This document discusses concurrency control techniques for database systems. It covers lock-based protocols using locking to control concurrent access. Key aspects covered include lock compatibility, two-phase locking protocol, deadlocks, and lock conversions. It also discusses timestamp-based protocols that use timestamps to determine serialization order and validation-based protocols. Multiple granularity locking and intention lock modes are explained.