Considering Data Access Strategies
At this point in the process of covering the topic of database design, we have designed and imple-mented the database, devised effective security and indexing strategies, and taken care of all of the other bits and pieces that go along with these tasks. The next logical step is to decide on the data-access strategy and how best to implement and distribute data-centric business logic (of course, in reality, design is not really a linear process, as performance tuning and indexing require a test plan, and this usually requires that some form of UI has been created to get an idea of how the data is going to be accessed).
KeywordsPerformance Tuning Query Processor Injection Attack Client Code Single Quote
Unable to display preview. Download preview PDF.