Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Microsoft Access 2000 (Microsoft Programming Series)

Buy

This book is for database developers who want to use Microsoft Access 2000 to build custom applications. It covers the features that make Access a perennial favorite with developers, as well as the innovations in Access 2000 that you are most likely to use in your programming projects. Numerous programming samples demonstrate the core development techniques and rapid application development tools. The sample designs have been kept simple so you can easily adapt them for your custom applications or apply the techniques in your development work. The book's companion CD contains all the samples in the book as well as many others.

Access is a popular development platform in large measure because it is part of the Microsoft Office suite. Many clients want their Access systems to interoperate with the rest of Office, and they want systems that are transparent and easy to maintain without developer assistance. The techniques described in this book will help you meet these expectations. (For additional support, you can consult two Microsoft World Wide Web sites: www.microsoft.com/office/, which covers Access capabilities in general, and www.microsoft.com/officedev/, which covers the product's developer features.)

This book was written to meet the needs of a variety of readers. Longtime Access developers will find the essential information on the advances introduced in Access 2000. Another target readership is developers who primarily use non-Microsoft technologies, such as dBASE or Paradox. They know all of the development concepts, but they do not necessarily know how to implement those concepts with Access. Finally, this book is for highly motivated power users who want to graduate to developing solutions for others and want to ramp up quickly.

The book's presentation style has the aim of making you productive as a developer, and productive in using the new features in Access 2000. The presentation style is look, see, do! The many code samples throughout the book illustrate concepts that you can readily put to use in your applications. Think of them as recipes for performing specific development tasks. Try them "as is" from the book's CD. Then, modify them to work with your data and in the context of your custom application requirements. The samples are purposefully uncomplicated, easy to understand, and easy to reuse, so that you will be motivated to apply them in your own applications.

(HTML tags aren't allowed.)

Usability Testing of Medical Devices
Usability Testing of Medical Devices

To paraphrase a popular saying, usability testing should be done early and often. However, it doesn’t have to be an onerous process. Informative, practical, and engaging, Usability Testing of Medical Devices provides a simple, easy to implement general understanding of usability testing. It offers a general...

Application Administrators Handbook: Installing, Updating and Troubleshooting Software
Application Administrators Handbook: Installing, Updating and Troubleshooting Software

An application administrator installs, updates, optimizes, debugs and otherwise maintains computer applications for an organization. In most cases, these applications have been licensed from a third party, but they may have been developed internally. Examples of application types include enterprise resource planning (ERP), customer resource...

Lossless Compression Handbook (Communications, Networking and Multimedia)
Lossless Compression Handbook (Communications, Networking and Multimedia)
Compression schemes can be divided into two major classes: lossless compression schemes and lossy compression schemes. Data compressed using lossless compression schemes can be recovered exactly, while lossy compression introduces some loss of information in the reconstruction.

While the first modern compression scheme, Huffman coding,
...

Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
Java in the Large
Java in the Large
The previous unit described the 'small' programming structures that languages such as Java offer. We have been concerned largely with how we store and operate on data, and how methods achieve their purposes. In this unit, we aim to show that Java is truly an object-oriented language. Object-oriented languages provide better...
Seismic Imaging and Inversion: Volume 1: Application of Linear Inverse Theory
Seismic Imaging and Inversion: Volume 1: Application of Linear Inverse Theory

Extracting information from seismic data requires knowledge of seismic wave propagation and reflection. The commonly used method involves solving linearly for a reflectivity at every point within the Earth, but this book follows an alternative approach which invokes inverse scattering theory. By developing the theory of seismic imaging from...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy