Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Database Fundamentals
Figure 2-1: The typical client/server architecture with a DBMS.
Figure 2-2: The two-tier architecture.
Figure 2-3: The three-tier architecture.
Figure 2-4: The four ODBC components.
Chapter 3: Integrating Databases with JDBC
Figure 3-1: Java clients running on different platforms.
Figure 3-2: JDBC is located on the client side.
Figure 3-3: The JDBC-ODBC Bridge driver.
Figure 3-4: Native API, partly Java drivers.
Figure 3-5: The Net driver.
Figure 3-6: Native-protocol, all-Java drivers.
Figure 3-7: The complete JDBC architecture.
Chapter 5: Getting Started with JDBC
Figure 5-1: The JDBC APIs.
Figure 5-2: Actions performed on the client and DBMS sides.
Figure 5-3: The relationship between the main JDBC interfaces.
Figure 5-4: An applet communicating with a server.
Figure 5-5: Three-tier design.
Figure 5-6: The parts of a standalone Java application.
Chapter 6: Database Connectivity, Step by Step
Figure 6-1: An overview of the connection.
Figure 6-2: JDBC mechanism to name a data source.
Figure 6-3: Overview: Building a SQL statement.
Figure 6-4: Sending a SQL statement.
Figure 6-5: An overview of sending a SQL statement.
Figure 6-6: An overview of getting the result set.
Figure 6-7: The next() method is used to scan a result set.
Figure 6-8: An overview of accessing columns.
Figure 6-9: Accessing columns with
getXXX()
.
Figure 6-10: An overview of managing multiple result types.
Figure 6-11: An overview of all the steps for communicating with a database.
Chapter 7: Refining JDBC Queries and Updates
Figure 7-1: The cursor mechanism.
Chapter 8: Advanced Techniques
Figure 8-1: Invoking a stored procedure.
Figure 8-2: An overview of dealing with parameters.
Figure 8-3: Sending a static statement.
Figure 8-4: Sending parameters to a prepared statement.
Figure 8-5: An overview of prepared statements.
Chapter 9: Accessing Database Metadata
Figure 9-1: Processing methods that return a
ResultSet
.
Chapter 11: Examples of Java Applications
Figure 11-1: The ISQL standalone application.
Figure 11-2: The ISQL applet.
Figure 11-3: Executing SQL statements.
Figure 11-4: Connect Software’s JDBC Airlines applet.
Figure 11-5: The JavaBank applet login screen.
Figure 11-6: The JavaBank applet account balance.
Figure 11-7: The JavaBank applet transfer screen.
Figure 11-8: The JavaBank applet cash withdrawal.
Chapter 12: Complex Examples of Java Applications
Figure 12-1: The JDBCExplorer main window.
Figure 12-2: Supplying login data.
Figure 12-3: The main navigation control widget.
Figure 12-4: Database specifications.
Figure 12-5: Database catalog nodes.
Figure 12-6: Table objects.
Figure 12-7: Columns.
Figure 12-8: Primary keys.
Figure 12-9: An Interactive SQL tool.
Figure 12-10: A SQLException message window.
Figure 12-11: JDBCExplorer help.
Figure 12-12: The JDBCExplorer About box.
Figure 12-13: The three-tiered architecture of the car factory example.
Figure 12-14: The RMI client window.
Previous page
Table of content
Next page
JDBC 3: Java Database Connectivity
ISBN: 0764548751
EAN: 2147483647
Year: 2002
Pages: 148
Authors:
Bernard Van Haecke
BUY ON AMAZON
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Basics and Creating Database Files
Understanding SQL Transactions and Transaction Logs
Retrieving and Manipulating Data Through Cursors
Working with Ms-sql Server Information Schema View
Working with Stored Procedures
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 4 Motherboard/Processors/Memory
Domain 6 Basic Networking
Domain 1 Operating System Fundamentals
Domain 3 Diagnosing and Troubleshooting
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Survivable Remote Site Telephony
Cisco IP Manager Assistant Overview
Threats Targeting the Operating System
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Objectives of this book
Atomic transactions
Service modeling (a step-by-step process)
Considerations for choosing SOA extensions
Service-oriented business process design (a step-by-step process)
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 46. Proxy Web Traffic over SSH
Hack 63. Build Your Own Access Point with Linux
Hack 65. Protect Your Bridge with a Firewall
Hack 88. Primestar Dish with Biquad Feed
Hack 99. Slow Down to Speed Up
Web Systems Design and Online Consumer Behavior
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter XIV Product Catalog and Shopping Cart Effective Design
Chapter XVII Internet Markets and E-Loyalty
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies