Used and New from Other Sellers
Used and New from Other Sellers
from $3.74
Usually ships in 1-2 business days
(Save 93%)
Other sellers (Hardcover)
-
All (10)
from
$3.74
-
New (5)
from
$37.71
-
Used (5)
from
$3.74
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$37.71
Seller since Mon Jan 01 01:01:01 EST 2007
2003-09-21 Hardcover New NEW. NO remainder markings. A brand new book perfect inside and out.
Ships from: Midland, VA
Usually ships in 1-2 business days
- •Canadian
- •International
- •Standard, 48 States
- •Standard (AK, HI)
- •Express, 48 States
- •Express (AK, HI)
$50.00
Seller since Tue Jan 01 01:01:01 EST 2008
0131401572
Ships from: fallbrook, CA
Usually ships in 1-2 business days
- •Standard, 48 States
- •Standard (AK, HI)
$97.45
Seller since Tue Oct 07 09:35:53 EDT 2014
Brand New Item.
Ships from: Chatham, NJ
Usually ships in 1-2 business days
- •Canadian
- •International
- •Standard, 48 States
- •Standard (AK, HI)
- •Express, 48 States
- •Express (AK, HI)
$175.00
Seller since Tue Oct 07 09:37:03 EDT 2014
Brand new.
Ships from: acton, MA
Usually ships in 1-2 business days
- •Standard, 48 States
- •Standard (AK, HI)
$175.00
Seller since Tue Oct 07 09:37:03 EDT 2014
Brand new.
Ships from: acton, MA
Usually ships in 1-2 business days
- •Standard, 48 States
- •Standard (AK, HI)
More About This Textbook
Overview
These patterns solve an exceptionally wide range of problems including creating efficient database-independent applications, hiding obscure database semantics from users, speeding database resource initialization, simplifying development and maintenance, improving support for concurrency and transactions, and eliminating data access bottlenecks.
Every pattern is illustrated with fully commented Java/JDBC code examples, as well as UML diagrams representing interfaces, classes, and relationships. The patterns are organized into five categories:
Data Access Patterns demystifies techniques that have traditionally been used only in the most robust data access solutions--making those techniques practical for every software developer, architect, and designer.
Product Details
Related Subjects
Meet the Author
Table of Contents
Preface
Data is a major element in the foundation of any enterprise.Accountants make and defend decisions using financial data.Manufacturers and purchasers rely on stock and order data to temperinventory. Salespeople study customer history data. Executive managementdepends on data to examine company controls.
Enterprise software enables these key decision-makers to read, write,and organize data. Data access facilities within business applicationsplay an important role in their quality and usability. Developers mustexert considerable effort to design efficient data access code,otherwise an entire application may appear to be slow or prone todefects.
Data Access Patterns Enterprise software developers tackle the same dataaccess problems regardless of their application domain. These are someexamples of common issues that arise when designing data accesscomponents:
There are common solutions to these problems. Some ofthese solutions are intuitive and have been discovered independently byliterally thousands of developers. Others are more obscure, and havebeen solved in only the most robust data access solutions.
Data access patterns describe generic strategies for solving commondesign problems like these. Apattern does not necessarily dictate aparticular implementation. Instead, it describes an effective design andstructure that form the basis for a solution.
This book describes patterns that apply specifically to relational dataaccess. Relational databases are by far the most prevalent and provendata storage mechanism that enterprise software uses today. Otherpersistence technologies, like object-oriented and hierarchicaldatabases, are gaining in popularity. These alternative databases storedata closer to its runtime object form, so conventional object-orienteddesign patterns and techniques apply more readily.
Who Should Read This Book?This book is intended for softwarearchitects, designers, and engineers who are responsible for buildingdata access software components. In addition, the material in this bookis also appropriate for students who wish to understand common dataaccess problems and solutions.
This book describes data access patterns using common database andobject-oriented concepts and terminology. It is expected that the readerhas a basic familiarity with both of these. If you run across a termthat is not familiar to you, please consult the glossary at the end ofthe book.
The patterns in this book apply to many platforms, programminglanguages, and databases. The sample code for each pattern is writtenusing the Java 2 Standard Edition (J2SE), Java 2 Enterprise Edition(J2EE), and Java Database Connectivity (JDBC) APIs. The sample codeexpresses database operations using Structured Query Language (SQL). Abasic understanding of Java and JDBC is helpful when studying thissample code, but it is not essential. Comments and explanationsaccompany any code that is not straightforward.
How This Book Is OrganizedThis book is a pattern catalog. It describes a set of dataaccess patterns in detail. The parts of the book group multiple patternsbased on their applicability. Since it is a catalog, do not feelcompelled to read the pattern descriptions in order. If a patterndepends on concepts that another pattern defines, it clearly states thisfact.
Patterns are identified by concise, descriptive, and familiar names.Pattern names are significant because you can use them in conversationand documentation. It is much more effective to describe a set ofinteracting classes as an instance of Resource Decorator than torepeatedly describe each element of a pattern in detail.
This book's "Introduction" presents the motivation for studying andapplying data access patterns. It briefly introduces each pattern. Thischapter also defines the form that subsequent chapters use fordescribing pattern details.
The remainder of the book is the pattern catalog, divided into parts foreach pattern category:
Part 1, "Decoupling Patterns," describes patterns that decouple dataaccess code from other application logic, resulting in cleanerapplication code that is less susceptible to defects caused by changesthat relate only to data access details.
Part 2, "Resource Patterns,"describes patterns for efficient database resource management.
Part 3,"Input/Output Patterns," describes patterns that simplify data input and output operations using consistent translations between relational data in its physical form and domain object representations.
Part 4, "CachePatterns," describes patterns that enable strategic data caching and address the tradeoffs between data access optimization and cache overhead.
Part 5, "Concurrency Patterns," describes patterns that implement concurrency strategies.
The inside front cover provides a reference listing of the patterns in this book and their descriptions.As you become familiar with the book's structure and the pattern form,you may find this listing convenient for identifying and quicklylocating a specific pattern.
SummaryLike any other pattern catalog, this book is not exhaustive. Youare encouraged to tweak the solutions to fit your applications anddiscover new data access patterns along the way. Using and identifyingpatterns is beneficial, even if you do not document them as formally asthose in this book.
I am genuinely interested in any feedback and insight that you haveregarding the patterns described here. You can write me in care ofAddison-Wesley or send e-mail to dataaccesspatterns@awl.com.
Introduction
Preface
Data is a major element in the foundation of any enterprise.Accountants make and defend decisions using financial data.Manufacturers and purchasers rely on stock and order data to temperinventory. Salespeople study customer history data. Executive managementdepends on data to examine company controls.
Enterprise software enables these key decision-makers to read, write,and organize data. Data access facilities within business applicationsplay an important role in their quality and usability. Developers mustexert considerable effort to design efficient data access code,otherwise an entire application may appear to be slow or prone todefects.
Data Access Patterns Enterprise software developers tackle the same dataaccess problems regardless of their application domain. These are someexamples of common issues that arise when designing data accesscomponents:
There are common solutions to these problems. Some ofthese solutions are intuitive and have been discovered independently byliterally thousands of developers. Others are more obscure, and havebeen solved in only the most robust data access solutions.
Data access patterns describe generic strategies for solving commondesign problems like these. A pattern does notnecessarily dictate aparticular implementation. Instead, it describes an effective design andstructure that form the basis for a solution.
This book describes patterns that apply specifically to relational dataaccess. Relational databases are by far the most prevalent and provendata storage mechanism that enterprise software uses today. Otherpersistence technologies, like object-oriented and hierarchicaldatabases, are gaining in popularity. These alternative databases storedata closer to its runtime object form, so conventional object-orienteddesign patterns and techniques apply more readily.
Who Should Read This Book?
This book is intended for softwarearchitects, designers, and engineers who are responsible for buildingdata access software components. In addition, the material in this bookis also appropriate for students who wish to understand common dataaccess problems and solutions.
This book describes data access patterns using common database andobject-oriented concepts and terminology. It is expected that the readerhas a basic familiarity with both of these. If you run across a termthat is not familiar to you, please consult the glossary at the end ofthe book.
The patterns in this book apply to many platforms, programminglanguages, and databases. The sample code for each pattern is writtenusing the Java 2 Standard Edition (J2SE), Java 2 Enterprise Edition(J2EE), and Java Database Connectivity (JDBC) APIs. The sample codeexpresses database operations using Structured Query Language (SQL). Abasic understanding of Java and JDBC is helpful when studying thissample code, but it is not essential. Comments and explanationsaccompany any code that is not straightforward.
How This Book Is Organized
This book is a pattern catalog. It describes a set of dataaccess patterns in detail. The parts of the book group multiple patternsbased on their applicability. Since it is a catalog, do not feelcompelled to read the pattern descriptions in order. If a patterndepends on concepts that another pattern defines, it clearly states thisfact.
Patterns are identified by concise, descriptive, and familiar names.Pattern names are significant because you can use them in conversationand documentation. It is much more effective to describe a set ofinteracting classes as an instance of Resource Decorator than torepeatedly describe each element of a pattern in detail.
This book's "Introduction" presents the motivation for studying andapplying data access patterns. It briefly introduces each pattern. Thischapter also defines the form that subsequent chapters use fordescribing pattern details.
The remainder of the book is the pattern catalog, divided into parts foreach pattern category:
Part 1, "Decoupling Patterns," describes patterns that decouple dataaccess code from other application logic, resulting in cleanerapplication code that is less susceptible to defects caused by changesthat relate only to data access details.
Part 2, "Resource Patterns,"describes patterns for efficient database resource management.
Part 3,"Input/Output Patterns," describes patterns that simplify data input and output operations using consistent translations between relational data in its physical form and domain object representations.
Part 4, "CachePatterns," describes patterns that enable strategic data caching and address the tradeoffs between data access optimization and cache overhead.
Part 5, "Concurrency Patterns," describes patterns that implement concurrency strategies.
The inside front cover provides a reference listing of the patterns in this book and their descriptions.As you become familiar with the book's structure and the pattern form,you may find this listing convenient for identifying and quicklylocating a specific pattern.
Summary
Like any other pattern catalog, this book is not exhaustive. Youare encouraged to tweak the solutions to fit your applications anddiscover new data access patterns along the way. Using and identifyingpatterns is beneficial, even if you do not document them as formally asthose in this book.
I am genuinely interested in any feedback and insight that you haveregarding the patterns described here. You can write me in care ofAddison-Wesley or send e-mail to dataaccesspatterns@awl.com.