头盔 发表于 2025-3-26 21:22:36
Deleting Data,In the last chapter we saw how the use of transactions helped to ensure data integrity as we modified data in multiple tables within the same stored procedure. If an error occurred, we were able to roll back all modifications to the data in our tables.exorbitant 发表于 2025-3-27 02:21:00
Working with Text Data,Throughout the book we have been working with SQL Server string data types of Char and VarChar. We know that both of these data types can contain up to 8,000 characters, or 8K of data. While that seems like a lot of data, there will come a time when this is simply not enough.impaction 发表于 2025-3-27 07:45:34
Installing Internet Information Server (IIS),This chapter is a prerequisite for the next, where we will actually begin to work with the XML features of SQL Server 2000. Before we can begin working with XML, we need to install IIS. This chapter gives an overview of IIS explaining what it is, and how we can use it.incisive 发表于 2025-3-27 13:10:13
SQL Server and XML,Just a few short years ago we would display data from our database on the Web as HTML using Active Server Pages to select and format the data. We would also send and receive data as plain text files in business-to-business (B2B) applications.Gentry 发表于 2025-3-27 16:09:35
http://reply.papertrans.cn/19/1826/182527/182527_35.pngLoathe 发表于 2025-3-27 19:49:23
Thearon WillisFull coverage of SQL Server tools, from installation Query Analyzer to English Query applications.Shows how to integrate SQL Server into your VB applications using ADO.Extensive coverage of Transact-SPalter 发表于 2025-3-28 00:40:10
http://reply.papertrans.cn/19/1826/182527/182527_37.pngcommonsense 发表于 2025-3-28 05:17:41
https://doi.org/10.1007/978-3-663-05325-5 the underlying database engine. If you are new to SQL Server this product will amaze you with its richness of features and ease of use. If you are upgrading from a previous version of SQL Server you will find that SQL Server 2000 has many new features to offer developers.昏迷状态 发表于 2025-3-28 06:34:40
Antonio Sáez Delgado,Santiago Pérez Isasiance to everyone, especially people in the technology industry. We want to do everything possible to secure our systems and data from access by unauthorized persons. This includes both malicious and accidental unauthorized access. Security is not only used to prevent unauthorized access to our databdecipher 发表于 2025-3-28 13:36:32
An Interdisciplinary Analytical Framework. While writing queries in the Query Analyzer is great for ad hoc queries and reporting, they cannot be accessed from our VB programs and distributed to the users of our applications. This is where stored procedures come in; we can access them from our VB programs, and they are available to all user