| less than or equal to: comparison operator | Using comparison operators in the WHERE clause |
| less than: comparison operator | Using comparison operators in the WHERE clause |
| less than: range specification | Using ranges (between and not between) in the WHERE clause |
| levels of isolation: about | Isolation levels and consistency |
| levels of isolation: changing | Setting the isolation level |
| levels of isolation: changing within a transaction | Changing isolation levels within a transaction |
| levels of isolation: setting default | Setting the isolation level |
| LIKE conditions: LIKE optimizations | LIKE optimizations |
| LIKE operator: wildcards | Matching character strings in the WHERE clause |
| LIKE optimizations | LIKE optimizations |
| limiting rows: FIRST clause | Explicitly limiting the number of rows returned by a query |
| limiting rows: TOP clause | Explicitly limiting the number of rows returned by a query |
| limiting the memory used by the cache | Limiting the memory used by the cache |
| line breaks: SQL | SQL queries |
| listing remote server capabilities | Listing remote server capabilities |
| listing the columns on a remote table | Listing the columns on a remote table |
| listing the remote tables on a server | Listing the remote tables on a server |
| literal values: NULL | Properties of NULL |
| LOAD DATABASE statement: unsupported | Servers and databases |
| LOAD TABLE statement: about | Import tools |
| LOAD TABLE statement: using | Importing a table |
| LOAD TRANSACTION statement: unsupported | Servers and databases |
| loading: commands in Interactive SQL | Saving, loading, and running command files |
| local temporary tables | Working with temporary tables |
| local variables: debugger | Working with variables |
| locked tables: item in access plans | Reading access plans |
| locking during deletes | Locking during deletes |
| locking during inserts | Locking during inserts |
| locking during queries | Locking during queries |
| locking during updates | Locking during updates |
| locking: reducing through indexes | Other uses for indexes |
| locks: about | How locking works |
| locks: anti-insert | Types of locks Locking during deletes |
| locks: blocking | Transaction blocking Non-repeatable read tutorial |
| locks: choosing isolation levels tutorial | Non-repeatable read tutorial |
| locks: conflict handling | Transaction blocking Non-repeatable read tutorial |
| locks: conflicting types | Types of locks |
| locks: deadlock | Deadlock |
| locks: early release of | Typical transactions at various isolation levels Two-phase locking Early release of read locks |
| locks: exclusive | Types of locks |
| locks: implementation at level 0 | Locking during queries |
| locks: implementation at level 1 | Locking during queries |
| locks: implementation at level 2 | Locking during queries |
| locks: implementation at level 3 | Locking during queries |
| locks: inconsistencies versus typical isolation levels | Typical types of inconsistency Two-phase locking |
| locks: insert | Types of locks |
| locks: isolation levels | Isolation levels and consistency |
| locks: nonexclusive | Types of locks |
| locks: objects that can be locked | Objects that can be locked |
| locks: orphans and referential integrity | Locking during inserts |
| locks: phantom rows versus isolation levels | Phantom row tutorial Practical locking implications tutorial |
| locks: procedure for deletes | Locking during deletes |
| locks: procedure for inserts | Locking during inserts |
| locks: procedure for updates | Locking during updates |
| locks: query execution algorithms | Lock |
| locks: read | Types of locks Locking during deletes |
| locks: reducing the impact through indexes | Reducing the impact of locking |
| locks: shared versus exclusive | Types of locks |
| locks: transaction blocking and deadlock | Transaction blocking and deadlock |
| locks: two-phase locking | Two-phase locking |
| locks: types of | Types of locks |
| locks: typical transactions versus isolation levels | Typical transactions at various isolation levels |
| locks: uses | Types of locks |
| locks: viewing in Sybase Central | How locking works |
| locks: write | Types of locks |
| logging SQL statements | Logging SQL statements as you work with a database |
| logical operators: connecting conditions | Connecting conditions with logical operators |
| logical operators: HAVING clauses | The HAVING clause: selecting groups of data |
| logs: rollback log | Savepoints within transactions |
| long plans: about | Text plans |
| long plans: Interactive SQL | Accessing the plan |
| long plans: SQL functions | Accessing the plan |
| LONG VARCHAR data type: storing XML | Storing XML documents in relational databases |
| LOOP statement: in procedures | Using cursors on SELECT statements in procedures |
| LOOP statement: syntax | Control statements |
| losing referential integrity | Losing referential integrity |
| LOTUS file format: format for importing and exporting | Data formats |
| Lotus Notes: passwords | Lotus Notes SQL 2.0 |
| Lotus Notes: remote data access | Lotus Notes SQL 2.0 |