Search Results

There are 5048 results for: content related to: Developing Java Web Applications to Access Databases

  1. Developing Java Web Services to Access Databases

    Practical Database Programming with Java

    Ying Bai, Pages: 769–907, 2011

    Published Online : 4 AUG 2011, DOI: 10.1002/9781118104651.ch9

  2. Data Selection Query with Visual Basic.NET

    Practical Database Programming with Visual Basic.NET, Second Edition

    Ying Bai, Pages: 241–416, 2012

    Published Online : 7 MAY 2012, DOI: 10.1002/9781118249833.ch5

  3. Accessing Data in ASP.NET

    Practical Database Programming with Visual C#.NET

    Ying Bai, Pages: 625–720, 2010

    Published Online : 27 APR 2010, DOI: 10.1002/9780470567845.ch8

  4. Accessing Data in ASP.NET

    Practical Database Programming with Visual Basic.NET, Second Edition

    Ying Bai, Pages: 559–656, 2012

    Published Online : 7 MAY 2012, DOI: 10.1002/9781118249833.ch8

  5. Data Selection Query with Visual C#.NET

    Practical Database Programming with Visual C#.NET

    Ying Bai, Pages: 235–438, 2010

    Published Online : 27 APR 2010, DOI: 10.1002/9780470567845.ch5

  6. Data Updating and Deleting with Visual C#.NET

    Practical Database Programming with Visual C#.NET

    Ying Bai, Pages: 551–624, 2010

    Published Online : 27 APR 2010, DOI: 10.1002/9780470567845.ch7

  7. Data Updating and Deleting with Visual Basic.NET

    Practical Database Programming with Visual Basic.NET, Second Edition

    Ying Bai, Pages: 493–558, 2012

    Published Online : 7 MAY 2012, DOI: 10.1002/9781118249833.ch7

  8. Data Inserting with Visual C#.NET

    Practical Database Programming with Visual C#.NET

    Ying Bai, Pages: 439–550, 2010

    Published Online : 27 APR 2010, DOI: 10.1002/9780470567845.ch6

  9. ASP.NET Web Services

    Practical Database Programming with Visual Basic.NET, Second Edition

    Ying Bai, Pages: 657–859, 2012

    Published Online : 7 MAY 2012, DOI: 10.1002/9781118249833.ch9

  10. Query Data from Databases

    Practical Database Programming with Java

    Ying Bai, Pages: 317–461, 2011

    Published Online : 4 AUG 2011, DOI: 10.1002/9781118104651.ch6

  11. Data Inserting with Visual Basic.NET

    Practical Database Programming with Visual Basic.NET, Second Edition

    Ying Bai, Pages: 417–492, 2012

    Published Online : 7 MAY 2012, DOI: 10.1002/9781118249833.ch6

  12. ASP.NET Web Services

    Practical Database Programming with Visual C#.NET

    Ying Bai, Pages: 721–893, 2010

    Published Online : 27 APR 2010, DOI: 10.1002/9780470567845.ch9

  13. Mutual Authentication and Trusted Pathways

    Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

    Markus Jakobsson, Steven Myers, Pages: 309–367, 2006

    Published Online : 18 MAY 2006, DOI: 10.1002/9780470086100.ch9

  14. Using Directory Services

    Mac® Security Bible

    Joe Kissell, Pages: 743–764, 2011

    Published Online : 1 NOV 2011, DOI: 10.1002/9781118257739.ch26

  15. Authenticating a User Session

    Perl and Apache: Your visual blueprint™ for developing dynamic Web content

    Adam McDaniel, Pages: 208–235, 2011

    Published Online : 2 NOV 2011, DOI: 10.1002/9781118257784.ch15

  16. Pattern-based GUI testing: Bridging the gap between design and quality assurance

    Software Testing, Verification and Reliability

    Volume 27, Issue 3, May 2017, Rodrigo M. L. M. Moreira, Ana Cristina Paiva, Miguel Nabuco and Atif Memon

    Version of Record online : 2 MAR 2017, DOI: 10.1002/stvr.1629

  17. What Tools Can I Use to Extend Twitter?

    Twitter Tips, Tricks, and Tweets, 2nd Edition

    Paul McFedries, Pages: 214–247, 2011

    Published Online : 20 OCT 2011, DOI: 10.1002/9781118257791.ch9

  18. Configuring Basic Security Settings

    Mac® Security Bible

    Joe Kissell, Pages: 93–125, 2011

    Published Online : 1 NOV 2011, DOI: 10.1002/9781118257739.ch4

  19. The reliability of user authentication through keystroke dynamics

    Statistica Neerlandica

    Volume 63, Issue 4, November 2009, Pages: 432–449, Salima Douhou and Jan R. Magnus

    Version of Record online : 6 AUG 2009, DOI: 10.1111/j.1467-9574.2009.00434.x

  20. Securing Other Network Services

    Mac® Security Bible

    Joe Kissell, Pages: 825–852, 2011

    Published Online : 1 NOV 2011, DOI: 10.1002/9781118257739.ch31