You have three targets for accessing data that’s external to an application: filesystem, network, and database. Chapter 8 introduced you to filesystem-oriented data access, whereas this chapter introduces you to data access via networks and databases.
KeywordsTransmission Control Protocol Authentication Scheme Port Number User Datagram Protocol Internet Protocol Address
Unable to display preview. Download preview PDF.