DB2/400 Design Concepts: Referential Integrity and Triggers

DB2/400 Design Concepts: Referential Integrity and Triggers

by Sharon L. Hoffman
     
 

Now you can offload key data integrity enforcement from your application code to the database manager, so business rules cannot be bypassed and modifications can be made in one place rather than application by application. Midrange Computing editor Sharon Hoffman tells you how in her new book, DB2/400 Design Concepts: Referential Integrity and Triggers. See more details below

Overview

Now you can offload key data integrity enforcement from your application code to the database manager, so business rules cannot be bypassed and modifications can be made in one place rather than application by application. Midrange Computing editor Sharon Hoffman tells you how in her new book, DB2/400 Design Concepts: Referential Integrity and Triggers. "When the V3R1 database announcements were unveiled in May 1994, presenters assumed that customers understood the functions in theory," writes Hoffman in her introduction. "This assumption has proven to be invalid." The problem, she explains, is that V3R1 introduced "unfamiliar terminology based on database concepts that are unknown in the AS/400 business community." To rectify the situation, Hoffman wrote DB2/400 Design Concepts: Referential Integrity and Triggers--the first and only book designed to explain these important functions from the perspective of a traditional AS/400 programmer!

Read More

Product Details

ISBN-13:
9781883884291
Publisher:
MC Press, LLC
Publication date:
01/01/1996
Pages:
236
Product dimensions:
8.53(w) x 10.81(h) x 0.56(d)

Related Subjects

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >