Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defensive Database Programming with SQL Server

Buy

Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as developers, we stop work as soon as our code passes a few basic tests to confirm that it produces the 'right result' in a given use case. We do not stop to consider what other possible ways in which the code might be used in the future, or how our code will respond to common changes to the database environment, such as a change in the database language setting, or a change to the nullability of a table column, and so on. In the short-term, this approach is attractive; we get things done faster. However, if our code is designed to be used for more than just a few months, then it is very likely that such changes can and will occur, and the inevitable result is broken code or, even worse, code that silently starts to behave differently, or produce different results. When this happens, the integrity of our data is threatened, as is the validity of the reports on which critical business decisions are often based. At this point, months or years later, and long after the original developer has left, begins the painstaking process of troubleshooting and fixing the problem. Would it not be easier to prevent all this troubleshooting from happening? Would it not be better to spend a little more time and effort during original development, to save considerably more time on troubleshooting, bug fixing, retesting, and redeploying? This is what defensive programming is all about: we learn what can go wrong with our code, and we proactively apply this knowledge during development. This book is filled with practical, realistic examples of the sorts of problems that beset database programs, including:

- Changes in database objects, such as tables, constraints, columns, and stored procedures.

- Changes to concurrency and isolation levels.

- Upgrades to new versions of SQL Server.

- Changes in requirements.

- Code reuse.

- Problems causing loss of data integrity.

- Problems with error handling in T-SQL.

In each case, it demonstrates approaches that will help you understand and enforce (or eliminate) the assumptions on which your solution is based, and to improve its robustness. Ultimately, the book teaches you how to think and develop defensively, and how to proactively identify and eliminate potential vulnerabilities in T-SQL code.

(HTML tags aren't allowed.)

PHP Programming with MySQL (The Web Technologies Series)
PHP Programming with MySQL (The Web Technologies Series)

PHP: Hypertext Preprocessor, or PHP, is an open source programming language that is used for developing interactive Web sites. More specifi cally, PHP is a scripting language that is executed from a Web server. Created in 1995, PHP is one of the fastest-growing programming languages today. Th e TIOBE Programming Community Index1...

Three-Dimensional Free-Radical Polymerization: Cross-Linked and Hyper-Branched Polymers
Three-Dimensional Free-Radical Polymerization: Cross-Linked and Hyper-Branched Polymers
The book discusses the latest developments in the entire field of three-dimensional free-radical polymerization, the scientific and practical aspects thereof, as well as the achievements, problems, methods used in the field, and modern development trends. The monograph is comprised of nine chapters and provides 747 references.

The book is...

Fuzzy XML Data Management (Studies in Fuzziness and Soft Computing)
Fuzzy XML Data Management (Studies in Fuzziness and Soft Computing)

This book presents an exhaustive and timely review of key research work on fuzzy XML data management, and provides readers with a comprehensive resource on the state-of-the art tools and theories in this fast growing area.  Topics covered in the book include: representation of fuzzy XML, query of fuzzy XML, fuzzy database models,...


Publishing a Blog with Blogger : Visual QuickProject Guide
Publishing a Blog with Blogger : Visual QuickProject Guide

Writing in a journal is all well and good, but when you're ready to share your musings with the world (and you think the world is ready to receive them!), a blog is the way to go. As the latest phenomenon to grow out of the Web, the blog (or Web log) is a diary...

Lie Groups for Pedestrians
Lie Groups for Pedestrians

According to the author of this concise, high-level study, physicists often shy away from group theory, perhaps because they are unsure of which parts of the subject belong to the physicist and which belong to the mathematician. However, it is possible for physicists to understand and use many techniques which have a group theoretical basis...

Dirty Little Secrets of World War II: Military Information No One Told You...
Dirty Little Secrets of World War II: Military Information No One Told You...

Dirty Little Secrets of World War II exposes the dark, irreverent, misunderstood, and often tragicomic aspects of military operations during World War II, many of them virtually unknown even to military buffs. Like its successful predecessor, Dirty Little Secrets, Dunnigan and Nofi's new book vividly brings to life all...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy