Flylib.com
index_K
Previous page
Table of content
Next page
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]
KEY 2nd
key (see candidate key; see also foreign key; primary key; surrogate)
values are tuples
Knuth, Donald E.
Previous page
Table of content
Next page
Database in Depth: Relational Theory for Practitioners
ISBN: 0596100124
EAN: 2147483647
Year: 2006
Pages: 127
Authors:
C.J. Date
BUY ON AMAZON
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Introduction
Defining Constrained Value Types
Overloading Arithmetic and Assignment Operators for Intuitive Class Behavior
Formatting Floating-Point Output
Computing the Number of Elements in a Container
C & Data Structures (Charles River Media Computer Engineering)
Data Types
Memory Allocation
Structures
Linked Lists
Problems in Linked Lists
101 Microsoft Visual Basic .NET Applications
Data Access
Building Windows Forms User Interfaces
Working with Console Applications
Building Enterprise Services Applications
COM Interop/PInvoke
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
An Introduction to the Lotus Domino Tool Suite
LotusScript Classes
Working with Conditional Branching
Display All Documents by Form Name
Troubleshooting
PMP Practice Questions Exam Cram 2
Answers and Explanations
Exam Prep Questions
Answers and Explanations
Exam Prep Questions
Answers and Explanations
MPLS Configuration on Cisco IOS Software
MPLS Overview
Implementing BGP in MPLS VPNs
Case Study-Hub and Spoke MPLS VPN Network Using BGP PE-CE Routing for Sites Using Unique AS Numbers
Introduction to Layer 2 VPNs
Case Study 3: Implementing Layer 2 VPNs over Inter-AS Topologies Using Layer 2 VPN Pseudo-Wire Switching
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies