Data access object

Results: 120



#Item
41mxProxy  Object Access Control for Python  Veersion

mxProxy Object Access Control for Python Veersion

Add to Reading List

Source URL: www.egenix.com

Language: English - Date: 2014-07-11 03:51:17
42the relational model by E. F. Codd (of IBM) in 1970, allowed database developers to more efficiently link and access related data. This was further superseded through the development of the entity-relationship model (Che

the relational model by E. F. Codd (of IBM) in 1970, allowed database developers to more efficiently link and access related data. This was further superseded through the development of the entity-relationship model (Che

Add to Reading List

Source URL: www.livewiredg.myby.co.uk

Language: English - Date: 2012-08-07 20:14:09
43Technology Showcase Risk modelling throughout an organisation using AgenaRisk Enterprise Edition Once you have developed your risk models the natural next step is to deploy them as part of an enterprise level risk applic

Technology Showcase Risk modelling throughout an organisation using AgenaRisk Enterprise Edition Once you have developed your risk models the natural next step is to deploy them as part of an enterprise level risk applic

Add to Reading List

Source URL: www.agenarisk.com

Language: English - Date: 2010-02-23 15:24:05
44  Microsoft Access is used by millions of businesses worldwide. The widespread appeal is attributable to Create complex databases with-  three key factors:

 Microsoft Access is used by millions of businesses worldwide. The widespread appeal is attributable to Create complex databases with- three key factors:

Add to Reading List

Source URL: www.opengatesw.net

Language: English - Date: 2014-08-25 17:05:55
45Colorado Software Summit: October 23 – 28, 2005  © Copyright 2005, Oracle Corporation High Performance Persistence

Colorado Software Summit: October 23 – 28, 2005 © Copyright 2005, Oracle Corporation High Performance Persistence

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-01-03 04:36:08
46Java Persistence API  This 3-day course covers everything you need to know to begin working with the Java Persistence API in a very short time. It covers all the important concepts necessary to access and update data sto

Java Persistence API This 3-day course covers everything you need to know to begin working with the Java Persistence API in a very short time. It covers all the important concepts necessary to access and update data sto

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-08-06 14:00:35
47Object/Relational Access Layers  Object/Relational Access Layers A Roadmap, Missing Links and More Patterns Wolfgang Keller Liebigstr. 3, 82166 Lochham, Germany

Object/Relational Access Layers Object/Relational Access Layers A Roadmap, Missing Links and More Patterns Wolfgang Keller Liebigstr. 3, 82166 Lochham, Germany

Add to Reading List

Source URL: www.objectarchitects.de

Language: English - Date: 2004-01-03 16:28:56
48Paradigm Regained: Abstraction Mechanisms for Access Control Mark S. Miller Hewlett Packard Laboratories, Johns Hopkins University [removed]

Paradigm Regained: Abstraction Mechanisms for Access Control Mark S. Miller Hewlett Packard Laboratories, Johns Hopkins University [removed]

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
49Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by  Mark Samuel Miller

Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2006-09-01 02:03:44
50ClientAce Help © 2011 Kepware Technologies ClientAce Help  2

ClientAce Help © 2011 Kepware Technologies ClientAce Help 2

Add to Reading List

Source URL: www.kepware.com

Language: English - Date: 2015-02-17 10:50:10