Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Introduction
Table 1.1: Minimum Requirements for deploying the .NET Framework
Table 1.2: Requirements for some .NET-based Applications
Table 1.3: Command line options for installing Dotnetfx.exe
Table 1.4: Language Packs Supported by .NET Framework v1.1 (v1.1.4322)
Chapter 2: Planning the Deployment of .NET Framework-Based Applications
Table 2.1: Files Types that May Be Deployed with an Application
Table 2.2: Installation Issues for More Complex Windows and Web Applications
Table 2.3: Assigning and Publishing Applications with Group Policy
Table 2.4: Methods of Distributing Windows Installer Packages
Table 2.5: Choosing Between Group Policy and SMS for Distribution
Chapter 3: Implementing the Deployment of .NET Framework-Based Applications
Table 3.1: Types of Deployment Project
Table 3.2: Files that May Be Added to a Setup Project
Table 3.3: Comparison of IIS ADSI provider with IIS WMI provider
Chapter 4: Maintaining .NET Framework-Based Applications
Table 4.1: Versioning Properties
Table 4.2: Methods of Distributing Windows Installer Packages
Table 4.3: Side by Side Behavior of a Window Forms-based Application
Table 4.4: Side by Side of an ASP.NET Application
Previous page
Table of content
Deploying .NET Applications: A Lifecycle Guide: A Lifecycle Guide (Patterns & Practices)
ISBN: B004V9MSJW
EAN: N/A
Year: 2003
Pages: 53
Authors:
Microsoft Corporation
BUY ON AMAZON
Software Configuration Management
Project Management in a CM Environment
A Practical Approach to Documentation and Configuration Status Accounting
A Practical Approach to Configuration Verification and Audit
Metrics and Configuration Management Reference
Appendix V Functional Configuration Audit (FCA) Checklist
MySQL Clustering
Testing Your Cluster
Adding Tables
Storage Nodes
Managing MySQL Cluster
High-Speed Interconnects
The Java Tutorial: A Short Course on the Basics, 4th Edition
Specifying the Exceptions Thrown by a Method
Runtime Exceptions The Controversy
Code Samples
Working with Random Access Files
Implementations
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
IDS and IPS Architecture
Snort
Policy and Procedures
The Future of Intrusion Detection and Prevention
Ruby Cookbook (Cookbooks (OReilly))
Storing Data on Distributed RAM with MemCached
Caching Expensive Results with MemCached
Testing, Debugging, Optimizing, and Documenting
Gathering Statistics About Your Code
Using Java Libraries with JRuby
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Hardware Overview
ICMP
Summary
Public Key Infrastructure (PKI)
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies