Flylib.com
Index_L
Previous page
Table of content
Next page
L
Legacy applications, 52425
LIB parameter, 134
Libraries
components , securing, 32627
defined, 322
SCF, 416
shared run-time (SRLs), 32426
system, 323
user , 32324
uses, 32223
LICENSE command, 334
Licensed files, 32736
documentation/authorization of, 329
risks, 328
securing, 32836
unauthorized, scheduled review for, 33536
Licensed operating system programs, 33034
LINKMON, 375
LISTNER utility, 33639
components, 337
defined, 336
multiple processes, 336
PORTCONF configuration file, 33738
responsibility, 336
securing, 33839
TCP/IP service file, 338
LOAD, 257
Location-independent naming, 442
Logical controls, 810
Logical Device Numbers, 163
LOGIN program, 33940
defined, 339
securing, 33940
Logon
CMON configuration, 130
non-Safeguard, 128
password issues, 130
with Safeguard, 129
Safeguard Global parameters, 13031
TACLCONF configuration, 12730
Logon controls
password- related , 11224
Safeguard, 11314
settings, 113
LOGON program, 112, 34041
defined, 340
securing, 34041
Previous page
Table of content
Next page
HP NonStop Server Security 2004
ISBN: 159059035X
EAN: N/A
Year: 2004
Pages: 157
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Basic SWT Widgets
Text Controls
Menus, Toolbars, Cool, Bars, and Actions
Drag and Drop and the Clipboard
Sample Application
Introduction to 80x86 Assembly Language and Computer Architecture
Elements of Assembly Language
Basic Instructions
Branching and Looping
Appendix D 80x86 Instructions (by Mnemonic)
Appendix E 80x86 Instructions (by Opcode)
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 1. Get Around http://maps.google.com
Hack 13. Create a Route with a Click (or Two)
Hack 44. You Got Your A9 Local in My Google Maps!
Hack 65. Add More Imagery with a WMS Interface
Hack 66. Add Your Own Custom Map
Twisted Network Programming Essentials
Adding Twisted Utilities to Your Path
Running an HTTP Proxy Server
Sharing Python Objects with Perspective Broker
Representing Users with Different Capabilities
SSH
The Oracle Hackers Handbook: Hacking and Defending Oracle
Oracle and PL/SQL
Triggers
Attacking Oracle PL/SQL Web Applications
Running Operating System Commands
Accessing the File System
GDI+ Programming with C#
The Coordinate System
Working with Brushes and Pens
Advanced Typography
Raster and Vector Images
Advanced Imaging
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies