Book Image

SQL Query Design Patterns and Best Practices

By : Steve Hughes, Dennis Neer, Dr. Ram Babu Singh, Shabbir H. Mala, Leslie Andrews, Chi Zhang
5 (1)
Book Image

SQL Query Design Patterns and Best Practices

5 (1)
By: Steve Hughes, Dennis Neer, Dr. Ram Babu Singh, Shabbir H. Mala, Leslie Andrews, Chi Zhang

Overview of this book

SQL has been the de facto standard when interacting with databases for decades and shows no signs of going away. Through the years, report developers or data wranglers have had to learn SQL on the fly to meet the business needs, so if you are someone who needs to write queries, SQL Query Design and Pattern Best Practices is for you. This book will guide you through making efficient SQL queries by reducing set sizes for effective results. You’ll learn how to format your results to make them easier to consume at their destination. From there, the book will take you through solving complex business problems using more advanced techniques, such as common table expressions and window functions, and advance to uncovering issues resulting from security in the underlying dataset. Armed with this knowledge, you’ll have a foundation for building queries and be ready to shift focus to using tools, such as query plans and indexes, to optimize those queries. The book will go over the modern data estate, which includes data lakes and JSON data, and wrap up with a brief on how to use Jupyter notebooks in your SQL journey. By the end of this SQL book, you’ll be able to make efficient SQL queries that will improve your report writing and the overall SQL experience.
Table of Contents (21 chapters)
Part 1: Refining Your Queries to Get the Results You Need
Part 2: Solving Complex Business and Data Problems in Your Queries
Part 3: Optimizing Your Queries to Improve Performance
Part 4: Working with Your Data on the Modern Data Platform


In this chapter, we discussed the purpose of SQL Server security, what it is, how it can impact your result sets, and how you can verify whether you have the access you need to create your result sets.

We started by discussing how two people can run the same query and get different results and we showed an example of this happening. We then followed that up with a discussion on what SQL Server security is and the primary types of security that impact running queries. We then concluded the chapter by discussing the steps that you, as a user, can take to review your security settings before talking to the DBA to have changes made to security to get the correct results. The skills that you have developed include how to verify your SQL Server security settings, the impact of the settings on your queries, and what steps you would take to change your security settings.

With this knowledge, you are now ready to move on to the next chapter in your SQL journey. The next chapter...