DB2/400 Design Concepts: Referential Integrity and Triggers
R 3,791
or 4 x payments of R947.75 with
Availability: Currently in Stock
Delivery: 10-20 working days
Condition: USED (All books are in used condition)
Condition - Very Good The item shows wear from consistent use, but it remains in good condition and functions properly. Item may arrive with damaged packaging or be repackaged. It may be marked, have identifying markings on it, or have minor cosmetic damage. It may also be missing some parts/accessories or bundled items.
DB2/400 Design Concepts: Referential Integrity and Triggers
Used Book in Good Condition
Now you can offload key data integrity enforcement from your application code to the database manager, so business rules cannot be bypassed and modifications can be made in one place rather than application by application. Midrange Computing editor Sharon Hoffman tells you how in her new book, DB2/400 Design Concepts: Referential Integrity and Triggers. "When the V3R1 database announcements were unveiled in May 1994, presenters assumed that customers understood the functions in theory," writes Hoffman in her introduction. "This assumption has proven to be invalid." The problem, she explains, is that V3R1 introduced "unfamiliar terminology based on database concepts that are unknown in the AS/400 business community." To rectify the situation, Hoffman wrote DB2/400 Design Concepts: Referential Integrity and Triggers--the first and only book designed to explain these important functions from the perspective of a traditional AS/400 programmer!