DB2/400 Design Concepts: Referential Integrity and Triggers
by Sharon L. HoffmanNow you can offload key data integrity enforcement from your application code to the database manager, so business rules cannot be bypassed and modifications can be made in one place rather than application by application. Midrange Computing editor Sharon Hoffman tells you how in her new book, DB2/400 Design Concepts: Referential Integrity and Triggers. /i>… See more details below
Overview
Now you can offload key data integrity enforcement from your application code to the database manager, so business rules cannot be bypassed and modifications can be made in one place rather than application by application. Midrange Computing editor Sharon Hoffman tells you how in her new book, DB2/400 Design Concepts: Referential Integrity and Triggers. "When the V3R1 database announcements were unveiled in May 1994, presenters assumed that customers understood the functions in theory," writes Hoffman in her introduction. "This assumption has proven to be invalid." The problem, she explains, is that V3R1 introduced "unfamiliar terminology based on database concepts that are unknown in the AS/400 business community." To rectify the situation, Hoffman wrote DB2/400 Design Concepts: Referential Integrity and Triggers--the first and only book designed to explain these important functions from the perspective of a traditional AS/400 programmer!
Product Details
- ISBN-13:
- 9781883884291
- Publisher:
- MC Press, LLC
- Publication date:
- 01/01/1996
- Pages:
- 236
- Product dimensions:
- 8.53(w) x 10.81(h) x 0.56(d)
Customer Reviews
Average Review: