Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Patterns for E-Business
Table 1-1: The four primary Business patterns
Table 1-2: Integration patterns
Table 1-3: Composite patterns
Chapter 2: Fundamental Concepts in Process Integration
Table 2-1: Synchronous verses asynchronous terminology overload
Chapter 3: Application Integration
Table 3-1: Business drivers
Table 3-2: IT drivers
Table 3-3: Direct Connection variation versus Web service type
Table 3-4: Relationship to old Process-focused Application Integration patterns
Chapter 4: Extended Enterprise
Table 4-1: Cross-industry examples
Table 4-2: Industry-specific examples
Table 4-3: Business drivers
Table 4-4: IT drivers
Table 4-5: Relationship to old Extended Enterprise patterns
Chapter 6: Business Scenarios Used in this Book
Table 6-1: Retail system actor details
Table 6-2: Wholesale system actor details
Table 6-3: Use case 001: Update inventory
Table 6-4: Use case 002: Get delivery date
Table 6-5: Retail system actor details
Chapter 12: Using J2EE Connectors
Table 12-1: CICS ECI and EPI characteristics
< Day Day Up >
Previous page
Table of content
Next page
Patterns Direct Connections for Intra- And Inter-Enterprise. Direct Connections for Intra- And Inter-Enterprise (IBM Redbook) (Paperback)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 139
BUY ON AMAZON
Qshell for iSeries
Additional Control Structures
Functions
Sed
The Perl Utility
Appendix A Summary of Changes by Release
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Understanding SQL Subqueries
Writing External Applications to Query and Manipulate Database Data
Retrieving and Manipulating Data Through Cursors
Working with SQL Database Data Across the Internet
The CISSP and CAP Prep Guide: Platinum Edition
Application Security
Business Continuity Planning and Disaster Recovery Planning
Legal, Regulations, Compliance, and Investigations
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Appendix G Control Baselines
A Practitioners Guide to Software Test Design
Boundary Value Testing
Section III - Testing Paradigms
Scripted Testing
When to Stop Testing
Appendix A Brown & Donaldson Case Study
SQL Hacks
Hack 12. Simplify Complicated Updates
Hack 13. Choose the Right Join Style for Your Relationships
Hack 30. Calculate the Maximum of Two Fields
Hack 55. Import Someone Elses Data
Hack 64. Determine Your Isolation Level
FileMaker 8 Functions and Scripts Desk Reference
Case()
PatternCount()
RomanZenkaku()
Working Quickly, Saving Time
About Network Ports
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies