This document discusses various concurrency control techniques for managing concurrent access to shared data in databases and transaction systems. It covers lock-based protocols that use locking to control access, timestamp-based protocols that use timestamps to order transactions, and techniques for handling deadlocks. The key lock-based protocols covered are two-phase locking and lock conversions. Timestamp-based protocols discussed include timestamp ordering and Thomas' write rule. Deadlock handling techniques include prevention, detection, and recovery.