Flylib.com
Oracle PL/SQL Programming: Guide to Oracle8i Features
Oracle PL/SQL Programming: Guide to Oracle8i Features
ISBN: B000H2MK2W
EAN: N/A
Year: 1998
Pages: 107
Authors:
Steven Feuerstein
BUY ON AMAZON
Main
TOC
Copyright
Dedication
Preface
Structure of This Book
About the Examples
About the Disk
Conventions Used in This Book
How to Contact Us
Acknowledgments
Chapter 1. Oracle8i: A Bounty for PLSQL Developers
1.1 What s in Oracle8i Release 8.1?
1.2 And Then There s Java
1.3 New PLSQL Features Roundup
Chapter 2. Choose Your Transaction
2.1 Transaction Management in PLSQL
2.2 Defining Autonomous Transactions
2.3 When to Use Autonomous Transactions
2.4 Rules and Restrictions
2.5 Examples
Chapter 3. Invoker Rights: Your Schema or Mine?
3.1 A Look at the Definer Rights Model
3.2 The Invoker Rights Model
Invoker Rights for Dynamic SQLH2 P classdoc
3.4 Combining the Definer and Invoker Rights Models
Chapter 4. Native Dynamic SQL in Oracle8i
4.1 DBMS_SQL Versus NDS
4.2 NDS Statement Summary
4.3 Multirow Queries with Cursor Variables
4.4 Binding Variables
4.5 Working with Objects and Collections
4.6 Building Applications with NDS
4.7 NDS Utility Package
Chapter 5. Bulking Up with PLSQL 8.1
5.1 Context-Switching Problem Scenarios
5.2 Bulk DML with the FORALL Statement
5.3 Bulk Querying with the BULK COLLECT Clause
5.4 Using Cursor Attributes
5.5 Analyzing the Impact of Bulk Operations
Chapter 6. New Trigger Features in Oracle8i
6.1 Triggers on Nested Table View Columns
6.2 Database-Level Event Triggers
6.3 Schema-Level Event Triggers
Chapter 7. New and Enhanced Built-in Packages in Oracle8i
7.1 DBMS_PROFILER: Providing Code Profiling
7.2 DBMS_TRACE: Providing a PLSQL Trace Facility
7.3 DBMS_RLS: Implementing Fine-Grained Access Control
7.4 UTL_COLL: Using Collection Locators
7.5 LOB Enhancements
7.6 New DBMS_AQ and DBMS_AQADM Features
7.7 New DBMS_UTILITY Features
Chapter 8. Deploying Fine-Grained Access Control
8.1 FGAC Components
8.2 CREATE CONTEXT: Creating Contexts
8.3 SET_CONTEXT: Setting Context and Attribute Values
8.4 SYS_CONTEXT and LIST_CONTEXT: Obtaining Context Information
8.5 A Complete FGAC Example
Chapter 9. Calling Java from PLSQL
9.1 Oracle8i and Java
9.2 Getting Ready to Use Java in Oracle
9.3 A Simple Demonstration
9.4 Using loadjava
9.5 Using dropjava
9.6 Managing Java in the Database
9.7 Using DBMS_JAVA and DBMS_JAVA_TEST
9.8 Publishing and Using Java in PLSQL
9.9 Examples
Chapter 10. More Goodies for Oracle8i PLSQL Developers
10.1 The NOCOPY Parameter Mode Hint
10.2 Calling Packaged Functions in SQL
10.3 SQL99 Compliance
10.4 SQL Operations on Collections
10.5 Miscellaneous and Minor Improvements
Appendix A. Appendix: What s on the Companion Disk?
A.1 Installing the Reference
A.2 Using the Reference
Colophon
INDEX
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Oracle PL/SQL Programming: Guide to Oracle8i Features
ISBN: B000H2MK2W
EAN: N/A
Year: 1998
Pages: 107
Authors:
Steven Feuerstein
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
ERP System Acquisition: A Process Model and Results From an Austrian Survey
Context Management of ERP Processes in Virtual Communities
Data Mining for Business Process Reengineering
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Oracle Developer Forms Techniques
Special Tips for List Items
Summary
Special Tips for Working with Multi-form Applications
Advanced Forms Programming
An Exclusive Server-Side Commit from Forms
Snort Cookbook
Installing Snort on Solaris
Positioning Your IDS Sensors
Writing Your Own Preprocessor
Installing and Configuring ACID
Monitoring Network Performance
Cisco IOS Cookbook (Cookbooks (OReilly))
Deciphering Ciscos Weak Password Encryption
Viewing DLSw Status Information
XML-Formatted Log Messages
Filtering Multiport Applications
VRRP
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
IDS and IPS Architecture
Cisco Secure IDS
Incident Response
Security Business Issues
Understanding Digital Signal Processing (2nd Edition)
FILTERING ASPECTS OF TIME-DOMAIN AVERAGING
FIXED-POINT BINARY FORMATS
INTERPOLATING A BANDPASS SIGNAL
SPECTRAL PEAK LOCATION ALGORITHM
IMPROVING TRADITIONAL CIC FILTERS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies