Flylib.com
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
ISBN: 1558609199
EAN: 2147483647
Year: 2002
Pages: 150
Authors:
Terry Halpin
,
Ken Evans
,
Pat Hallock
,
Bill Maclean
BUY ON AMAZON
Overview of Database Modeling and the Database Modeling Tool
Introduction
Database Modeling
Getting Started
The Conceptual Modeling Solution (ORM)
Object Types, Predicates, and Basic Constraints
ORM Constraints
Configuring, Manipulating, and Reusing ORM Models
Mapping ORM Models to Logical Database Models
Reverse Engineering and Importing to ORM
Conceptual Model Reports
The Logical Modeling Solution (ER and Relational)
Creating a Basic Logical Database Model
Generating a Physical Database Schema
Editing Logical Models”Intermediate Aspects
Editing Logical Models”Advanced Aspects
Reverse Engineering Physical Schemas to Logical Models
Logical Database Model Reports
Managing Database Projects
Change Propagation and Round Trip Engineering
Other Features and Best Practices
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
ISBN: 1558609199
EAN: 2147483647
Year: 2002
Pages: 150
Authors:
Terry Halpin
,
Ken Evans
,
Pat Hallock
,
Bill Maclean
BUY ON AMAZON
VBScript Programmers Reference
The Scripting Runtime Objects
Server-Side Web Scripting
Appendix B Variable Naming Convention
Appendix D Visual Basic Constants Supported in VBScript
Appendix J VBA Features not in VBScript
Visual C# 2005 How to Program (2nd Edition)
Exercises
Introduction
Constructors in Derived Classes
Terminology
E.5. Using Unicode
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Navigating the Domino Designer Workspace
Working with Buttons
Working with @DBLookup
Display an Icon in a View
Importing Data
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
802.11 Wireless Networks: The Definitive Guide, Second Edition
Robust Security Network (RSN) Operations
Scanning
RF Propagation with 802.11
Implementation-Specific Behavior
11 on the Macintosh
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Oracle and PL/SQL
Accessing the File System
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies