Flylib.com
Oracle PL/SQL Programming: Guide to Oracle8i Features
Oracle PL/SQL Programming: Guide to Oracle8i Features
ISBN: B000H2MK2W
EAN: N/A
Year: 1998
Pages: 107
Authors:
Steven Feuerstein
BUY ON AMAZON
Main
TOC
Copyright
Dedication
Preface
Structure of This Book
About the Examples
About the Disk
Conventions Used in This Book
How to Contact Us
Acknowledgments
Chapter 1. Oracle8i: A Bounty for PLSQL Developers
1.1 What s in Oracle8i Release 8.1?
1.2 And Then There s Java
1.3 New PLSQL Features Roundup
Chapter 2. Choose Your Transaction
2.1 Transaction Management in PLSQL
2.2 Defining Autonomous Transactions
2.3 When to Use Autonomous Transactions
2.4 Rules and Restrictions
2.5 Examples
Chapter 3. Invoker Rights: Your Schema or Mine?
3.1 A Look at the Definer Rights Model
3.2 The Invoker Rights Model
Invoker Rights for Dynamic SQLH2 P classdoc
3.4 Combining the Definer and Invoker Rights Models
Chapter 4. Native Dynamic SQL in Oracle8i
4.1 DBMS_SQL Versus NDS
4.2 NDS Statement Summary
4.3 Multirow Queries with Cursor Variables
4.4 Binding Variables
4.5 Working with Objects and Collections
4.6 Building Applications with NDS
4.7 NDS Utility Package
Chapter 5. Bulking Up with PLSQL 8.1
5.1 Context-Switching Problem Scenarios
5.2 Bulk DML with the FORALL Statement
5.3 Bulk Querying with the BULK COLLECT Clause
5.4 Using Cursor Attributes
5.5 Analyzing the Impact of Bulk Operations
Chapter 6. New Trigger Features in Oracle8i
6.1 Triggers on Nested Table View Columns
6.2 Database-Level Event Triggers
6.3 Schema-Level Event Triggers
Chapter 7. New and Enhanced Built-in Packages in Oracle8i
7.1 DBMS_PROFILER: Providing Code Profiling
7.2 DBMS_TRACE: Providing a PLSQL Trace Facility
7.3 DBMS_RLS: Implementing Fine-Grained Access Control
7.4 UTL_COLL: Using Collection Locators
7.5 LOB Enhancements
7.6 New DBMS_AQ and DBMS_AQADM Features
7.7 New DBMS_UTILITY Features
Chapter 8. Deploying Fine-Grained Access Control
8.1 FGAC Components
8.2 CREATE CONTEXT: Creating Contexts
8.3 SET_CONTEXT: Setting Context and Attribute Values
8.4 SYS_CONTEXT and LIST_CONTEXT: Obtaining Context Information
8.5 A Complete FGAC Example
Chapter 9. Calling Java from PLSQL
9.1 Oracle8i and Java
9.2 Getting Ready to Use Java in Oracle
9.3 A Simple Demonstration
9.4 Using loadjava
9.5 Using dropjava
9.6 Managing Java in the Database
9.7 Using DBMS_JAVA and DBMS_JAVA_TEST
9.8 Publishing and Using Java in PLSQL
9.9 Examples
Chapter 10. More Goodies for Oracle8i PLSQL Developers
10.1 The NOCOPY Parameter Mode Hint
10.2 Calling Packaged Functions in SQL
10.3 SQL99 Compliance
10.4 SQL Operations on Collections
10.5 Miscellaneous and Minor Improvements
Appendix A. Appendix: What s on the Companion Disk?
A.1 Installing the Reference
A.2 Using the Reference
Colophon
INDEX
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Oracle PL/SQL Programming: Guide to Oracle8i Features
ISBN: B000H2MK2W
EAN: N/A
Year: 1998
Pages: 107
Authors:
Steven Feuerstein
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Context Management of ERP Processes in Virtual Communities
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
A Hybrid Clustering Technique to Improve Patient Data Quality
Development of Interactive Web Sites to Enhance Police/Community Relations
Cisco IOS Cookbook (Cookbooks (OReilly))
EIGRP Stub Routing
Redistributing Static Routes into OSPF
Logging OSPF Adjacency Changes
Configuring Serial Interfaces
QoS over MPLS
Special Edition Using Crystal Reports 10
Introducing the Crystal Reports Designer
Using Parameters with Record Selections
Creating Crystal Analysis Reports
Differences with the Java Reporting Engine
Using Crystal Enterprise Notifications
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 42. Secure Your Linux Network with WPA
Hack 71. Wall Off Your Wireless
Hack 72. Run Your Mac as an Access Point
Section A.1. 802.11: The Mother of All IEEE Wireless Ethernet
Appendix B. Wireless Hardware Guide
Quantitative Methods in Project Management
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Special Topics in Quantitative Management
Programming .Net Windows Applications
Dialog Boxes
Button Classes
ScrollBar
ListControls
Configuration and Deployment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies