This document summarizes different concurrency control techniques used in database systems, including lock-based protocols, timestamp-based protocols, and validation-based protocols. It discusses lock-based protocols in detail, covering how locks work, the lock compatibility matrix, deadlocks, starvation, and the two-phase locking protocol. It also discusses automatic acquisition of locks to simplify concurrency control.