Solved

Java and database for advanced techniques and issues in general

Posted on 2004-09-24
9
214 Views
Last Modified: 2006-11-17
Hi!

I am looking for books for Java and database with plenty of sample codes. I would like to know a bit advanced techniques and issues in general(such as pool concepts, Data Access Object and sort of Global Unified Data Access ).

Could anybody recommend me excellent books for me that handle those concepts in details ?

Thanks,
0
Comment
Question by:dkim18
9 Comments
 
LVL 14

Assisted Solution

by:sudhakar_koundinya
sudhakar_koundinya earned 20 total points
ID: 12147752
0
 
LVL 15

Accepted Solution

by:
Javatm earned 60 total points
ID: 12147919
> http://www.javaworld.com/javaworld/jw-01-1998/jw-01-bookreview.html

Good review my friend but I think its already oudated since it was from 1998 already.

>  I would like to know a bit advanced techniques and issues in general

Here is a link where you can find good books for advance JDBC :
http://www.javashelf.com/books/jdbc.html

This book is also great which talks about connection pooling and performance :
http://java.sun.com/developer/onlineTraining/Programming/JDCBook/

Here are some advance tutorial that might add help :
http://java.sun.com/developer/Books/JDBCTutorial/
http://java.sun.com/javaone/sessions/slides/TT23/startit.html

Hope that helps . . .
Javatm
0
 
LVL 15

Expert Comment

by:Javatm
ID: 12147930
0
 
LVL 14

Expert Comment

by:sudhakar_koundinya
ID: 12147935
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 14

Expert Comment

by:sudhakar_koundinya
ID: 12147947
>>but I think its already oudated since it was from 1998 already.

I agree. But these books are still good books
0
 
LVL 14

Expert Comment

by:sudhakar_koundinya
ID: 12147959
0
 
LVL 15

Expert Comment

by:Javatm
ID: 12148118
> http://www.javaolympus.com/freebooks/FreeJDBCBooks.jsp

I already provided that link see :

Comment from Javatm
Date: 09/25/2004 05:48AM PHT
0
 
LVL 22

Assisted Solution

by:Helena Marková
Helena Marková earned 20 total points
ID: 12158498
I think that this is also an useful site (the registration is free):
http://marvel.oracle.com/pls/otn/f?p=devtrends:50
0
 

Author Comment

by:dkim18
ID: 12174457
thank you all!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This was posted to the Netbeans forum a Feb, 2010 and I also sent it to Verisign. Who didn't help much in my struggles to get my application signed. ------------------------- Start The idea here is to target your cell phones with the correct…
Basic understanding on "OO- Object Orientation" is needed for designing a logical solution to solve a problem. Basic OOAD is a prerequisite for a coder to ensure that they follow the basic design of OO. This would help developers to understand the b…
Viewers learn how to read error messages and identify possible mistakes that could cause hours of frustration. Coding is as much about debugging your code as it is about writing it. Define Error Message: Line Numbers: Type of Error: Break Down…
This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now