Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Introduction
Table 1.1: Costs and Benefits of Application Integration
Chapter 2: Defining Your Application Integration Environment
Table 2.1: Business Processing Capabilities
Table 2.2: Data Integration Capabilities
Table 2.3: Communications Capabilities
Table 2.4: Capabilities Used in Synchronous and Asynchronous Communication
Table 2.5: Business Processing Capabilities Used in STP
Table 2.6: Data Capabilities Used in STP
Table 2.7: Communications Capabilities Used in STP
Table 2.8: Business Processing Capabilities Used in Data Synchronization
Table 2.9: Data Capabilities Used in Data Synchronization
Table 2.10: Communications Capabilities Used in Data Synchronization
Table 2.11: Business Processing Capabilities Used in Application Composition
Table 2.12: Data Capabilities Used in Application Composition
Table 2.13: Communications Capabilities Used in Application Composition
Chapter 3: Security and Operational Considerations
Table 3.1: Security Capabilities
Table 3.2: Operational Management Capabilities
Chapter 4: Using Microsoft Technologies for Application Integration
Table 4.1: Business Process Integration Capabilities Provided by Microsoft Technologies
Table 4.2: Data Integration Capabilities Provided by Microsoft Technologies
Table 4.3: Communication Capabilities Provided by Microsoft Technologies
Table 4.4: Security Capabilities Provided by Microsoft Technologies
Table 4.5: Operational Management Capabilities Provided by Microsoft Technologies
Appendix: Application Integration Capabilities
Table A.1: Different Ways of Storing Address Information
Table A.2: Example Data Validation Rules
Previous page
Table of content
Microsoft Corporation - Guidelines for Application Integration
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 50
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Quantifying and Analyzing Project Risk
Closing Projects
Conclusion
Appendix A Selected Detail From the PERIL Database
Software Configuration Management
Project Management in a CM Environment
A Practical Approach to Configuration Verification and Audit
Metrics and Configuration Management Reference
Appendix N Corrective Action Processing (CAP)
Appendix W Physical Configuration Audit (PCA) Checklist
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Forming Your Kanban Team
Initial Startup and Common Pitfalls
Appendix B Kanban Supermarkets
Appendix C Two-Bin Kanban Systems
Appendix F Implementation in Large Plants
FileMaker Pro 8: The Missing Manual
Switching Between Layouts
Creating a Relational Database
Managing Data with Data Tunneling
Working with Windows
Export Formats
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 2. Set Up Bluetooth on Windows XP
Hack 5. Connect Windows XP with a Bluetooth Phone
Hack 27. Detect Networks on Mac OS X
Hack 82. Use Your Orinoco Card with Hermes AP
Section A.10. 802.1x: Port Security for Network Communications
User Interfaces in C#: Windows Forms and Custom Controls
Control Class Basics
Modern Controls
Custom Controls
Dynamic User Interface
GDI+ Basics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies