BN.com Gift Guide

Enterprise Development Using Microsoft Visual Basic 6.0

Overview

Using "Microsoft "R" Mastering Enterprise Development With Microsoft "R" Visual Basic "R" 6.0," programmers proficient in desktop and database application design learn how to create their first three-tier, client/server enterprise solutions. Instruction begins with an introduction to Microsoft's Enterprise Development Strategy and progresses through essential development topics — including COM DLLs, Microsoft Transaction Server (MTS) services, middle-tier data access, stored procedures and SQL transactions, ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (9) from $1.99   
  • New (3) from $11.76   
  • Used (6) from $1.99   
Close
Sort by
Page 1 of 1
Showing 1 – 1 of 3
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$11.76
Seller since 2008

Feedback rating:

(172)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
0735609012 BRAND NEW NEVER USED IN STOCK 125,000+ HAPPY CUSTOMERS SHIP EVERY DAY WITH FREE TRACKING NUMBER

Ships from: fallbrook, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing 1 – 1 of 3
Close
Sort by
Sending request ...

Overview

Using "Microsoft "R" Mastering Enterprise Development With Microsoft "R" Visual Basic "R" 6.0," programmers proficient in desktop and database application design learn how to create their first three-tier, client/server enterprise solutions. Instruction begins with an introduction to Microsoft's Enterprise Development Strategy and progresses through essential development topics — including COM DLLs, Microsoft Transaction Server (MTS) services, middle-tier data access, stored procedures and SQL transactions, security, component programming, and advanced client/server technologies. The companion lab exercises provide "learn-by-doing" practice with critical programming tasks. By the end of the course, students have created a full-featured enterprise solution. As a complement to the text, the Microsoft Mastering CD-ROM contains the course labs in interactive multimedia format and complete source code.

Read More Show Less

Product Details

  • ISBN-13: 9780735609013
  • Publisher: Microsoft Press
  • Publication date: 8/1/1999
  • Series: Microsoft Mastering Series
  • Edition description: BK&CD-ROM
  • Pages: 406
  • Product dimensions: 7.41 (w) x 9.27 (h) x 1.38 (d)

Table of Contents

Index

A
accessing
    data from middle tier, 141
    mainframe data, 309
    databases, 231, 233
accounts, Windows NT, security, 244, 245
ACID properties, 96
activating COM objects, 60-62
ActiveX Data Objects (ADO), 141
    object model, 144
    recordsets, recommendations, 132
adding
    class modules to projects, 43
    components to packages, 82
    methods to classes, 45
    parameters to stored procedures, 199
administering queues, 295-97
ADO. See ActiveX Data Objects (ADO)
ADO connections
    closing, 148
    creating, 147, 149, 151, 154
    error handling, 156
    establishing, 147
    executing commands in, 149
    modifying data in, 154
ADO middle tier
    accessing data in, 141
    best practices, 168
    choosing cursor types for, 162
    disconnected recordsets in, 163-66
    lock types in, 161
    using cursors in, 158-61
    working with, 158, 161-163, 165, 166
ADO stored procedures
    executing, 170
    populating Parameters collection, 171
    return codes, 173
    using, 170
advanced client/server technologies, 289, 290. See also names of specific technologies
    message queuing, 291, 295-297, 302-304
    server clustering, 304
all-or-nothing work management, 72
apartment-threading recommendations, 133
Application Model, 19
application, sample, 15, 17
applying interfaces, 266
architecture
    Microsoft Transaction Server, 72
    Universal Data Access, 142
AS/400, advanced client/server technologies, 309
ASP, Internet three-tier client/server architecture, 7
assigning
    interfaces, 62
    roles, 226
asynchronous communication, 292. See also message queuing
Atomicity property, 96
attributes
    of interfaces, 258, 259
    of transactions, 99
authentication. See also security
    MTS, 72
automation interfaces, 275

B
best practices
    ADO middle tier, 168
    security, 247
binding, 273
    automation, 275
breakpoints, 55. See also debugging
building COM DLLs in Microsoft Visual Basic, 39
    activating, 60
    class modules and COM in, 51
    class modules, using, 42
    creating, 40
    creating methods for classes in, 45
    creating Visual Basic projects for, 42
    error handling in, 46
    implementing business services in, 40
    in-process vs. out-of-process, 41
    Initialize event in, 44
    MTS constraints in, 41
    registering, 56-58
    removing, 57
    setting class module properties for, 49
    setting project properties for, 47
    Terminate event in, 44
    testing, 55
    version compatibility, 53
    working with, 47
building components, 101
business logic in SQL Server stored procedures, 188
business rule errors, handling, 126. See also error handling
business services
    implementing, 40
    Island Hopper News sample application, 22
    MSF Application Model, 19
    MTS components, 73

C
calling
    CreateInstance method, 102, 103
    CreateObject method, 43, 60
    DisableCommit method, 106
    EnableCommit method, 106
    SetAbort method, 105
    SetComplete method, 104
CGI (Common Gateway Interface)
    early Internet technologies, 7
changing
    disconnected recordsets, 165
    recordset data, 154
choosing
    cursor types, 162
    threading models, 49
class identifiers. See CLSIDS
class modules
    adding to projects, 43
    and COM relationships, 51
    Initialize event, 44
    setting properties in, 49
    Terminate event, 44
classes
    and COM, 51
    creating methods for, 45
    instantiating, 43
    setting properties in, 83
    transaction attributes of, 99
client/server architecture, 2
client/server technologies, advanced, 289, 290
    message queuing, 291, 295-297, 302
    server clustering, 304, 306, 308, 309
clients
    configuring, MTS, 88
    interfaces, 270
    MSMQ, 295
closing ADO connections, 148
CLSID keys, registry, COM DLLs, 58
CLSIDs, 51
    version compatibility, 53
Cluster Automation Server, 308
COBOL Wizard
    advanced client/server technologies, 310
COM. See Component Object Model (COM)
Component Object Model (COM), 2, 9
    advantages, 9
    class modules, 51
    components. See COM DLLs
    implementing, 11
    implementing with VB, 257
    interfaces, 52
COM Transaction Integrator for CICS and IMS (COMTI), 309
COM DLLs 39
    activating, 60
    class modules and COM, 51
    class modules, using, 42
    creating, 40
    creating methods for classes, 45
    creating Visual Basic projects, 42
    error handling, 46
    implementing business services, 40
    in-process vs. out-of-process, 41
    Initialize event, 44
    MTS constraints, 41
    registering, 56-58
    removing, 57
    setting class module properties, 49
    setting project properties, 47
    Terminate event, 44
    testing, 55
    version compatibility, 53
    working with, 47
Command object stored procedures
    executing, 170
    populating Parameters collection, 171
    return codes in, 173
    using, 170
commands
    creating from connections, 149
    executing, 149
compatibility, version, 53
Component Object Model. See COM
components. See also Component Object Model (COM)
    building, 101
    calling CreateInstance method, 102
    calling EnableCommit, DisableCommit methods, 106
    calling SetComplete, SetAbort methods, 104
    debugging, 128
    determining transaction outcome, 107
    developing, 99
    getting context objects, 101
    setting security, 229
    sharing in Microsoft Repository, 34
consumers, 143. See also Universal Data Access (UDA)
COMTI
    advanced client/server technologies, 310
concurrency model, MTS, 70
conditional execution, 204. See also flow-control statements
    stored procedures, SQL Server, 203
configuring
    clients, MTS, 88
    ODBC drivers for connection pooling, 123
conflicts, resolving, disconnected recordsets, 166
connection pooling, 123
connections, ADO. See ADO connections
Consistency property, 97
context objects
    getting, 101, 102
    transactions, 98
contracts, interface definition, 259
CreateInstance method, calling, 102, 103
creating
    ADO connections, 147, 149, 151, 154, 156
    class instances, 42, 43
    COM DLLs, 40
    commands, 149, 150
    connections, 191
    disconnected recordsets, 165
    interfaces, 261
    logins, 246
    methods for classes, 45
    objects, 43, 60, 102
    packages, 79
    properties, 119
    queues, 297
    recordsets, 151
    registry keys in COM DLLs, 58
    roles, 226
    shared properties and property groups, 119
    stand-alone command objects, 150
    stored procedures, SQL Server, 197, 199, 200
    Visual Basic projects, 42
    Windows NT accounts in SQLSecurity Manager, 244, 245
cursors, 159. See also name of specific cursor
    choosing types, 162
    locating, 160
    types of, 159

D
Data Access Objects (DAO), 142
Data Environment designer, 191
data integrity, 193
    enforcing, 194
    types of, 193
data locks, 161
    types of, 162
data services
    Island Hopper News sample application, 22
    MSF Application Model, 19
data source connections. See ADO connections
Data View window, 191
    creating stored procedures in, 197, 198
databases
    restricting access to, 233
    managing, 190
    viewing, 191
    and Visual Studio tools, 33
debugging
    component, 128
    error types, 126
    MTS, 126, 128, 130
    MTS components, 101
    stored procedures in SQL Server, 201
    tools, 130
    Visual Studio tools, 33
declarative data integrity, 194. See also data integrity
declarative security, 223-226. See also security
declaring variables, 202
defaults, interfaces, 268
defining
    interfaces, 262
    roles, 71
dependent clients, 296. See also message queuing
deploying components, 85
destroying objects, 44
determining transaction outcome, 107
developing components, 99
development tools, 34
    Microsoft Visual C++, 35
    Microsoft Visual FoxPro, 35
    Microsoft Visual InterDev, 35
    Microsoft Visual J++, 35
DHTML
    Internet three-tier client/server architecture, 7
    using with COM, 12
DisableCommit method, 106, 107
disabling security, 229
disconnected recordsets, 163, 164. See also recordsets
    creating, 165
    deleting, 165
    editing, 165
    resolving conflicts, 166
DispID binding, 275. See also binding
distributed COM (DCOM), 12
    support for, 88
Distributed Transaction Coordinator (DTC)
    monitoring transactions in, 131
    and MTS, 76
DLLs in COM. See COM DLLs
dual interfaces, 272. See also interfaces
Durability property, 96
dynamic cursors, 159, 160. See also cursors

E
early binding, 274. See also binding
editing disconnected recordsets, 165, 166
efficient programming, 132, 133
EnableCommit method, 106
enabling
    connection pooling, 123
    security, 229
enforcing data integrity, 194
Enterprise Development, 1, 2
    course overview, 14
    Merrill Lynch case study, 8
    strategy, 12
environment, MTS, 73
error handling
    and component debugging, 128
    and debugging tools, 130
    business rules, 126
    error types in, 126
    fault isolation, packages, 73
    in ADO connections, 156
    in MTS, 126, 128, 130
    interfaces, 263
    Raise method, 46
    Set statement, 263
example, Merrill Lynch case study, 8
executing
    commands, 149
    stored procedures, 170
exporting packages, 86, 88

F
fault isolation in packages, 73
files, storing object states in, 116
flow-control statements, 203
forward-only cursors, 158. See also cursors

G
generating registry keys in COM DLLs, 58
getting context objects, 101
Globally Unique Identifiers (GUIDs), 51
global variables, 202. See also variables
groups
    creating shared property groups, 118
    mapping users to roles, 227
    MTS, 70

H
Host Data Replicator (HDR), advanced client/server technologies, 311

I
IDispatch interface, 270. See also interfaces
implementing
    COM with Visual Basic, 257
    interfaces, 262
    security, 223
IMS/TM
    advanced client/server technologies, 310
in-process DLLs vs. out-of-process, 41
independent clients, 296. See also message queuing
Initialize event, 44
    limitations of, 116
installing client executables, 88
instance data, storing object states in, 117
Instancing property, 49
instantiating
    classes, 43, 44
    objects, 43, 60, 102
Integrated Development Environment (IDE), 128
integrated security, 239, 245. See also SQL Server, security
    creating Windows NT accounts in, 244
    and SQL Security Manager, 245
Interface Definition Language (IDL), 269. See also interfaces
Interface Identifier (IID), 52    
    version compatibility, 53
interfaces, 257-272
    applying, 266
    assigning, 62
    and automation, 275
    binding, 273
    in clients, 270
    and COM, 52
    creating, 261
    defaults, 268
    dual interfaces, 272
    error handling, 264
    IDispatch interface, 270
    IDL, 269
    implementing COM with Visual Basic, 257
    IUnknown interface, 260
    objects, using, 263
internal errors. See also error handling
    handling, 126
Internet Information Server (IIS)
    advanced client/server technologies, 309
Internet three-tier client/server architecture, 7
Island Hopper News sample application, 15, 17
    physical design, 23
    services, 22
Isolation property, 96
iterative execution. See also flow-control statements
    stored procedures, SQL Server, 203-205
IUnknown interface, 260

J
Java
    Internet three-tier client/server architecture, 7
just-in-time-activation, 71, 113

K
keys, registry, COM DLLs, 58
keyset cursors, 160. See also cursors

L
late binding, 273. See also binding
LIBIDs, 53
libraries
    in COM, 11
    type, 53
    and version compatibility, 53
lifetime, transactions, 107
limitations
    of Initialize event, 116
    of Terminate event, 116
local state, 114. See also object state
local variables. See also variables
    declaring, 202
locating cursors, 160
locks, 161, 162
logins. See also SQL Server, security
    creating, 246
    security, 242
LU 6.2
    advanced client/server technologies, 309

M
managing
    databases, 190
    object state, 113
mapping users to roles, 227
Merrill Lynch case study, 8
message queuing, 291-304
    creating, 297
    in MSMQ Explorer, 296
    and MTS integration, 302
    process of, 295
    sending and receiving messages, 297
messages. See also Microsoft Message Queue (MSMQ)
    sending and receiving messages, 297
methods. See also names of specific methods
    creating for classes, 45
    viewing, 45
Microsoft Cluster Server, 290, 304, 306
    accessing mainframe data in, 309
    developing for, 308
Microsoft Data Access Components (MDAC), 142
    best practices, 168, 169
Microsoft Distributed Transaction Coordinator, 76
Microsoft Enterprise Development Strategy. See Enterprise Development
Microsoft Host Data Replicator, 311
Microsoft Message Queue (MSMQ), 291
    MSMQ Explorer, 296
    MTS, integration, 302
    object model, 298
    process, 295
    security, 303
    sending, receiving messages, 297, 298
Microsoft Repository, Visual Studio tools, 34
Microsoft SNA Server, 309
Microsoft SQL Server. See SQL Server
Microsoft Solutions Framework (MSF), 1
    process model, 15
Microsoft Transaction Server (MTS), 69, 85
    add-in, registry considerations, 84
    adding components to packages in, 82
    and architecture, 72
    best practices in, 132
    building components in, 101-107
    calling CreateInstance method, 102
    calling EnableCommit, DisableCommit methods, 106
    calling SetComplete, SetAbort methods, 105
    COM constraints, 41
    components, 73
    component debugging, 128
    concurrency model, 70
    configuring clients, 88
    connection pooling, 123
    context objects, 98, 101, 102
    creating packages, 79
    debugging tools, 130
    deploying components, 85
    determining transaction outcome, 107
    developing components, 99
    environment, 73
    error handling, 46, 126, 128, 130
    error types, 126
    exporting packages, 86
    groups, 71
    and Internet three-tier client/server architecture, 7
    and just-in-time activation, 113
    managing object state, 113, 116, 118, 123
    and MSMQ integration, 302
    programming model overview, 95
    registering COM DLLs, 57
    registry changes, adding components, 84
    resource management, 71
    storing object states in, 116
    support services for, 74
    type libraries, using, 53
    users, 70
    work management in, 70
Microsoft Visual Basic
    calling EnableCommit, DisableCommit methods, 106, 107
    calling SetComplete, SetAbort methods, 104
    class modules and COM in, 51
    class modules, using, 42
    and Cluster Automation Server, 308
    CreateInstance method in, 103
    creating methods for classes in, 45
    and Data Environment designer, 191
    developing MTS components for, 99
    development tools in, 34
    error handling in, 46
    getting context objects in, 101
    and IDE debugger, 128
    implementing COM, 257-269
    Initialize event, 44, 116
    setting class module properties, 49
    setting project properties, 47
    Terminate event, 44, 116
    testing, 55
    version compatibility, 53
    working with, 47
Microsoft Visual Basic, building COM DLLs. See building COM DLLs in Microsoft Visual Basic
Microsoft Visual Database Tools, 33
Microsoft Visual Studio, Enterprise Edition, 32
    development tools, 34
    IDE debugger, 128
    tools, 32, 33
Microsoft Windows NT
    creating accounts, security, 244, 245
    security, mapping users to roles, 227
middle tier, ADO. See ADO middle tier
mixed security, 240. See also SQL Server, security
modifying data, recordsets, 154
monitoring transactions, 130
MSF. See Microsoft Solutions Framework
MSF Application Model, 19
MSMQ. See Microsoft Message Queue
MTS. See Microsoft Transaction Server (MTS)
MTS Explorer, 76-78
    adding components to packages, 82
    configuring clients, 88
    creating packages, 79
    deploying components, 85
    exporting packages, 86
    monitoring DTC activities, 131
    registry changes, adding components, 84
    views, 77
MTS Security, 71, 223
    enabling, 229
    implementing, 223
    roles, 226, 227
    setting package identity, 231
MTS Spy debugging tools, 130
multiple-server clusters, 306. See also Microsoft Cluster Server
multiple interfaces, 267. See also interfaces

N
Name property, 49
navigating recordsets, 151
non-updatable cursors, 158. See also cursors

O
Object Browser
    viewing properties and methods, 45
    viewing type libraries, 53
object libraries. See type libraries
object model, ADO, 144
object state, 113
    managing, 113-125
    storing, 116
Object Viewer, viewing IDL, 269
objects
    creating methods for, 45
    destroying, 44
    error handling, 126
    instantiating, 43, 60, 102
    interfaces, using, 263
OLE DB provider
    advanced client/server technologies, 311
one-way asynchronous communication, 293. See also message queuing
Open Database Connectivity (ODBC)
    connection pooling, 123
    MTS resource dispensers, 75
out-of-process EXEs vs. in-process, 41
outcome of transactions, 107

P
Package Wizard, 87
packages, 73
    adding components to, 82
    creating, 79
    deploying, 85
    exporting, 86, 88
    and fault isolation, 74
    security in, 74
    setting identity in, 231
    setting properties in, 79
    setting security in, 229
Parameter object, 150. See also commands
parameterized commands, 150. See also commands
parameters
    adding stored procedures to, 199
    stored procedures, populating Parameters collection, 171
    stored procedures, return codes, 173
Parameters collection, populating, 171
PDS
    advanced client/server technologies, 311
PDSE
    advanced client/server technologies, 311
performance
    in ADO middle tier, 168
    and programming practices, 132
permissions. See also SQL Server, security
    security, 242, 245
polymorphism, 266. See also interfaces
populating Parameters collection, 171
predefined global variables. See also variables
    declaring, 203
procedural data integrity, 194. See also data integrity
Process Model, 1
ProgIDs, 52
    keys, registry, COM DLLs, 58
    version compatibility, 53
programming model, 95
    best practices, 132
    building components in, 101-107
    calling CreateInstance method, 103
    calling EnableCommit, DisableCommit methods, 106
    calling SetComplete, SetAbort methods, 104, 105
    component debugging in, 128
    connection pooling in, 123
    and context objects, 98, 101
    debugging tools in, 130
    determining transaction outcome of, 107
    developing components for, 99
    error handling in, 126, 128, 130
    and error types, 126
    and just-in-time activation, 113
    managing object states in, 113, 116, 118, 123
    storing object states in, 116
properties
    creating, 118, 119
    setting class module, 49
    setting class, 83
    setting project, 47
    viewing, 45
providers, 142. See also Universal Data Access (UDA)

R
Raise method, error handling, 46
RDBMS, SQL Server, 189
RDO. See Remote Data Objects (RDO)
receiving messages, 297
recommendations in programming practices, 132
reconnecting disconnected recordsets, 165, 166
recordsets
    creating and navigating, 151
    modifying data in, 154
    retrieving read-only data in, 163
registering COM DLLs, 56, 57
registry
    changes and adding components, 84, 85
    keys in COM DLLs, 58
Remote Data Objects (RDO), 142
removing COM DLLs, 57
request/response asynchronous communication, 291. See also message queuing
resolving conflicts in disconnected recordsets, 166
resource dispensers, MTS, 75
resource management, 70
resource managers, MTS, 75
restricting database access, 233
retrieving
    read-only data, 163
    updatable data, 163
return codes in stored procedures, 173
roles. See also security
    creating, assigning, 226
    defining, 71
    mapping users to, 227

S
sample application. See Island Hopper News sample application
scalability
    MTS resource management, 71
    object states, relationship, 114
    middle tier, ADO best practices, 168
scrollable cursors, 159. See also cursors
security, 219
    best practices, 247
    and MSMQ, 303
    MTS. See MTS Security
    packages, 73
    in SQL Server, 237, 242
    in SQL Server, integrated, 244, 245
selecting threading models, 49
sending messages, 297
server clustering, 304
    accessing mainframe data, 309
    developing for, 308
    in Microsoft Cluster Server, 306, 307
services, 2, 19, 143. See also Universal Data Access (UDA)
    implementing business services, 40
    Island Hopper News sample application, 22
    MTS, 74
Set statement, error handling, 264
SetAbort method, 105
SetComplete method, 104
setting
    breakpoints, 55
    class module properties, 49
    class properties, 83
    package identity, 231
    package properties, 80
    permissions, 242, 246
    project properties, 47
    transaction attributes, 99
shared properties, creating, 118
Shared Property Manager (SPM), 118
    creating properties in, 118
    storing object states in, 116
Shared Property Managers, MTS, working with, 74
SharedProperty object, 118
sharing components in Microsoft Repository, 32
SPM. See Shared Property Manager (SPM)
SQL Enterprise Manager, 190
SQL Security Manager, 245
SQL Server
    connection pooling, 123
SQL Server security, 237. See also security
    integrated, 244-246
    logins and permissions, 242
    modes of, 237
SQL Server stored procedures, 187
    adding parameters to, 199
    business logic, 188
    creating, 197, 199, 200
    creating in Data View, 197
    and data integrity, 193, 194
    debugging in, 201
    declaring variables in, 202
    and enterprise solutions, 189
    and flow-control statements, 203, 204
    managing databases in, 190
    transactions, 205
    variables, 202, 203
stand-alone command objects, 150
standard security, 238. See also SQL Server security
static cursors, 159. See also cursors
stored procedures, ADO
    executing, 170
    populating Parameters collection, 171
    return codes, 173
    using, 170
stored procedures, SQL Server. See SQL Server Stored Procedures
storing object state, 116
support services, MTS, 74
Symmetric Multiprocessing (SMP), 305. See also server clustering
synchronous communication, 291. See also message queuing
T-SQL Debugger, debugging stored procedures, SQL Server, 201

T
Terminate event, 44, 116
testing COM DLLs, 55
threading models, choosing, 49
three-tier applications and disconnected recordsets, 163
three-tier client/server architecture, 2. See also client/server architecture
    Internet as, 7
    Merrill Lynch case study, 8
three-tier security, 221. See also security
tiers, 2. See also client/server architecture
tools, Microsoft Visual Studio, Enterprise Edition, 32
Transaction Processing (TP)
    advanced client/server technologies, 310
Trace Messages window, 131
tracing source code, 56
Transact-SQL. See SQL Server, stored procedures
Transaction List window, 131
Transaction Statistics window, 131
transactions, 96
    attributes of, 99
    best practices, 132
    building components in, 101, 102, 104, 106, 107
    calling CreateInstance method, 102
    calling EnableCommit, DisableCommit methods, 106
    calling SetComplete, SetAbort methods, 104, 105
    component debugging, 128
    connection pooling, 123
    in context objects, 98, 101
    debugging tools, 130
    determining outcome of, 107
    developing components in, 99
    and DTC, 76
    error handling, 126, 128, 130
    and error types, 126
    and just-in-time activation, 113
    lifetime, 107
    managing object state in, 113, 116, 118, 123
    monitoring, 131
    MSMQ and MTS integration, 302
    MTS, 70
    stored procedures, SQL Server, 205
    storing object states, 116
    two-phase commit process, 97
    working with, 95
triggers, 195. See also SQL Server stored procedures
two-phase commit, 97
two-server clusters, 307. See also Microsoft Cluster Server
two-tier client/server architecture, 2. See also client/server architecture
two-tier security, 220. See also security
type libraries, 53
    contents of, 270
    version compatibility, 53
TypeLib keys, registry, COM DLLs, 58

U
Universal Data Access (UDA)
    architecture, 141, 142
unregistering COM DLLs, 56
updatable cursors, 158. See also cursors
updating
    data, 162
    disconnected recordsets, 165
    resolving conflicts in disconnected recordsets, 166
user-defined global variables. See also variables
    declaring, 203
user services
    Island Hopper News sample application, 22
    MSF Application Model, 19
using
    connection pooling, 123
    disconnected recordsets, 163

V
variables
    declaring in stored procedures, 202
versions, compatibility, 53
viewing
    databases, 190
    IDL, 269
    properties and methods, 45
    queues, 296
    type libraries, 53
views, MTS Explorer, 77
Visual Analyzer, Visual Studio tools, 33
Visual Basic. See Microsoft Visual Basic
Visual Studio, Enterprise Edition, 32
    IDE debugger, 128
    tools, 32
Virtual Storage Access Method (VSAM)
    advanced client/server technologies, 309
vtable binding, 273. See also binding

W
windows
    Data View, 190, 197
    handling exceptions, 127
    Trace Messages, 131
    Transaction List, 131
    Transaction Statistics, 131
Windows NT. See Microsoft Windows NT
Windows NT event log, debugging tools, 130
Windows NT service, storing object states, 116
Windows SNA Server, advanced client/server technologies, 309
work management
    all-or-nothing, 72
    MTS, 72

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)