Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Basic Concepts in JDO
Table 1-1: JDO Managed Life Cycle States
Table 1-2: Attributes of the JDO Management States
Chapter 2: Queries
Table 2-1: JDOQL Operators
Table 2-2: JDO Query Methods
Table 2-3: The State of Two Foo and Four Bar Objects
Table 2-4: The Cached State of Red and Blue Trucks Prior to Query Execution
Chapter 5: Enhanced Classes and Managed Fields
Table 5-1: Attributes of the Metadata
class
Tag
Table 5-2: Attributes of the Metadata
field
Tag
Table 5-3: Attributes of the Metadata
collection
Tag
Table 5-4: Attributes of the Metadata
map
Tag
Table 5-5: Attributes of the Metadata
extension
Tag
Chapter 6: Factories that Produce Persistence Managers
Table 6-1: Identifying Strings for the Supported Implementation Options
Table 6-2: Simple Connection Properties
Table 6-3: Connection Factory Properties
Chapter 7: Helpers, Callbacks, and Exceptions
Table 7-1: Five Methods That Detect an Object's JDO Management State
Previous page
Table of content
Next page
Using and Understanding Java Data Objects
ISBN: 1590590430
EAN: 2147483647
Year: 2005
Pages: 156
Authors:
David Ezzio
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Managing Project Quality
Twelve Keys to Better Project Leadership
Proven Techniques for Leading Cross-Functional Projects
Stuff You Need to Know About Contracts
Ending a Project
Software Configuration Management
Introduction to Software Configuration Management
Configuration Management and Software Engineering Standards Reference
Appendix S Sample Maintenance Plan
Appendix U Acronyms and Glossary
Appendix Y Supplier CM Market Analysis Questionnaire
C++ GUI Programming with Qt 3
Creating Main Windows
Creating Menus and Toolbars
Drag and Drop
Input/Output
Pointer-Based Containers
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Local Area Network (LAN) Technologies
Internet Protocol (IP) Basics
Internet Protocol (IP) Addressing
Transmission Control Protocol (TCP) Data Flow
Internet Protocol Security (IPSec)
File System Forensic Analysis
Data Organization
Writing the Output Data
File System Analysis
FAT Concepts and Analysis
Bibliography
Comparing, Designing, and Deploying VPNs
Benefits and Drawbacks of L2TPv3-Based L2VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Using Clientless SSL Remote Access VPNs (WebVPN) on the Cisco VPN 3000 Concentrator
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies