کتاب های جدید

کتاب های برگزیده

دانلود کتاب e-Directories: Enterprise Software, Solutions, and Services (With CD-ROM)

عنوان فارسی :

دانلود کتاب e-Directories: نرم افزار سازمانی ، راه حل ها و خدمات (با CD-ROM)

عنوان انگلیسی :

e-Directories: Enterprise Software, Solutions, and Services (With CD-ROM)

زبان : English

موضوع : Computers->Information Systems: EC businesses

نویسندگان : Daniel House Tim Hahn Louis Mauget Richard Daugherty Richard Daugherty

ناشر : Addison-Wesley Pub (Sd)

ISBN (شابک) : 9780201700398, 0201700395

تعداد صفحات : 538\538

سال نشر : 2000     ویرایش : 1st

حجم : 2 MB       فرمت : pdf

قیمت : 28000 تومان

فهرست :



Table of contents :
Enterprise Software, Solutions, and Services......Page 3
Contents......Page 5
What Is Enterprise Software?......Page 21
What This Book Is and Is Not......Page 22
Example Programs......Page 23
The Companion CD......Page 24
The Organization of This Book......Page 25
How to Use This Book......Page 26
Acknowledgments......Page 27
Louis Mauget......Page 29
Richard Daugherty......Page 30
Have You Ever Used a Directory?......Page 31
Attitude Versus API......Page 32
The Top 10 Terms and Acronyms......Page 33
You Are Here......Page 37
A User-Oriented View......Page 39
Over and Over......Page 40
Location, Location, Location......Page 41
Figure A.2 Directory as a service locator service......Page 42
Figure A.3 A shared directory service......Page 43
Enterprise Characteristics......Page 44
Lightweight Directory Access Protocol......Page 45
What, Exactly, Is a Directory?......Page 46
Summary......Page 47
Server and Service......Page 49
The Importance of RASSS......Page 50
Figure B.2 Impedance mismatch between the user’s desire (update every second) and the directory .........Page 51
Remember ACID?......Page 52
Loose Consistency......Page 53
Good, Bad, and Ugly Data......Page 54
A Brief Code Example......Page 56
Summary......Page 57
System Directories......Page 59
Phone Book Directories......Page 60
Figure C.2 HTTP access to phone book information......Page 61
Application Directories......Page 62
Personal and Mail Systems......Page 63
Figure C.4 Mail clients and personal assistants have directories......Page 64
Operating Systems......Page 65
Figure C.6 Synchronization using a meta-directory......Page 66
Figure C.7 Host name address lookup using the resolver......Page 67
Figure C.8 A directory service can support multiple applications simultaneously......Page 68
Human Resources Information......Page 69
Consistent User Interface......Page 70
Summary......Page 71
Domain Name Service......Page 73
Figure D.1 Multiple DNS servers provide DNS name space......Page 75
Figure D.2 Multiple CDS servers manage the cell directory......Page 76
LAN Managers......Page 77
X.500......Page 78
Standards Today......Page 79
Domain Name Service......Page 80
Figure D.5 DNS server, resolver client, and application program accessing DNS......Page 81
Lightweight Directory Access Protocol......Page 82
Summary......Page 84
Enterprise Software with Directories......Page 87
Four Classes of Usage......Page 89
Figure E.1 Quantity of software lines written (excluding the home market)......Page 90
Examples of the Four Usage Classes......Page 91
Cost......Page 92
Directory Exploitation......Page 94
A One-Line Quiz......Page 95
Example Program......Page 97
Figure E.4 Available directory servers dialog......Page 98
Figure E.6 User needs to supply another server......Page 99
Figure E.8 The debug console......Page 100
Summary......Page 101
The Role of the Operating System......Page 103
Usage Rating of the Directory Service......Page 104
Directory Service Users......Page 105
Figure F.2 Exposure to failure......Page 106
Figure F.3 Error correction......Page 107
Figure F.4 Cluster fail-over......Page 108
Summary......Page 109
White Pages and Yellow Pages Lookups......Page 111
Figure G.1 Looking up a phone number and e-mail address using a directory1......Page 112
Users and Groups......Page 113
Hardware Configuration......Page 114
Figure G.2 Operating system using a directory to access user, group, file system, and device inf.........Page 115
Networks......Page 116
Applications......Page 117
Location......Page 118
Figure G.4 Application using a directory for configuration and user information......Page 119
Summary......Page 120
Monolithic Applications......Page 121
Thick Client Applications......Page 122
Thin Client Applications......Page 123
Tiered Applications......Page 124
Three-Tier Web Applications......Page 125
Message-Oriented Middleware......Page 126
Figure H.4 Boss-worker model......Page 127
Figure H.5 A component manager......Page 128
Fail-Over Clusters......Page 129
Summary......Page 130
24 3 7 and 24 3 365......Page 131
Servers and Services......Page 132
Robust Server Code......Page 133
Figure I.2 The wedding cake of software availability / reliability......Page 134
Redundant Servers......Page 135
Low Availability......Page 136
Figure I.4 Cost of removing the last few bugs......Page 137
Improving Application Availability......Page 138
Advertising and Finding Services......Page 139
Figure I.6 Client console......Page 140
Beyond Location Information......Page 141
Summary......Page 142
Scalability......Page 143
Figure J.1 Scaling the number of users......Page 144
Planning Ahead......Page 145
Offload Processing to Client......Page 146
Figure J.3 Client offloading......Page 147
Algorithm Choice......Page 148
Figure J.4 Algorithm comparison......Page 149
Figure J.5 Three-tier architecture......Page 150
Summary......Page 151
Performance and Performance Measurement......Page 153
Processor Usage......Page 154
Figure 11.1 Output from execution serialization error......Page 155
Input/Output Usage and Constraints......Page 156
Network Bandwidth, Latency, and Timing Fluctuations......Page 157
Poor Performance......Page 158
Summary......Page 159
Policy and Risks......Page 161
Figure L.1 Selected threats to data stored in a directory......Page 162
Application Development and Maintenance as a Source of Ongoing Risk......Page 163
Controlling Access Based on Organization Responsibilities......Page 164
Figure L.2 Ways of authenticating Web users......Page 165
Figure L.3 Security actions implemented in ldapauth......Page 166
Figure L.4 Three types of auditing......Page 167
Summary......Page 168
Serviceability and Maintainability......Page 169
Real-Time Event Logging with First Failure Data Capture......Page 170
Figure M.2 Detecting problems......Page 171
Failing a Request Versus Failing the Server Application......Page 172
Automatic Fail-Over......Page 173
Directory Redundancy......Page 175
Backups and Directories......Page 176
Carrying Out an Upgrade......Page 177
Installing a New Server in Place......Page 178
Applying the Life Cycle Lessons......Page 179
Client and Server Changes......Page 180
Summary......Page 181
Directories Grow Up......Page 183
Transactional “Flavors”......Page 184
Figure N.1 Distributing software throughout an enterprise through a directory service......Page 185
Dynamic and Easy Partitioning......Page 186
Better Multivendor Interoperability......Page 187
XML and DSML......Page 188
Monitoring Tools......Page 189
Device Management......Page 190
Summary......Page 191
Directory Infrastructure......Page 193
The Political Dimension......Page 195
Managing Directories......Page 196
Organizing Directory Data for Performance......Page 197
Structuring the Directory Data......Page 198
Categorizing Directory Data......Page 199
White Pages Retrieval—If It’s That Easy, There Must be a Catch......Page 200
Figure O.3 Logical web site and real web site......Page 201
Yellow Pages Retrieval—An Even Bigger Catch......Page 202
Is LDAP Deficient?......Page 204
The Enterprise Locator Service......Page 205
Summary......Page 206
Figure O.4 Managing multiple services......Page 207
The Aspects of Directory Service......Page 209
What Things Are......Page 210
Where Things Reside......Page 211
What Is Mandatory and What Is Optional......Page 212
Performance......Page 213
Usability......Page 214
Administration......Page 215
X.500......Page 216
Syntaxes......Page 217
Matching Rules......Page 219
Attribute Types......Page 220
Object Classes......Page 222
Schema Check......Page 223
Object Class Hierarchy......Page 224
Figure P.4 Example of an object class hierarchy......Page 225
Schema in LDAP......Page 226
Naming Constraints......Page 228
Name Space Layout......Page 229
ASN.1 (X.208) and X.501......Page 230
Summary......Page 231
Why There Are So Many Schemas......Page 233
Designing Custom Schema......Page 234
Figure Q.1 Entity-relationship model of aPerson, aGroup, and aDepartment......Page 235
Exploiting the Hierarchical Name Space......Page 236
Figure Q.2 Containment relationship of aPerson entries under aDepartment entries......Page 237
Defining a Package......Page 238
Figure Q.3 Package used to organize the set of attribute types and object classes in a schema......Page 239
Defining Object Classes......Page 240
Defining Attribute Types......Page 242
Defining Functional Characteristics......Page 245
Business Issues Impacting Structure......Page 246
Installing a Custom Schema......Page 247
Updating a Schema Using LDIF Format......Page 248
Summary......Page 251
User Identification and Authentication......Page 253
Figure R.1 Common Web service with multiple backend systems......Page 255
Controlling Access to Directory Entries......Page 256
Figure R.2 Active directory access control structure......Page 257
Figure R.3 SSL can be used to protect LDAP exchanges.......Page 258
Summary......Page 259
Figure S.1 More than two good ideas combined......Page 261
How Replication Works......Page 262
Figure S.4 Single master operation......Page 263
Replication Versus Caching......Page 264
Dealing with Temporal Consistency......Page 265
Figure S.7 Retry connected successfully......Page 266
Replication Collisions......Page 267
More Complications of Replication Collision......Page 268
Partitioning......Page 269
Figure S.11 Partitions for performance......Page 270
Locating the Right Partition......Page 271
Referrals......Page 272
Drawbacks of Referrals......Page 273
Figure S.15 Replication and partitioning together......Page 274
Summary......Page 275
Replication......Page 277
Figure T.2 Forest of directories......Page 278
Synchronization......Page 279
Figure T.4 Manual synchronization......Page 280
Figure T.5 Programmed directory synchronization......Page 281
Schema Mapping Problems......Page 282
Figure T.7 Synchronization problems......Page 283
Figure T.8 SLAPD, SLURPD replication scenario......Page 284
Metadirectories......Page 285
Summary......Page 286
Differences between APIs and Protocols......Page 289
Figure U.1 A client and server separated by a protocol......Page 290
Progamming Interface......Page 291
Figure U.2 An application program using an API to access a directory using a protocol......Page 292
Novell Directory Service (NDS) and Network Core Protocols (NCPs)......Page 293
Distributed Computing Environment (DCE) and Cell Directory Services (CDS)......Page 294
Popular Directory Protocols......Page 295
COSNaming over IIOP......Page 296
LDAP C......Page 297
JDAP......Page 298
Novell Development Kit (NDK)......Page 299
JNDI......Page 301
Summary......Page 303
Novell Directory Services (NDS)......Page 305
Microsoft Active Directory......Page 306
An Open Source Implementation......Page 307
Domain Name Service (DNS)......Page 308
Summary......Page 309
Internet and Intranet Case Studies......Page 311
How Directories Enable Roaming......Page 313
Description of the Roaming Problem......Page 314
Figure W.2 L3F runs its ferret food business from Wabash, the hub of the gourmet pet food indust.........Page 315
Figure W.3 Various pieces of data that TSA maintains......Page 316
TSA Schema Class Objects......Page 317
TSA Schema Attributes......Page 318
The Directory Information Table......Page 319
Directory Vendor Differences......Page 321
Directory Structure......Page 322
How TSA Works......Page 323
Write Collisions......Page 325
Warning!......Page 326
Critique of the Example......Page 327
Summary......Page 328
The Purpose of a Corporate Employee Directory......Page 329
Use Cases for the Corporate Directory......Page 330
Figure X.1 Diagram of the data model for the corporate directory......Page 331
Attribute Types......Page 332
Name Space Layout......Page 333
Figure X.2 Name space layout for the corporate directory......Page 334
Looking Up People......Page 335
Looking Up a Chain of Command......Page 336
Adding a Distribution List......Page 337
Deleting a Distribution List......Page 338
Managing Information in the Corporate Directory......Page 339
Deleting Employee Information......Page 340
Handling Employee Transfers......Page 341
Sample Code......Page 344
Critique of the Solution......Page 345
Summary......Page 346
The Customer Access and Update......Page 347
Schema......Page 348
Figure Y.1 Possible directory infrastructure for WSH application......Page 349
Figure Y.2 Use of read-only partial replica......Page 350
Figure Y.3 The L3F home page......Page 351
Figure Y.4 Customer information page......Page 353
Critique of the Solution......Page 354
Summary......Page 355
The Application Management Problem......Page 357
The Purpose of the Application Management......Page 358
The Directory......Page 359
Directory-Enabling the Server......Page 360
Figure 26.3 Quotation event log sample output......Page 361
Figure Z.5 Typical client console output......Page 362
Schema......Page 363
Critique of the Solution......Page 364
Figure Z.6 Automatic restart......Page 366
Security......Page 367
Summary......Page 368
Internet and Intranet Users......Page 369
The Single Sign-On Solution......Page 371
The Directory Solution......Page 372
Summary......Page 373
The Web Farm Problem......Page 375
Web Farm Design......Page 376
Figure AB.2 The nslookup of www.geocities.com ISP......Page 377
Figure AB.3 Browser cookies......Page 378
Adding Servers......Page 379
Implementing the Web Farm......Page 380
Figure AB.5 Installation of openLDAP......Page 381
Figure AB.6 DNS zone file configured for round-robin address resolution......Page 382
Management Objectives......Page 383
Figure AB.7 Diagram of machines and services......Page 384
Performance Monitoring......Page 385
Backup and Restoration of Backing Store Without Service Interruption......Page 386
The Directory Infrastructure......Page 387
Directory Configuration......Page 388
Availability......Page 389
Limitations......Page 390
Summary......Page 391
The Move to E-Business......Page 393
Round 1—The Answer Is the Web. What’s the Question?......Page 394
Round 2—The Answer Is Directory Architecture. What’s the Question?......Page 396
Information About Customers......Page 397
Figure AC.3 All relevant applications connect......Page 398
Round 3—Maybe I Should Understand the Question First......Page 399
Round 4—Metadirectory......Page 400
Figure AC.4 Synchronization......Page 402
Summary......Page 403
Appendices, Annotated Bibliography, and Glossary......Page 405
LDAP......Page 407
The Directory Data Model......Page 408
LDAP Initialization and Termination......Page 410
Getting an LDAP Handle......Page 411
LDAP Results......Page 412
LDAP Search and Compare......Page 413
LDAP Add, Modify, and Delete......Page 415
The LDAPConnection C++ Class......Page 417
Summary......Page 418
Using JNDI to Access LDAP Directories......Page 419
JNDI Initialization and Termination......Page 420
JNDI Results......Page 421
JNDI Bind......Page 422
JNDI Search and Compare......Page 423
JNDI Add, Modify, and Delete......Page 425
JNDI Modify Name......Page 426
Summary......Page 427
ADSI......Page 429
Figure C.2 ADSI and other ways to access directories......Page 430
ADSI and C/C++......Page 431
For More Information and Samples......Page 432
Projecting Static Brochures to Clients......Page 433
Figure D.1 Static request/response/render sequence......Page 434
Web Protocols......Page 435
Client-Side Scripting......Page 436
Java Applets......Page 437
ActiveX Controls......Page 438
Dynamic HTML with Cascading Style Sheets......Page 439
Common Gateway Interface......Page 440
NSAPI and ISAPI......Page 441
Browser Cookies......Page 442
Figure D.3 User name remembered in hidden field......Page 443
COM / COM+......Page 444
Active Server Pages......Page 445
Java Server Pages......Page 446
Security......Page 447
Generic Security Services (GSS-API) and System Security Provider Interfaces (SSPI)......Page 449
Buffer Management......Page 450
Object Identifier Helper Functions......Page 451
Credential Management Functions......Page 452
Context Management Functions......Page 453
Message Protection Functions......Page 456
Users and Groups in Access Control Lists......Page 457
Structure of an Access Control List......Page 458
Allowing Modification......Page 459
Structure of an Access Control List......Page 460
Figure F.1 Structure of ntSecurityDescriptor......Page 461
Preventing Access......Page 462
Bind Rules......Page 463
Evaluation Algorithm for an Access Check......Page 464
Preventing Access......Page 465
Standard Objects......Page 467
Binary......Page 468
TelephoneNumber......Page 469
IETF RFCs......Page 471
IETF Drafts......Page 476
Other IETF Documents......Page 479
Vendor Information......Page 480
Useful Attribute Types and Object Classes......Page 483
CD Contents......Page 497
Using the CD......Page 498
Executable Programs and Your Operating System......Page 499
Program Environment......Page 500
ASN.1......Page 503
Client-server......Page 504
Directory hierarchy......Page 505
EBCDIC......Page 506
IEEE......Page 507
MSMQ......Page 508
Property......Page 509
SGML......Page 510
Thick client......Page 511
Yellow pages......Page 512
Annotated Bibliography......Page 513
Index......Page 519


اطمینان از خرید


Download e-Directories: Enterprise Software, Solutions, and Services (With CD-ROM) from megabooks9.ir

کتاب های پزشکی

دانلود کتاب Cupping therapyدانلود کتاب Current Critical Care Diagnosis and Treatment (Lange Medical Books)دانلود کتاب Molecular Pharmacognosyدانلود کتاب Gene therapy technologies, applications, and regulations: from laboratory to clinicدانلود کتاب Pediatric Critical Care Medicine

کتاب های کامپیوتر

دانلود کتاب Remote sensing and GIS accuracy assessmentدانلود کتاب Foundations for programming languagesدانلود کتاب The Ruby Programming Language (Covers Ruby 1.8 and 1.9)دانلود کتاب MATLAB: An Introduction with Applications, Fourth Editionدانلود کتاب The Python Standard Library by Example (Developer's Library)

کتاب های ریاضی

دانلود کتاب A Handbook of Time Series Analysis, Signal Processing, and Dynamicsدانلود کتاب Computer Algebra Recipes for Mathematical Physicsدانلود کتاب Cyclic Homologyدانلود کتاب The logarithmic potential: Discontinuous Dirichlet and Neumann problemsدانلود کتاب Trigonometry, (8th Edition) (Available 2011 Titles Enhanced Web Assign)

کتاب های تکنولوژی

دانلود کتاب Nanotechnology Applications And Marketsدانلود کتاب Protein Structure Prediction: Methods and Protocolsدانلود کتاب Fullerenes: Chemistry and Reactionsدانلود کتاب Nanotechnology for Chemical and Biological Defenseدانلود کتاب Protein Lipidation Protocols

کتاب های مذهبی

دانلود کتاب Hymns to Isis in Her Temple at Philaeدانلود کتاب Living Together and Christian Ethics (New Studies in Christian Ethics)دانلود کتاب To Know Him: Beyond Religion Waits a Relationship That Will Change Your Lifeدانلود کتاب Manichaeism and Its Legacyدانلود کتاب Reading Acts. A Literary and Theological Commentary on the Acts of the Apostles, Revised Edition (Reading the New Testament)

کتاب های فیزیولوژی

دانلود کتاب The heat of formation of waterدانلود کتاب Essentials of Neuropsychological Assessment (Essentials of Psychological Assessment)دانلود کتاب Reproducing Empire: Race, Sex, Science, and U.S. Imperialism in Puerto Ricoدانلود کتاب Personality disorders and older adults : diagnosis, assessment, and treatmentدانلود کتاب CliffsNotes GRE General Test Cram Plan

کتاب های تاریخی

دانلود کتاب Viking Longshipدانلود کتاب Reczny Granatnik Przeciwpancerny RGP PANC 2دانلود کتاب The American Civil Warدانلود کتاب The New American navyدانلود کتاب The Peninsula Campaign of 1862: A Military Analysis

کتاب های زیست شناسی

دانلود کتاب Plant Breeding and Biotechnologyدانلود کتاب Bacteria in biology, biotechnology, and medicineدانلود کتاب In Vitro Toxicity Testing Protocolsدانلود کتاب Protein Phosphatase Protocolsدانلود کتاب Answer to Prof. Stormers Remark

کتاب های اقتصاد

دانلود کتاب Systems Trading for Spread Betting: An End-To-End Guide for Developing Spread Betting Systemsدانلود کتاب Advanced Planning in Fresh Food Industries: Integrating Shelf Life into Production Planningدانلود کتاب 2500 Keywords to Get You Hiredدانلود کتاب The Big E: The Story of the USS Enterpriseدانلود کتاب Commodity Strategies

کتاب های آموزشی

دانلود کتاب Insect (DK Eyewitness Books)دانلود کتاب Automated Forex System. How to set it upدانلود کتاب Complete Idiots Guide to Small Businessدانلود کتاب Magic of NLP Demystified: A Pragmatic Guide to Communication & Change (Positive Change Guides)دانلود کتاب Handbook For Investment Committee Members How To Make Prudent Investments For Your Organization Wiley Finance Series Ebook-Yyepg

کتاب های حقوق

دانلود کتاب Health law and the European Unionدانلود کتاب Essential Questions in EU Lawدانلود کتاب The Philosophy of Law: An Encyclopedia (Garland Reference Library of the Humanities) (2 Volumes)دانلود کتاب Evaluating Scientific Evidence: An Interdisciplinary Framework for Intellectual Due Process (Law in Context)دانلود کتاب Computable Models of the Law - Languages, Dialogues, Games, Ontologies

کتاب های علوم انسانی

دانلود کتاب The methodology of scientific research programmesدانلود کتاب Philosophy GuideBook to Hume on Knowledgeدانلود کتاب Reform, Legitimacy, and Dilemmas - China's Politics and Societyدانلود کتاب The Concise Encyclopedia of Western Philosophyدانلود کتاب Ethics, Exegesis and Philosophy: Interpretation after Levinas
پشتیبانی (تماس و واتساپ) 09117307688
(جهت شروع چت کلیک کنید)
دروازه پرداخت معتبر