J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance

Size: px
Start display at page:

Download "J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance"

Transcription

1 J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc.

2

3 Dear Valued Customer, The WILEY advantage We realize you re a busy professional with deadlines to hit. Whether your goal is to learn a new technology or solve a critical problem, we want to be there to lend you a hand. Our primary objective is to provide you with the insight and knowledge you need to stay atop the highly competitive and everchanging technology industry. Wiley Publishing, Inc. offers books on a wide variety of technical categories, including security, data warehousing, software development tools, and networking - everything you need to reach your peak. Regardless of your level of expertise, the Wiley family of books has you covered. For Dummies The fun and easy way to learn The Weekend Crash Course The fastest way to learn a new tool or technology Visual For those who prefer to learn a new topic visually The Bible The 100% comprehensive tutorial and reference The Wiley Professional list Practical and reliable resources for IT professionals In the book that you now hold in your hands, Darren Broemmer shares best practices and lessons learned for J2EE development. As you design and build a banking application with J2EE and design patterns, you'll also utilize metadata-driven configurable foundation components to help automate much of the development for Web-based business applications. And of course, the tools and technologies used to construct the sample application are not from any one vendor, but best of breed Jakarta Struts, Servlets, JSP, XML, EJB, UML, WebLogic, WebSphere, and many more. Our commitment to you does not end at the last page of this book. We d like to open a dialog with you to see what other solutions we can provide. Please be sure to visit us at to review our complete title list and explore the other resources we offer. If you have a comment, suggestion or any other inquiry, please locate the contact us link at Thank you for your support and we look forward to hearing from you and serving your needs again in the future. Sincerely, Richard K. Swadley Vice President & Executive Group Publisher Wiley Publishing, Inc.

4

5 J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc.

6 Publisher: Bob Ipsen Editor: Theresa Hudson Developmental Editor: Kenyon Brown Editorial Manager: Kathryn A. Malm Managing Editor: Pamela Hanley New Media Editor: Brian Snapp Text Design & Composition: Interactive Composition Corporation Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where Wiley Publishing, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. Copyright 2003 by Darren Broemmer. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) , fax (978) Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., Crosspointe Blvd., Indianapolis, IN 46256, (317) , fax (317) , permcoordinator@wiley.com. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services please contact our Customer Care Department within the United States at (800) , outside the United States at (317) or fax (317) Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data: ISBN Printed in the United States of America

7 This book is dedicated to my mother, Joan, and in loving memory of my father, Gary, for all of their love, support, and encouragement.

8

9 Contents Acknowledgments About the Author Introduction Overview of the Book and Technology How This Book Is Organized Who Should Read This Book Tools You Will Need What s on the Web Site Summary x xi xii xii xx xxiii xxiii xxiv xxiv Chapter 1 Building Business Applications with J2EE 1 Elements of Transactional, Web-Based Business Applications 2 The Reference Architecture 4 The J2EE Platform Approach 9 The Model-View-Controller Architecture Approach 16 Best Practices for Building Business Applications with J2EE 20 Summary 21 Chapter 2 The Business Object Architecture: Design Considerations 23 Business Objects in a Banking Application 25 Elements of Business Objects 26 vii

10 viii Contents Design Considerations 29 Best Practices for Designing Business Objects 50 Summary 53 Chapter 3 Chapter 4 Building Business Objects: Managing Properties and Handling Errors 55 Managing Properties 55 Value Objects and Lightweight Business Objects 83 Object Validation and Error Handling 87 Best Practices for Implementing Business Objects: Part One 102 Summary 103 Building Business Objects: Persistence, Relationships, and the Template Method Pattern 105 Object Persistence 105 The Base Class as a Template 159 Overall Business Object Metadata Approach 168 Data Caching 174 Best Practices for Implementing Business Objects: Part Two 185 Summary 188 Chapter 5 The Service-Based Architecture: Design Considerations 189 Elements of Service-Based Components 193 Design Considerations 196 Best Practices for Designing Service-Based Components 207 Summary 208 Chapter 6 Building Service-Based Components 209 The Actual Service Interface 209 An Implementation for Argument Lists 210 The Session Bean as a Component Wrapper to the Service 215 Responsibilities of the Service Component 221 Update Service Examples 225 Updating Multiple Business Objects 233 The New Customer Service 234 Data Retrieval Services 240 Building Generic, Reusable Services 251 Implementing the Controller Pattern in Services 253 Best Practices for Implementing Service-Based Components 255 Summary 257

11 Contents ix Chapter 7 The User Interaction Architecture: Design Considerations and an Overview of Jakarta Struts 259 Elements of the User Interaction Architecture 261 Design Considerations 265 An Overview of Jakarta Struts 284 Best Practices for Designing the User Interaction Architecture 298 Summary 300 Chapter 8 Building the User Interaction Architecture 301 The Change Address Page 301 The Change Address JSP 307 The View Accounts Page 332 The New Customer Wizard 342 A Template for the Action Class 362 Web Services 369 Best Practices for Implementing the User Interaction Architecture 371 Summary 372 Chapter 9 Strengthening the Bank Application: Adding Security and Advanced Functionality 375 Application Security 375 Interesting Aspects of the Bank Application 392 Best Practices for Advanced Web Application Development 417 Summary 418 Chapter 10 Performance 421 Overall Performance Approach 421 Performance in J2EE Applications 430 Best Practices for J2EE Performance Engineering 440 Summary 442 Chapter 11 Moving toward Reuse in the Reference Architecture 443 Common Roadblocks and Corresponding Best Practices 444 Reuse in the Reference Architecture 452 The Strategic View of the Architecture 454 Best Practices for Moving toward Reuse 456 Summary 457 Bibliography 459 Index 461

12 Acknowledgments I owe countless thanks to my parents, John and Joan, Shirley and my late father Gary, for always being there and giving so much of themselves to help me. Without question, this book would not have been possible without everything that they have done for me. Special thanks also goes to John Abbey, Jeff Nelms, and Ken Young for reviewing the chapters, providing their insight, and contributing to this effort. John and I have collaborated for years on J2EE development and had many a lively and entertaining discussion on the topic. Likewise, Jeff and I have debated the finer points of business objects many times and much of the performance slant in this book can be traced back to his influence. Ken s early feedback helped to shape the perspective that the book eventually took. I would also like to recognize Ron Carden for his influence in my work and the development of this material. Another person who made this book possible is my wife Caroline who enthusiastically supported me throughout the effort. I would also like to acknowledge Bill Hough who unquestionably supported this effort. Special thanks to Jack Greenfield, Terri Hudson, and all the folks at Wiley for their support and help in putting this book together. Finally, thanks to God through whom all things are made possible. Darren Broemmer September 2002 x

13 About the Author Darren Broemmer is an application architect working on next-generation J2EE software solutions in the mortgage industry at Freddie Mac. His previous work includes architecture, development, and management experience in Internet and client-server systems implementations for consulting clients in North America, Europe, and the Middle East. Darren specializes in Java and J2EE technology and is the coinventor of a Java application development framework called jpylon, a set of reusable, extensible software components based on J2EE. JPylon was chosen to be a part of the Sun Microsystems ONE Studio Developer Resources program (formerly Forte for Java Extension Partners Program). Throughout his career, Darren has regularly consulted with projects on best practices for J2EE development and has spoken at corporate conferences about jpylon and J2EE technology. When he is not busy thinking of ways to abstract and automate software development, Darren tries to stay in shape by playing basketball and running, although he will never be able to keep up with his wife at Ultimate Frisbee. xi

14 Introduction Java 2 Enterprise Edition (J2EE) technology is becoming a pervasive platform for the development of Internet-based, transactional business applications. It provides a robust development platform upon which to build flexible, reusable components and applications. It is a powerful standard that is well-suited for Internet-based applications because it provides many of the underlying services such as HTTP request processing (Java servlet API), transaction management (Enterprise JavaBeans), and messaging (Java Message Service), just to name a few. However, J2EE is also a complex and changing standard that leaves the technologist with many design decisions and performance considerations. Each component service adds a level of overhead to the application processing that must be considered. Additionally, there are a number of common business logic functions, such as error handling, that must be designed and developed for each component and application. An application development effort using J2EE should give careful consideration to the services provided by the platform and how application components can best utilize them. There are a number of best practices one should consider in order to be highly effective in building J2EE components and integrating them into applications. These practices include evaluating and selecting the right set of software components and services to do the job. This is no different than in other professions; a carpenter or a steelworker both use an architecture plan to build things, although the tools they use to do so are quite different. A scalable, modular architecture built upon J2EE will likely comprise a selection of the appropriate set of J2EE services combined with a custom foundation of common business logic functions. Overview of the Book and Technology This book will supply a set of best practices for J2EE software development and then use them to construct an application architecture approach referred to as the reference architecture. The reference architecture will provide a basis for rapidly building xii

15 Building Business Applications with J2EE xiii transactional business applications using J2EE technology. The design and implementation of the reference architecture is based on a set of guiding principles that will be used to optimize and automate J2EE development. Guiding Principles of the Reference Architecture The goal of constructing the reference architecture is to create a development environment that can be used to build applications faster and with better performance, quality, and reusability. The following set of guiding principles are used to accomplish these goals: Applying proven design patterns to J2EE Automating common functions Using metadata-driven, configurable foundation components Considering performance and scalability These principles are essential in driving the architecture and building the foundation for development. These concepts will be discussed throughout this book in detail and applied to each segment of the J2EE architecture. Much of software development in general and J2EE development in particular can be optimized and automated through these concepts and their realization in the form of common foundation logic. Solid analysis of design choices as input to the architecture and application components is essential in order to provide solutions that balance the needs of rapid development, faster performance, higher quality, and greater reusability. Figure I.1 shows the inputs and outputs of the architecture. This diagram essentially represents the guiding principles and the benefits that can be derived from applying them to application development. These principles provide the motivation and the basis for the approach to this study of developing applications using J2EE. Each aspect of the enterprise architecture within J2EE will be studied for its behavior and characteristics. By using this information and applying the development principles and best practices, you can create an approach to effectively use the technology to reach our application development goals. The goals at the right side of Figure I.1, such as flexibility and reusability, should be considered and addressed from the beginning of any software development project. These types of goals are realized at two different levels: the software architecture level described earlier and the application component design. The reference architecture will guide much of the application design, so it is important to understand and distinguish these levels before undertaking enterprise software development. Each of the two levels will provide different types of benefits to both the end users and the development organization. Applying Proven Design Patterns A design pattern is a defined interaction of objects to solve a recurring problem in software development. There are a number of documented design patterns (E.

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize

More information

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Gregory Nyberg Robert Patrick Paul Bauerschmidt Jeffrey McDaniel Raja Mukherjee Mastering BEA WebLogic Server

More information

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with

More information

Real-Time Optimization by Extremum-Seeking Control

Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley

More information

Mastering UNIX Shell Scripting

Mastering UNIX Shell Scripting Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell

More information

Linux Command Line and Shell Scripting Bible

Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

Study Guide. Robert Schmidt Dane Charlton

Study Guide. Robert Schmidt Dane Charlton Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our

More information

Linux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition.

Linux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition. DVD and CD-ROM Included Run or install 18 different Linux distributions from the multi-boot DVD and CD-ROM! Christopher Negus Linux 2009 Edition Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and

More information

Ruby on Rails. Bible

Ruby on Rails. Bible Ruby on Rails Bible Ruby on Rails Bible Timothy Fisher Ruby on Rails Bible Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright 2008 by Wiley Publishing,

More information

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Second Edition Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Introduction............................................... xxiii Chapter

More information

MCITP Windows Server 2008 Server Administrator Study Guide

MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

Linux Command Line and Shell Scripting Bible. Third Edtion

Linux Command Line and Shell Scripting Bible. Third Edtion Linux Command Line and Shell Scripting Bible Third Edtion Linux Command Line and Shell Scripting BIBLE Third Edition Richard Blum Christine Bresnahan Linux Command Line and Shell Scripting Bible, Third

More information

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO

More information

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser

More information

Practical Database Programming with Visual Basic.NET

Practical Database Programming with Visual Basic.NET Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson

More information

High-Performance Oracle Proven Methods for Achieving Optimum Performance and Availability Geoff Ingram Wiley Publishing, Inc. High-Performance Oracle Proven Methods for Achieving Optimum Performance and

More information

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

More information

Implementing Security and Tokens: Current Standards, Tools, and Practices

Implementing  Security and Tokens: Current Standards, Tools, and Practices Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices

More information

Modern Experimental Design

Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.

More information

Relational Database Index Design and the Optimizers

Relational Database Index Design and the Optimizers Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers

More information

Securing SCADA Systems. Ronald L. Krutz

Securing SCADA Systems. Ronald L. Krutz Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,

More information

Microprocessor Theory

Microprocessor Theory Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A

More information

WIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE

More information

Network Performance Open Source Toolkit Using Netperf, tcptrace, NIST Net, and SSFNet

Network Performance Open Source Toolkit Using Netperf, tcptrace, NIST Net, and SSFNet Network Performance Open Source Toolkit Using Netperf, tcptrace, NIST Net, and SSFNet Richard Blum Executive Publisher: Robert Ipsen Executive Editor: Carol Long Assistant Developmental Editor: Adaobi

More information

MODERN MULTITHREADING

MODERN MULTITHREADING MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING

More information

iwork DUMmIES 2ND EDITION FOR

iwork DUMmIES 2ND EDITION FOR iwork FOR DUMmIES 2ND EDITION iwork FOR DUMmIES 2ND EDITION by Jesse Feiler iwork For Dummies, 2nd Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright

More information

XSLT 2.0 and XPath 2.0

XSLT 2.0 and XPath 2.0 Wrox Programmer to Programmer TM Michael Kay Michael Kay has been working in the XML field since 1997. He became a member of the XSL Working Group soon after the publication of XSLT 1.0 and took over as

More information

Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation

Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation By the Sun Educational Services Java Technology Team January, 2001 Copyright

More information

Oracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR

Oracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR Oracle PL/SQL FOR DUMmIES by Michael Rosenblum and Dr. Paul Dorsey Oracle PL/SQL For Dummies Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2006 by

More information

Algorithms and Parallel Computing

Algorithms and Parallel Computing Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All

More information

Designing Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran

More information

Enterprise JavaBeans 2.1

Enterprise JavaBeans 2.1 Enterprise JavaBeans 2.1 STEFAN DENNINGER and INGO PETERS with ROB CASTANEDA translated by David Kramer APress Media, LLC Enterprise JavaBeans 2.1 Copyright 2003 by Stefan Denninger and Ingo Peters with

More information

Customizing and Upgrading Linux Second Edition Linda McKinnon Al McKinnon Gearhead Press Wiley Computer Publishing John Wiley & Sons, Inc. Customizing and Upgrading Linux Customizing and Upgrading Linux

More information

Creating Web Pages. Learn to: Bud E. Smith. Making Everything Easier! 9th Edition. Design, build, and post a Web page

Creating Web Pages. Learn to: Bud E. Smith. Making Everything Easier! 9th Edition. Design, build, and post a Web page Making Everything Easier! 9th Edition Creating Web Pages Learn to: Design, build, and post a Web page Build pages using HTML, Web design software, and online tools Optimize photos, video, and audio for

More information

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword

xiii A. Hayden Lindsey IBM Distinguished Engineer and Director, Studio Tools Foreword Foreword Business applications are increasingly leveraging Web technologies. Naturally this is true for Internet applications, but it is also true for intranet and extranet applications applications that

More information

PHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6

PHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Making Everything Easier! 4th Edition PHP & MySQL Learn to: Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Easily install and set up PHP and MySQL using XAMPP Choose a Web host and secure

More information

Windows. 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond. Darril Gibson

Windows. 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond. Darril Gibson Windows 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson Acquisitions Editor: Jeff Kellum Development Editor: Gary Schwartz Technical Editors: Troy

More information

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn: Making Everything Easier! Nextiva Special Edition Cloud Phone Systems Learn: What cloud phone systems are and how they can benefit your company About the many advantages a cloud phone system offers Features

More information

Oracle Application Development Framework Overview

Oracle Application Development Framework Overview An Oracle White Paper July 2009 Oracle Application Development Framework Overview Introduction... 1 Oracle ADF Making Java EE Development Simpler... 2 THE ORACLE ADF ARCHITECTURE... 3 The Business Services

More information

OpenSolaris. The book you need to succeed! Nicholas A. Solter, Gerald Jelinek, and David Miner. Explore the OpenSolaris operating environment

OpenSolaris. The book you need to succeed! Nicholas A. Solter, Gerald Jelinek, and David Miner. Explore the OpenSolaris operating environment Nicholas A. Solter, Gerald Jelinek, and David Miner OpenSolaris Explore the OpenSolaris operating environment Master networking and systems administration Deploy web services using open source applications

More information

MySQL Enterprise Solutions

MySQL Enterprise Solutions MySQL Enterprise Solutions Alexander Sasha Pachev Wiley Publishing, Inc. MySQL Enterprise Solutions Alexander Sasha Pachev Wiley Publishing, Inc. Publisher: Robert Ipsen Editor: Robert M. Elliott Managing

More information

Hands-On Oracle Application Express Security

Hands-On Oracle Application Express Security Hands-On Oracle Application Express Security BUILDING SECURE APEX APPLICATIONS Recx Hands-On Oracle Application Express Security: Building Secure Apex Applications Published by John Wiley & Sons, Inc.

More information

Magical Math G ROOVY G EOMETRY. Games and Activities That Make Math Easy and Fun. Lynette Long. John Wiley & Sons, Inc.

Magical Math G ROOVY G EOMETRY. Games and Activities That Make Math Easy and Fun. Lynette Long. John Wiley & Sons, Inc. Magical Math G ROOVY G EOMETRY Games and Activities That Make Math Easy and Fun Lynette Long John Wiley & Sons, Inc. G ROOVY G EOMETRY Also in the Magical Math series Dazzling Division Delightful Decimals

More information

FileMaker. Pro 10. The book you need to succeed! Companion Web Site. Ray Cologon. Go from basics to full-scale development

FileMaker. Pro 10. The book you need to succeed! Companion Web Site. Ray Cologon. Go from basics to full-scale development Companion Web Site Example FileMaker Pro 10 application Demos, tips, and additional resources Ray Cologon FileMaker Pro 10 Go from basics to full-scale development Write your own FileMaker applications

More information

Building the Enterprise

Building the Enterprise Building the Enterprise The Tools of Java Enterprise Edition 2003-2007 DevelopIntelligence LLC Presentation Topics In this presentation, we will discuss: Overview of Java EE Java EE Platform Java EE Development

More information

MacBook Air PORTABLE GENIUS

MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS MacBook Air PORTABLE GENIUS by Paul McFedries MacBook Air Portable Genius Published by Wiley Publishing, Inc. 10475 Crosspoint Blvd. Indianapolis,

More information

IBM Rational Application Developer for WebSphere Software, Version 7.0

IBM Rational Application Developer for WebSphere Software, Version 7.0 Visual application development for J2EE, Web, Web services and portal applications IBM Rational Application Developer for WebSphere Software, Version 7.0 Enables installation of only the features you need

More information

MCTS. Microsoft Windows 7 Configuration STUDY GUIDE. William Panek. Covers All Objectives for Exam Exam

MCTS. Microsoft Windows 7 Configuration STUDY GUIDE. William Panek. Covers All Objectives for Exam Exam Covers All Objectives for Exam 70-680 Includes Real-World Scenarios, Hands-On Exercises, and Leading-Edge Exam Prep Software Featuring: Custom Test Engine Hundreds of Sample Questions Electronic Flashcards

More information

Multi-Core Programming

Multi-Core Programming Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part

More information

CERTIFICATION SUCCESS GUIDE ENTERPRISE ARCHITECT FOR JAVA 2 PLATFORM, ENTERPRISE EDITION (J2EE ) TECHNOLOGY

CERTIFICATION SUCCESS GUIDE ENTERPRISE ARCHITECT FOR JAVA 2 PLATFORM, ENTERPRISE EDITION (J2EE ) TECHNOLOGY SUN CERTIFICATION CERTIFICATION SUCCESS GUIDE ENTERPRISE ARCHITECT FOR JAVA 2 PLATFORM, ENTERPRISE EDITION (J2EE ) TECHNOLOGY TABLE OF CONTENTS Introduction..............................................

More information

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz

Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,

More information

A Programmer's Guide to

A Programmer's Guide to J2EE FrontEnd Technologies: A Programmer's Guide to Servlets, JavaServer Pages, and Enterprise JavaBeans LENNART JGRELID APress Media, LLC J2EE FrontEnd Technologies: A Programmer's Guide to Servlets,

More information

Professional Java Native Interfaces with SWT/JFace. Jackwind Li Guojie

Professional Java Native Interfaces with SWT/JFace. Jackwind Li Guojie Professional Java Native Interfaces with SWT/JFace Jackwind Li Guojie Professional Java Native Interfaces with SWT/JFace Jackwind Li Guojie Professional Java Native Interfaces with SWT/JFace Copyright

More information

OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R.

OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R. OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! 2012 CPA EXAM REVIEW Auditing and Attestation O. Ray Whittington, CPA, PhD Patrick R. Delaney, CPA, PhD WILEY CPA EXAM REVIEW WILEY EXAM REVIEW Auditing

More information

Building Custom Tasks for SQL Server Integration Services

Building Custom Tasks for SQL Server Integration Services Building Custom Tasks for SQL Server Integration Services Andy Leonard Building Custom Tasks for SQL Server Integration Services Andy Leonard Farmville, Virginia, USA ISBN-13 (pbk): 978-1-4842-2939-2 ISBN-13

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to

More information

Implementing a Web Service p. 110 Implementing a Web Service Client p. 114 Summary p. 117 Introduction to Entity Beans p. 119 Persistence Concepts p.

Implementing a Web Service p. 110 Implementing a Web Service Client p. 114 Summary p. 117 Introduction to Entity Beans p. 119 Persistence Concepts p. Acknowledgments p. xvi Introduction p. xvii Overview p. 1 Overview p. 3 The Motivation for Enterprise JavaBeans p. 4 Component Architectures p. 7 Divide and Conquer to the Extreme with Reusable Services

More information

a white paper from Corel Corporation

a white paper from Corel Corporation a white paper from Corel Corporation This document is for discussion purposes only. The products and processes are still under development. The information presented is therefore subject to change without

More information

Blade Servers and Virtualization. Barb Goldworm Anne Skamarock. Transforming Enterprise Computing While Cutting Costs. Wiley Publishing, Inc.

Blade Servers and Virtualization. Barb Goldworm Anne Skamarock. Transforming Enterprise Computing While Cutting Costs. Wiley Publishing, Inc. Blade Servers and Virtualization Transforming Enterprise Computing While Cutting Costs Barb Goldworm Anne Skamarock Wiley Publishing, Inc. Blade Servers and Virtualization Blade Servers and Virtualization

More information

Florian Müller Jay Brown Jeff Potts. FOREWORDS BY Richard J. Howarth John Newton MANNING.

Florian Müller Jay Brown Jeff Potts. FOREWORDS BY Richard J. Howarth John Newton MANNING. Florian Müller Jay Brown Jeff Potts FOREWORDS BY Richard J. Howarth John Newton MANNING CMIS and Apache Chemistry in Action CMIS and Apache Chemistry in Action FLORIAN MÜLLER JAY BROWN JEFF POTTS MANNING

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Storage

More information

THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING

THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

Flash Lite. Mobile Development. Professional. Build Flash Applications for Mobile Devices. Jermaine G. Anderson. Join the p2p.wrox.

Flash Lite. Mobile Development. Professional. Build Flash Applications for Mobile Devices. Jermaine G. Anderson. Join the p2p.wrox. Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Professional Flash Lite Mobile Development Build Flash Applications for Mobile Devices Jermaine G. Anderson Programmer to Programmer Get

More information

JBuilder 2008 also now has full support for Struts 1.x applications including graphical editing and Web flow development.

JBuilder 2008 also now has full support for Struts 1.x applications including graphical editing and Web flow development. JBUILDER 2008 FREQUENTLY ASKED QUESTIONS GENERAL QUESTIONS What new JBuilder products did CodeGear announce in the April 2, 2008 press release? JBUILDER 2008 TURBO, JBUILDER 2008 PROFESSIONAL, AND JBUILDER

More information

Microsoft Dynamics GP. Inventory Kardex

Microsoft Dynamics GP. Inventory Kardex Microsoft Dynamics GP Inventory Kardex Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting

More information

Chapter 1 GETTING STARTED. SYS-ED/ Computer Education Techniques, Inc.

Chapter 1 GETTING STARTED. SYS-ED/ Computer Education Techniques, Inc. Chapter 1 GETTING STARTED SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: The IDE: Integrated Development Environment. MVC: Model-View-Controller Architecture. BC4J: Business Components

More information

Implementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide

Implementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide Implementing IBM CICS JSON Web Services for Mobile Applications IBM Redbooks Solution Guide This IBM Redbooks Solution Guide describes the existing and new aspects of IBM CICS Transaction Server that allow

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

IBM United States Software Announcement , dated February 17, 2015

IBM United States Software Announcement , dated February 17, 2015 IBM United States Software Announcement 215-031, dated February 17, 2015 The IBM CICS Transaction Gateway V9.2 open beta offering enables continuous integration testing for JSON web services and all remote

More information

TOPLink for WebLogic. Whitepaper. The Challenge: The Solution:

TOPLink for WebLogic. Whitepaper. The Challenge: The Solution: Whitepaper The Challenge: Enterprise JavaBeans (EJB) represents a new standard in enterprise computing: a component-based architecture for developing and deploying distributed object-oriented applications

More information

Essential Angular for ASP.NET Core MVC

Essential Angular for ASP.NET Core MVC Essential Angular for ASP.NET Core MVC Adam Freeman Essential Angular for ASP.NET Core MVC Adam Freeman London, UK ISBN-13 (pbk): 978-1-4842-2915-6 ISBN-13 (electronic): 978-1-4842-2916-3 DOI 10.1007/978-1-4842-2916-3

More information

Networking. 11th Edition. by Doug Lowe

Networking. 11th Edition. by Doug Lowe Networking 11th Edition by Doug Lowe Networking For Dummies, 11th Edition Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com Copyright 2016 by John Wiley & Sons,

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in

More information

Google Voice. Learn to: Bud E. Smith Chris Dannen. Making Everything Easier! Set up and use Google Voice

Google Voice. Learn to: Bud E. Smith Chris Dannen. Making Everything Easier! Set up and use Google Voice Making Everything Easier! Google Voice Learn to: Set up and use Google Voice Integrate Google Voice with other Google services such as Gmail and Google Chat Combine Google Voice with your existing phone

More information

Artix Orchestration Release Notes. Version 4.0, June 2006

Artix Orchestration Release Notes. Version 4.0, June 2006 Artix Orchestration Release Notes Version 4.0, June 2006 IONA Technologies PLC and/or its subsidiaries may have patents, patent applications, trademarks, copyrights, or other intellectual property rights

More information

Architecting great software takes skill, experience, and a

Architecting great software takes skill, experience, and a 7KH0RGHO9LHZ&RQWUROOHU'HVLJQ 3DWWHUQ 0RGHO -63'HYHORSPHQW Content provided in partnership with Sams Publishing, from the book Struts Kick Start by James Turner and Kevin Bedell IN THIS CHAPTER The Model-View-Controller

More information

Java Servlet Programming Download Free (EPUB, PDF)

Java Servlet Programming Download Free (EPUB, PDF) Java Servlet Programming Download Free (EPUB, PDF) A few years ago, the hype surrounding applets put Java on the map as a programming language for the Web. Today, Java servlets stand poised to take Java

More information

X-S Framework Leveraging XML on Servlet Technology

X-S Framework Leveraging XML on Servlet Technology X-S Framework Leveraging XML on Servlet Technology Rajesh Kumar R Abstract This paper talks about a XML based web application framework that is based on Java Servlet Technology. This framework leverages

More information

SQL Server Administration. Beginning Microsoft. Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger

SQL Server Administration. Beginning Microsoft. Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger Beginning Microsoft SQL Server 2008 Administration Chris Leiter, Dan Wood, Michael Cierkowski, Albert Boettger Updates, source code, and Wrox technical support at www.wrox.com Programmer to Programmer

More information

Mastering AspectJ. Joseph D. Gradecki Nicholas Lesiecki. Aspect-Oriented Programming in Java. Wiley Publishing, Inc.

Mastering AspectJ. Joseph D. Gradecki Nicholas Lesiecki. Aspect-Oriented Programming in Java. Wiley Publishing, Inc. Mastering AspectJ Aspect-Oriented Programming in Java Joseph D. Gradecki Nicholas Lesiecki Wiley Publishing, Inc. Mastering AspectJ Aspect-Oriented Programming in Java Joseph D. Gradecki Nicholas Lesiecki

More information

SharePoint Farm Reporter Installation Guide

SharePoint Farm Reporter Installation Guide Table of Contents SharePoint Farm Reporter Installation Guide I. PRODUCT DESCRIPTION II. SYSTEM REQUIREMENTS AND RECOMMENDATIONS III. INSTALLATION STEPS IV. CONFIGURING APPLICATION V. UPGRADE SHAREPOINT

More information

IBM System i Web Enablement made easy

IBM System i Web Enablement made easy Software Announcement October 10, 2006 IBM System i Web Enablement made easy Overview Web Enablement for i5/os (5722-WE2) Web Enablement is enhanced to include Express Runtime Web Environments, which can

More information

J2EE Application Development with WebSphere Studio

J2EE Application Development with WebSphere Studio . J2EE Application Development with WebSphere Studio page 2 IBM Application Development Vision Delivering a rapid and efficient response to business needs through a powerful development and deployment

More information

Data Protection for Virtualized Environments

Data Protection for Virtualized Environments Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized

More information

Microsoft Dynamics GP. Purchase Vouchers

Microsoft Dynamics GP. Purchase Vouchers Microsoft Dynamics GP Purchase Vouchers Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting

More information

zapnote Analyst: Jason Bloomberg

zapnote Analyst: Jason Bloomberg zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-1198 Released: August 21, 2006 DATADIRECT XQUERY 2.0 ENABLING XQUERY FOR VERY LARGE MESSAGES Analyst: Jason Bloomberg Abstract As the quantity of XML in

More information

Research on Industrial Security Theory

Research on Industrial Security Theory Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3

More information

Security for Microsoft Windows System Administrators

Security for Microsoft Windows System Administrators Security for Microsoft Windows System Administrators Security for Microsoft Windows System Administrators Introduction to Key Information Security Concepts Derrick Rountree Rodney Buike, Technical Editor

More information

BEA Liquid Data for. WebLogic. Deploying Liquid Data

BEA Liquid Data for. WebLogic. Deploying Liquid Data BEA Liquid Data for WebLogic Deploying Liquid Data Release: 1.0.1 Document Date: October 2002 Revised: December 2002 Copyright Copyright 2002 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend

More information

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5. Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.x For Windows 2000, Windows Server 2003, and Windows XP SQL

More information

SAS IT Resource Management 3.8: Reporting Guide

SAS IT Resource Management 3.8: Reporting Guide SAS IT Resource Management 3.8: Reporting Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2017. SAS IT Resource Management 3.8: Reporting Guide.

More information