Advanced Database Techniques

In the last chapter, we spent a lot of time looking at the basic structure of the Active Database Component. This was intentional because, while it isn't as complex as many other Microsoft database engines, it's important that you are comfortable with the way that it's used before we go on to look at more complicated techniques. As you've seen, ADO follows the example of earlier database systems in being built around a defined object structure. This means that working with it requires a structured approach, but it brings many benefits.

For example, we've see that there are several different ways of creating a

Recordset
, and directly updating the database. The ADO is very flexible, and a great deal more complicated that any of the other Server Components we looked at in earlier chapters. However, while the techniques we used in the previous chapter are fine for databases such as Microsoft Access, in the real world we often have to connect our Web site to one of the more commercially-oriented systems. This might be Microsoft's SQL Server, Oracle, Sybase, DB2 or any of the other enterprise-based systems.

We also need to investigate some of the more advanced ways that the Active Database Component can be used. Rather than the simple examples you saw in the previous chapter, you'll now see how some real-world problems can be solved. For example, we need to consider how our pages might affect the security of our data, and take steps to protect our database systems. We'll be putting all the techniques you saw in the previous chapter to good use, and combining them to produce examples that more closely resembles the kinds of situation that you are going to meet.

So, in this chapter, we'll be looking at:

© 1997 by Wrox Press. All rights reserved.