Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Patterns for E-Business
Table 1-1: The four primary Business patterns
Table 1-2: Integration patterns
Table 1-3: Composite patterns
Chapter 2: Fundamental Concepts in Process Integration
Table 2-1: Synchronous verses asynchronous terminology overload
Chapter 3: Application Integration
Table 3-1: Business drivers
Table 3-2: IT drivers
Table 3-3: Direct Connection variation versus Web service type
Table 3-4: Relationship to old Process-focused Application Integration patterns
Chapter 4: Extended Enterprise
Table 4-1: Cross-industry examples
Table 4-2: Industry-specific examples
Table 4-3: Business drivers
Table 4-4: IT drivers
Table 4-5: Relationship to old Extended Enterprise patterns
Chapter 6: Business Scenarios Used in this Book
Table 6-1: Retail system actor details
Table 6-2: Wholesale system actor details
Table 6-3: Use case 001: Update inventory
Table 6-4: Use case 002: Get delivery date
Table 6-5: Retail system actor details
Chapter 12: Using J2EE Connectors
Table 12-1: CICS ECI and EPI characteristics
< Day Day Up >
Previous page
Table of content
Next page
Patterns Direct Connections for Intra- And Inter-Enterprise. Direct Connections for Intra- And Inter-Enterprise (IBM Redbook) (Paperback)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 139
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Looping Commands
Basic Graphics Commands
Playing Some Tunes CD Audio, MIDI and MP3 Music
Multiplayer Programming The Crazy Carnage Game
Epilogue
Snort Cookbook
Installing Snort on Windows
Tapping a Wireless Network
Building a Distributed IDS (Encrypted)
Blocking Attacks in Real Time
Generating Statistical Output from Snort Databases
101 Microsoft Visual Basic .NET Applications
Data Access
Working with Console Applications
Advanced .NET Framework
GDI+
Windows Server 2003 for .NET Developers
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and Computers
Credibility and the World Wide Web
Comparing, Designing, and Deploying VPNs
VPN Devices
L2TPv3 Pseudowire Operation
Supporting Multicast Transport in MPLS Layer 3 VPNs
Integrating L2TP Remote Access VPNs with MPLS VPNs
User Interfaces in C#: Windows Forms and Custom Controls
Creating Usable Interfaces
Control Class Basics
Classic Controls
Design-Time Support for Custom Controls
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies