Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
42301por Dhanasekaran, Chandra MohanTabla de Contenidos: “…-- Features of Terraform -- Cloud/Vendor Agnostic -- A Pioneer in IaC -- Wide Partner Integration -- Declarative -- Idempotent -- Easy Learning Curve -- Version Controlled -- Automation -- Documentation -- Community Support -- Licensing Change from Version 1.5.5 (Aug 2023) -- Summary…”
Publicado 2024
Libro electrónico -
42302por Gouigoux, Jean-PhilippeTabla de Contenidos: “…-- Additional characteristics of a BRMS -- Actual use of BRMS -- Examples of a BRMS -- The DMN standard -- The origin and principle of DMN -- Implementations -- An example of DMN use -- Calling the business rule runtime -- Summary -- Chapter 13: Externalization of Authorization -- A BRMS and authorization management -- The semantics of identity and authorization management -- A digression on IAM implementation -- Role-based access control and attribute-based access control models -- The XACML approach -- A digression on the granularity of microservices…”
Publicado 2024
Libro electrónico -
42303Publicado 2018Tabla de Contenidos: “…8.2.1 Theft or Abuse of Network Assets 206 -- 8.2.2 Theft of Service 206 -- 8.2.3 Theft of IPTV-Related Data 208 -- 8.2.4 Disruption of Service 208 -- 8.2.5 Privacy Breach 209 -- 8.2.6 Compromise of Platform Integrity 209 -- 8.3 Security Issues of IPTV Delivery Networks 209 -- 8.3.1 Protocols Vulnerabilities 214 -- 8.3.1.1 IGMP 215 -- 8.3.1.2 PIM 215 -- 8.3.1.3 MBGP 216 -- 8.3.1.4 MSDP 217 -- 8.3.1.5 RTP and RTP Control Protocol (RTCP) 218 -- 8.4 Countering theThreats 219 -- 8.5 Open Research Issues 221 -- 8.6 Conclusions 222 -- References 222 -- 9 Anomaly Detection and Big Data in IPTV Networks 225 /Mohiuddin Ahmed andMd. …”
Libro electrónico -
42304Publicado 2018Tabla de Contenidos: “…3.9 The Future 78 -- 4 Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control 81 /Zbigniew Kalbarczyk -- 4.1 Introduction 82 -- 4.2 Vision: Using Cloud Technology in Missions 83 -- 4.3 State of the Art 84 -- 4.4 Dynamic VM Monitoring Using Hypervisor Probes 85 -- 4.4.1 Design 86 -- 4.4.2 Prototype Implementation 88 -- 4.4.3 Example Detectors 90 -- 4.4.3.1 Emergency Exploit Detector 90 -- 4.4.3.2 Application Heartbeat Detector 91 -- 4.4.4 Performance 93 -- 4.4.4.1 Microbenchmarks 93 -- 4.4.4.2 Detector Performance 94 -- 4.4.5 Summary 95 -- 4.5 Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring 96 -- 4.5.1 Hypervisor Introspection 97 -- 4.5.1.1 VMI Monitor 97 -- 4.5.1.2 VM Suspend Side-Channel 97 -- 4.5.1.3 Limitations of Hypervisor Introspection 98 -- 4.5.2 Evading VMI with Hypervisor Introspection 98 -- 4.5.2.1 Insider Attack Model and Assumptions 98 -- 4.5.2.2 Large File Transfer 99 -- 4.5.3 Defenses against Hypervisor Introspection 101 -- 4.5.3.1 Introducing Noise to VM Clocks 101 -- 4.5.3.2 Scheduler-Based Defenses 101 -- 4.5.3.3 Randomized Monitoring Interval 102 -- 4.5.4 Summary 103 -- 4.6 Identifying Compromised Users in Shared Computing Infrastructures 103 -- 4.6.1 Target System and Security Data 104 -- 4.6.1.1 Data and Alerts 105 -- 4.6.1.2 Automating the Analysis of Alerts 106 -- 4.6.2 Overview of the Data 107 -- 4.6.3 Approach 109 -- 4.6.3.1 The Model: Bayesian Network 109 -- 4.6.3.2 Training of the Bayesian Network 110 -- 4.6.4 Analysis of the Incidents 112 -- 4.6.4.1 Sample Incident 112 -- 4.6.4.2 Discussion 113 -- 4.6.5 Supporting Decisions with the Bayesian Network Approach 114 -- 4.6.5.1 Analysis of the Incidents 114 -- 4.6.5.2 Analysis of the Borderline Cases 116 -- 4.6.6 Conclusion 118 -- 4.7 Integrating Attribute-Based Policies into Role-Based Access Control 118 -- 4.7.1 Framework Description 119 -- 4.7.2 Aboveground Level: Tables 119 -- 4.7.2.1 Environment 120.…”
Libro electrónico -
42305por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Exemples d'organes de contrô le indépendants spécialisés dans la liberté d'accès à l'... -- Encadré 12. …”
Publicado 2002
Libro electrónico -
42306Publicado 2010Tabla de Contenidos: “….) -- FIGURA 4.15 SEÑALES DE CONTROL Y SEÑAL (...) -- FIGURA 4.16 INVERSOR DE CINCO NIVELES, (...) -- FIGURA 4.17 INVERSOR DE CINCO NIVELES, (...) -- FIGURA 4.18 INVERSOR DE TRES NIVELES, (...) -- FIGURA 4.19 INVERSOR DE TRES NIVELES (...) -- FIGURA 4.20 INVERSOR DE TRES NIVELES (...) -- FIGURA 4.21 INVERSOR DE TRES NIVELES (...) -- FIGURA 4.22 INVERSOR DE TRES NIVELES (...) -- FIGURA 4.23 SEÑALES DE CONTROL DEL INVERSOR (...) -- FIGURA 4.24 INVERSOR DE CINCO NIVELES, (...) -- FIGURA 4.25 PRINCIPIO DE LA MODULACIÓN (...) -- FIGURA 4.26 FORMA DE ONDA PWM QUE SE OBTIENE (...) -- FIGURA 4.27 FORMAS DE ONDA DE VOLTAJE PARA (...) -- FIGURA 4.28 VALOR RMS DEL VOLTAJE FUNDAMENTAL (...) -- FIGURA 4.29. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
42307por Agutter, ClaireTabla de Contenidos: “…-- 3.4.4 How is access to shared data, information and tools controlled? -- 3.4.5 Who is responsible for process improvement? …”
Publicado 2021
Libro electrónico -
42308Publicado 2022Tabla de Contenidos: “…10.3.5 Single‐Switch Phase Shifter -- 10.4 Supplementary Problems -- References -- Chapter 11 Oscillators -- 11.1 Introduction -- 11.2 Criteria for Oscillation in a Feedback Circuit -- 11.3 RF (Transistor) Oscillators -- 11.3.1 Colpitts Oscillator -- 11.3.2 Hartley Oscillator -- 11.3.3 Clapp-Gouriet Oscillator -- 11.4 Voltage‐Controlled Oscillator -- 11.5 Crystal‐Controlled Oscillators -- 11.5.1 Crystals -- 11.5.2 Crystal‐Controlled Oscillators -- 11.6 Frequency Synthesizers -- 11.6.1 The Phase‐Locked Loop -- 11.6.1.1 Principle of a Phase‐Locked Loop -- 11.6.1.2 Main Components of a Phase‐Locked Loop -- 11.6.1.3 Gain of Phase‐Locked Loop -- 11.6.1.4 Transient Analysis of a Phase‐Locked Loop -- 11.6.2 Indirect Frequency Synthesizer Circuits -- 11.7 Microwave Oscillators -- 11.7.1 Dielectric Resonator Oscillator -- 11.7.2 Delay‐Line Stabilized Microwave Oscillators -- 11.7.3 Diode Oscillators -- 11.7.3.1 Gunn Diode Oscillator -- 11.7.3.2 IMPATT Diode Oscillator -- 11.8 Oscillator Noise -- 11.9 Measurement of Oscillator Noise -- 11.10 Supplementary Problems -- References -- Chapter 12 RF and Microwave Antennas -- 12.1 Introduction -- 12.2 Antenna Parameters -- 12.3 Spherical Polar Coordinates -- 12.4 Radiation from a Hertzian Dipole -- 12.4.1 Basic Principles -- 12.4.2 Gain of a Hertzian Dipole -- 12.5 Radiation from a Half‐Wave Dipole -- 12.5.1 Basic Principles -- 12.5.2 Gain of a Half‐Wave Dipole -- 12.5.3 Summary of the Properties of a Half‐Wave Dipole -- 12.6 Antenna Arrays -- 12.7 Mutual Impedance -- 12.8 Arrays Containing Parasitic Elements -- 12.9 Yagi-Uda Antenna -- 12.10 Log‐Periodic Array -- 12.11 Loop Antenna -- 12.12 Planar Antennas -- 12.12.1 Linearly Polarized A linearly polarized antenna is one where the direction of the radiated electric field remains fixed as the wave propagates. …”
Libro electrónico -
42309por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Le système d'intégrité publique définit, soutient, contrôle et fait respecter l'intégrité publique et est inscrit dans le cadre plus général de la gestion et de la gouvernance publiques -- 1.2.2. …”
Publicado 2020
Libro electrónico -
42310por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Progrès réalisés dans les pays du point de vue des recommandations visant à réduire les contrôles opérationnels et les contrôles à l'entrée1 -- Tableau 2.2. …”
Publicado 2010
Libro electrónico -
42311Publicado 2017Tabla de Contenidos: “…L.1 Introduction -- L.2 Elements of Indexing -- L.2.1 Approach Terms -- L.2.2 Term Order -- L.2.3 Controlled Vocabulary -- L.2.4 Arrangement of Entries -- L.3 Types of Indexing -- L.3.1 Assigned Indexing -- L.3.1.1 Pre-coordinate Indexing -- L.3.1.2 Post-coordinate Indexing -- L.3.1.3 Difference -- L.3.2 Derived Indexing -- L.4 Graphic Representation -- L.5 Automatic Indexing -- L.5.1 Comparative Advantages/Disadvantages -- L.6 Selection -- References -- M Assigned Indexing -- M.1 Introduction -- M.2 Chain Indexing (CI) -- M.2.1 Breaking of Class Number -- M.2.2 Indication of Links -- M.2.3 Backward Rendering -- M.2.4 Cross-References -- M.2.4.1 Coates's Modification -- M.2.5 Filing -- M.2.6 Modified CI -- M.2.6.1 Job's Modification -- M.2.7 Advantages of CI -- M.2.8 Disadvantages of CI -- M.3 PRECIS -- M.3.1 Format and Structure -- M.3.1.1 Primary Notions -- M.3.1.2 Approach Term -- M.3.1.3 Three-Part Format -- M.3.2 Generation of Entries -- M.3.3 Role Operators -- M.3.4 Codes -- M.3.5 String Making -- M.3.6 Final Entries -- M.3.7 Advantages of PRECIS -- M.3.8 Disadvantages of PRECIS -- M.4 POPSI -- M.4.1 Basis of POPSI -- M.4.2 Different Versions -- M.4.3 Subject-Proposition -- M.4.4 Syntactical Structure -- M.4.5 Indexing Steps -- M.4.6 Advantages of POPSI -- M.4.7 Disadvantages of POPSI -- M.5 Uniterm Indexing -- M.5.1 Uniterms -- M.5.2 Indexing Process -- M.5.3 Searching Process -- M.5.4 Advantages of UNITERM -- M.5.5 Disadvantages of UNITERM -- M.5.6 Solutions -- References -- N Derived Indexing -- N.1 Introduction -- N.2 KWIC -- N.2.1 Indexing Process -- N.2.2 Format and Structure -- N.2.3 Advantages of KWIC -- N.2.4 Disadvantages of KWIC -- N.2.5 Variants of KWIC -- N.3 Citation Indexing -- N.3.1 Underlying Principles -- N.3.2 Genesis of Citation Index -- N.3.3 Definition of Citation Index -- N.3.4 Characteristics of Citation Index…”
Libro electrónico -
42312Publicado 2017Tabla de Contenidos: “…Front Cover -- Lossless Information Hiding in Images -- Lossless InformationHiding in Images -- Copyright -- Contents -- Preface -- 1 - Introduction -- 1.1 BACKGROUND -- 1.1.1 DEFINITION OF IMAGES -- 1.1.1.1 Images -- 1.1.1.2 Digital Images -- 1.1.2 IMAGE PROCESSING AND IMAGE ANALYSIS -- 1.1.2.1 Image Processing in a Broad Sense -- 1.1.2.2 Image Processing in a Narrow Sense -- 1.1.2.2.1 Image Enhancement -- 1.1.2.2.2 Image Restoration -- 1.1.2.2.3 Image Compression -- 1.1.2.3 Image Analysis -- 1.1.3 NETWORK INFORMATION SECURITY -- 1.1.4 IMAGE PROTECTION AND IMAGE AUTHENTICATION -- 1.1.4.1 Image Protection -- 1.1.4.2 Image Authentication -- 1.2 OVERVIEW OF INFORMATION HIDING -- 1.2.1 BASIC CONCEPTS RELATED TO INFORMATION HIDING -- 1.2.2 PROPERTIES AND REQUIREMENTS OF INFORMATION HIDING -- 1.2.3 INFORMATION HIDING MODELS -- 1.2.3.1 Prisoner's Model -- 1.2.3.2 General Model -- 1.2.3.3 Communication-Based Models -- 1.2.4 RESEARCH BRANCHES OF INFORMATION HIDING -- 1.2.4.1 Steganography -- 1.2.4.2 Copyright Marking -- 1.2.4.3 Covert Channel -- 1.2.4.4 Subliminal Channel -- 1.2.4.5 Anonymous Communication -- 1.2.5 CLASSIFICATION OF INFORMATION HIDING TECHNOLOGIES -- 1.2.5.1 Classification According to the Types of Cover Objects -- 1.2.5.2 Classification According to the Symmetry of Keys -- 1.2.5.3 Classification According to the Embedding Domains -- 1.2.5.4 Classification Based on Other Ways -- 1.2.6 APPLICATIONS OF INFORMATION HIDING TECHNIQUES -- 1.2.6.1 Covert Communication -- 1.2.6.2 Broadcast Monitoring -- 1.2.6.3 Owner Identification -- 1.2.6.4 Ownership Verification -- 1.2.6.5 Transaction Tracking -- 1.2.6.6 Content Authentication -- 1.2.6.7 Annotation -- 1.2.6.8 Copy Control -- 1.2.6.9 Device Control -- 1.3 OVERVIEW OF IMAGE CODING AND COMPRESSION TECHNIQUES -- 1.3.1 SOURCE CODING AND DATA COMPRESSION -- 1.3.2 LOSSLESS IMAGE CODING TECHNIQUES…”
Libro electrónico -
42313Publicado 2016Tabla de Contenidos: “…9.9.2 Comments on the Producer-Consumer Paradigm -- 9.9.3 Examples: Stopping the Producer-Consumer Operation -- Several Producers: TQueue1.C -- Several Consumers: TQueue2.C -- 9.10 Reader-Writer Locks -- 9.10.1 Pthreads RWMUTEX -- 9.10.2 Windows Slim Reader-Writer Locks -- 9.10.3 TBB Reader-Writer Locks -- 9.11 RWlock Class -- 9.11.1 Example: Emulating a Database Search -- 9.11.2 Example: Accessing a Shared Container -- Writer threads -- Reader threads -- 9.11.3 Comment on Memory Operations -- 9.12 General Overview of Thread Pools -- Chapter 10: OpenMP -- 10.1 Basic Execution Model -- 10.2 Configuring OpenMP -- Controlling program execution -- Controlling parallel regions -- Controlling the automatic parallelization of loops -- 10.3 Thread Management and Work-Sharing Directives -- 10.3.1 Parallel Directive -- Functional parallel clauses: -- 10.3.2 Master and Single Directives -- 10.3.3 Sections and Section Work-Sharing Directives -- 10.3.4 FOR WORK SHARING DIRECTIVE -- 10.3.5 Task Directive -- 10.3.6 Data-Sharing Attributes Clauses -- Comments on data-sharing clauses -- 10.4 Synchronization Directives -- 10.4.1 Critical Directive -- Critical sections can be named -- Named critical sections versus mutex locking -- 10.5 Examples of Parallel and Work-Sharing Constructs -- 10.5.1 Different Styles of Parallel Constructs -- Adding directives to the listing above -- A version using parallel for -- Yet another version of the Monte-Carlo code -- 10.5.2 Checking ICVs and Tracking Thread Activity -- Checking ICVs -- Tracking the mapping of tasks to threads -- 10.5.3 Parallel Section Examples -- Behavior of the barrier directive -- Dispatching a I/O operation -- Data transfers among tasks -- 10.6 Task API -- 10.6.1 Motivations for a Task-Centric Execution Model -- 10.6.2 Event Synchronizations and Explicit Tasks -- 10.6.3 Task Directive and Clauses…”
Libro electrónico -
42314Publicado 2003Tabla de Contenidos: “…. -- 4.5 ODBC considerations -- 4.5.1 JDBC considerations -- 4.6 Systems-managed access-path protection (SMAPP) considerations -- 4.7 Query/400 -- 4.8 System values -- 4.9 Network attribute considerations -- 4.9.1 Alert Filters (ALRFTR) -- 4.9.2 Message Queue (MSGQ) -- 4.9.3 Distributed Data Management Access (DDMACC) -- 4.9.4 PC Support Access (PCSACC) -- 4.10 Journaling considerations -- 4.10.1 Journaling boundaries -- 4.10.2 Journaling with user-defined file system (UDFS) and library-capable independent disk pools -- 4.10.3 Journaling and disk pool groups -- 4.11 Subsystem considerations -- 4.12 DRDA considerations -- 4.13 Commitment control considerations -- 4.13.1 Commitment definitions -- 4.13.2 Considerations for XA transactions -- 4.13.3 Commitment control recommendations -- 4.14 Exit programs -- 4.15 System libraries -- 4.16 System ASP and all basic user ASPs (*SYSBAS) -- 4.17 Other system considerations -- Chapter 5. …”
Libro electrónico -
42315por Gavin, LeeTabla de Contenidos: “…Installation and verification -- 3.1 Setting up a standalone development system -- 3.2 Installing base required software -- 3.3 Installing MDAC Version 2.7 SP1 -- 3.4 Installing IBM Agent Controller -- 3.5 Installing WebSphere Business Integration Message Broker -- 3.5.1 Installation -- 3.5.2 Registering the purchased licenses -- 3.6 Create the default configuration -- 3.6.1 Using the Getting Started Wizard -- 3.6.2 Using a sample application -- Chapter 4. …”
Publicado 2004
Libro electrónico -
42316Publicado 2016Tabla de Contenidos: “…-- 6.7.1 Overall Design Structure -- 6.7.2 Controller -- 6.7.3 Data Path -- 6.8 Summary -- Part 2: Introduction to FPGA Applications -- Chapter 7: High Speed Video Application -- 7.1 Introduction -- 7.2 The Camera Link Interface -- 7.2.1 Hardware Interface -- 7.2.2 Data Rates -- 7.2.3 The Bayer Pattern -- 7.2.4 Memory Requirements -- 7.3 Getting Started -- 7.4 Specifying the Interfaces -- 7.5 Defining the Top Level Design -- 7.6 System Block Definitions and Interfaces -- 7.6.1 Overall System Decomposition -- 7.6.2 Mouse and Keyboard Interfaces -- 7.6.3 Memory Interface -- 7.6.4 The Display Interface: VGA -- 7.7 The Camera Link Interface -- 7.8 The PC Interface -- 7.9 Summary…”
Libro electrónico -
42317Publicado 2018Tabla de Contenidos: “…2.2.1 Radio Cell and Wave Propagation -- 2.2.2 Propagation Effects and Parameters -- 2.2.3 Network Planning Requirements: Dimensioning -- 2.3 Radio Network Pre-planning -- 2.3.1 Site Survey and Site Selection -- 2.3.2 Result of Site Survey Process -- 2.4 Radio Network Detailed Planning -- 2.4.1 Link Budget -- 2.4.2 Frequency Hopping -- 2.4.3 Equipment Enhancements -- 2.4.4 Cell and Network Coverage -- 2.4.5 Capacity Planning -- 2.4.6 Spectrum Efficiency and Frequency Planning -- 2.4.7 Power Control -- 2.4.8 Handover -- 2.4.9 Discontinuous Transmission -- 2.4.10 Frequency Hopping -- 2.4.11 Parameter Planning -- 2.5 Basics of Radio Network Optimisation -- 2.5.1 Key Performance Indicators -- 2.5.2 Network Performance Monitoring -- 2.5.3 Network Performance Assessment -- 2.6 GPRS Network Planning and Optimisation -- 2.6.1 GPRS System -- 2.6.2 Interfaces in a GPRS Network -- 2.6.3 Protocol Structure in a GPRS Network -- 2.7 Network Planning in a GPRS Network -- 2.7.1 GPRS Radio Network Planning -- 2.7.2 Mobility and Radio Resource Management -- 2.7.3 Power Control -- 2.7.4 Concept of Temporary Block Flow -- 2.8 GPRS Detailed Radio Network Planning -- 2.8.1 Coverage Planning -- 2.8.2 Capacity Planning -- 2.8.3 Frequency Planning -- 2.8.4 Parameter Planning -- 2.9 GPRS Radio Network Optimisation -- 2.10 EDGE Network Planning and Optimisation -- 2.10.1 EGPRS and ECSD -- 2.10.2 EDGE System -- 2.11 EDGE Radio Network Planning Process -- 2.11.1 EDGE Radio Network Planning -- 2.12 Radio Network Planning Process -- 2.12.1 Coverage Planning -- 2.13 EDGE Radio Network Optimisation -- 2.13.1 Key Performance Indicators -- 2.13.2 Performance Measurements -- 2.13.3 Improvement of Throughput in EDGE Networks -- 2.14 Conclusions -- Chapter 3 Transmission Network Planning and Optimisation -- 3.1 Basics of Transmission Network Planning…”
Libro electrónico -
42318Publicado 2023Tabla de Contenidos: “…8.8.1 Legacy language -- 8.8.2 Choosing the next one -- Summary -- Checklist -- 9 Development -- 9.1 Project planning -- 9.1.1 Project manager -- 9.1.2 Defining projects -- 9.2 Development standards -- 9.3 Version control -- 9.4 Quality assurance (QA) -- 9.4.1 Manual testing -- 9.4.2 Automated tests -- 9.5 Cl/CD -- 9.6 Technical debt -- 9.7 Release -- 9.7.1 Outage release -- 9.7.2 Blue-green release -- 9.8 Client requests -- Summary -- Checklist -- 10 Contract management -- 10.1 Service agreement -- 10.1.1 Statement of work -- 10.1.2 Service-level agreement -- 10.2 Evaluating vendors -- 10.3 Software licensing -- 10.4 Support contracts -- Summary -- Checklist -- 11 Documentation -- 11.1 Why document? …”
Libro electrónico -
42319por Moore, BillTabla de Contenidos: “…Administration tools -- 11.1 Administrative tools for the developer -- 11.2 Starting the tools -- 11.2.1 Starting Interchange Server Express -- 11.2.2 Starting System Manager -- 11.2.3 Starting the Flow manager -- 11.2.4 Setting up to run the Web-based tools -- 11.2.5 Starting ICSMonitor -- 11.2.6 Starting Failed Event Manager -- 11.3 Logging and tracing -- 11.3.1 Configuring logging and tracing -- 11.3.2 Generating sample tracing -- 11.3.3 Viewing the tracing information -- 11.3.4 Using the Log Viewer to look at trace -- 11.4 Debugging collaborations -- 11.4.1 Debugging a success flow -- 11.4.2 Debugging a failure flow -- 11.4.3 Finished debugging -- 11.5 Managing failed events -- 11.5.1 Using Flow manager -- 11.5.2 Using the Failed Event Manager -- 11.5.3 Failed event actions -- 11.6 Using statistics for system interrogation -- 11.6.1 Connector statistics -- 11.6.2 Collaboration statistics -- 11.7 Starting and stopping components -- 11.7.1 Controlling components from System Manager -- 11.7.2 Controlling components from ICSMonitor -- Part 3 Developing an integration sample -- Chapter 12. …”
Publicado 2005
Libro electrónico -
42320por Lakner, GaryTabla de Contenidos: “…Planning for Network Authentication Service and Enterprise Identity Mapping implementation -- 2.1 Required OS/400 components -- 2.2 Required network components -- 2.2.1 General TCP/IP considerations -- 2.2.2 Time / SNTP -- 2.3 Planning your EIM implementation -- 2.3.1 Selecting the system to act as the domain controller -- 2.3.2 Administering EIM -- 2.3.3 Naming conventions -- 2.3.4 EIM associations -- 2.4 Information to collect before you start -- Chapter 3. …”
Publicado 2004
Libro electrónico