Flylib.com
Deploying .NET Applications: A Lifecycle Guide: A Lifecycle Guide (Patterns & Practices)
Deploying .NET Applications: A Lifecycle Guide: A Lifecycle Guide (Patterns & Practices)
ISBN: B004V9MSJW
EAN: N/A
Year: 2003
Pages: 53
Authors:
Microsoft Corporation
BUY ON AMAZON
Table of Contents
BackCover
Deploying .NET Applications - A Lifecycle Guide
Chapter 1: Introduction
Chapter Outlines
What Is Application Deployment?
What Are .NET Framework - based Applications?
What Is the .NET Framework?
Types of Framework Applications
Where to Deploy the .NET Framework
Deploying the .NET Framework
Localized Versions of the .NET Framework
Summary
More Information
Chapter 2: Planning the Deployment of .NET Framework-Based Applications
Choosing a Deployment Strategy
Summary
More Information
Chapter 3: Implementing the Deployment of .NET Framework-Based Applications
Installer Packages
Collection of Simple Build Objects
Summary
More Information
Chapter 4: Maintaining .NET Framework-Based Applications
.NET Framework Side-by-Side Execution
Summary
More Information
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
Deploying .NET Applications: A Lifecycle Guide: A Lifecycle Guide (Patterns & Practices)
ISBN: B004V9MSJW
EAN: N/A
Year: 2003
Pages: 53
Authors:
Microsoft Corporation
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Rules of Scaling
Slow-Wave Mode On-Chip
Discrete Time Mapping
Stripline vs. Microstrip Delay
The Underlying Simulation Engine
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Integrating Cisco CME in a SIP Network
Stonevoice Voice Mail
TAPI Applications
Appendix B. Sample Cisco UE AA Scripts
Table vm_mbxusers
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity I
Unauthorized Activity II
IDS and IPS Architecture
NFR Security
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 2. Set Up Bluetooth on Windows XP
Hack 12. Send SMS from Linux
Hack 52. Add an External Antenna
Hack 53. Do-It-Yourself Access Point Hardware
Section A.8. CDPD, 1xRTT, and GPRS: Cellular Data Networks
PMP Practice Questions Exam Cram 2
Answers and Explanations
Answers and Explanations
Answers and Explanations
Project Closing
Appendix A. CD Contents and Installation Instructions
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Grouping and Summarizing
Generating the Entire Page
Formatting Object Columns
Section A.1. The Command to Invoke SQL*Plus
Section B.2. Formatting Character Strings
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies