Author(s): Alison Balter
Year: Sep 2003
File type: CHM
Size (for download): 12.4 MB
In just 24 lessons of one hour or less, you will be able to work with and design your own Access databases. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Access 2003 and all its components from the ground up.
Access is a very fun and exciting database tool to work with. With the keys to deliver all that it offers, you can produce databases that provide much satisfaction and solve important business problems. After you complete this hands-on guide, you, too, can become masterful at this very powerful database tool. This book is dedicated to demonstrating how you can fulfill the promise of making Access 2003 perform up to its lofty capabilities. As you will see, you have the ability to really make Access 2003 shine in the everyday world!
This book is divided into five parts. Part I is "Introduction to Relational Databases and Access 2003." As its name implies, this part is an overview to both relational databases and Access. In this part you'll learn the types of tasks you can perform in Access. The hours in Part II, "Working with Existing Databases and Objects," are designed to provide you with all the skills necessary to work with existing databases, tables, queries, forms, and reports.Part III, "Creating Your Own Database and Objects," is for those of you who are ready to roll up your sleeves and get involved in the design of database objects. Part IV, "Power Access Techniques," is for those of you who are power users or wish to get started as developers. Part V, "Advanced Topics," includes several important additional topics. This part begins by showing you how you can share Access data with other applications, such as MS Excel. You'll then learn how Access integrates with the Internet.
TABLE OF CONTENT:
Hour 01 - Relational Databases and Access 2003 Introduced
Hour 02 - Tables Introduced
Hour 03 - Queries Introduced
Hour 04 - Forms Introduced
Hour 05 - Reports Introduced
Hour 06 - Using Wizards to Create a Database
Hour 07 - Designing Databases
Hour 08 - Creating Tables
Hour 09 - Creating Relationships
Hour 10 - Creating Queries
Hour 11 - Creating Forms
Hour 12 - Creating Reports
Hour 13 - Creating Macros
Hour 14 - Power Table Techniques
Hour 15 - Power Query Techniques
Hour 16 - Power Form Techniques
Hour 17 - Power Report Techniques
Hour 18 - Sharing Data with Other Applications
Hour 19 - Access and the Internet
Hour 20 - Database Administration
Hour 21 - Database Documentation
Hour 22 - Security Introduced
Hour 23 - VBA Introduced
Hour 24 - Finishing Touches
Look to this innovative resource for the most comprehensive coverage of software fault tolerance techniques available in a single volume. It offers you a thorough understanding of the operation of critical software fault tolerance techniques and guides you through their design, operation and performance. You get an in-depth discussion on the advantages and disadvantages of specific techniques, so you can decide which ones are best suited for your work. The book examines key programming technique.
Look to this innovative resource for the most comprehensive coverage of software fault tolerance techniques available in a single volume. It offers you a thorough understanding of the operation of critical software fault tolerance techniques and guides you through their design, operation and performance. You get an in-depth discussion on the advantages and disadvantages of specific techniques, so you can decide which ones are best suited for your work. The book examines key programming techniques such as assertions, checkpointing, and atomic actions, and provides design tips and models to assist in the development of critical fault tolerant software that helps ensure dependable performance. From software reliability, recovery, and redundancy... to design and data diverse software fault tolerance techniques, this practical reference provides detailed insight into techniques that can improve the overall dependability of your software.
Hacking GMail (ExtremeTech)
The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog