Learning Visually with Examples [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Learning Visually with Examples [Electronic resources] - نسخه متنی

Raul F. Chong, Clara Liu, Sylvia F. Qi, Dwaine R. Snow

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

Access paths

Access plans

definition

displaying 2nd

performance 2nd

Access profiles

configuring connections 2nd 3rd 4th 5th 6th 7th 8th

definition 2nd

exporting 2nd 3rd

importing 2nd 3rd 4th 5th 6th

Access tokens 2nd 3rd

activate database command

ACTIVATE DATABASE command

ACTIVATE NOT LOGGED INITIALLY clause

Active log directory

Active logs 2nd 3rd

Active subagents

Activity Monitor

definition

monitoring performance 2nd 3rd

troubleshooting locking problems 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

uses for

ADD clause

Add Database Wizard

configuring connections manually
[See CA (Configuration Assistant]

configuring connections with Discovery
[See CA (Configuration Assistant]

illustrations

communication protocols, selecting
[See CA (Configuration Assistant]

configuration methods
[See CA (Configuration Assistant]

connecting with known discovery
[See CA (Configuration Assistant]

database names, specifying
[See CA (Configuration Assistant]

databases, registering
[See CA (Configuration Assistant]

databases, selecting by profile
[See CA (Configuration Assistant]

network search results
[See CA (Configuration Assistant]

node options, specifying
[See CA (Configuration Assistant]

registering a database
[See CA (Configuration Assistant]

security options, specifying
[See CA (Configuration Assistant]

specifying database alias
[See CA (Configuration Assistant]

system options, specifying
[See CA (Configuration Assistant]

TCP/IP parameters, selecting
[See CA (Configuration Assistant]

testing connections
[See CA (Configuration Assistant]

importing access profiles
[See CA (Configuration Assistant]

known discovery
[See CA (Configuration Assistant]

search discovery
[See CA (Configuration Assistant]

Address space

Address Windowing Extensions (AWE) 2nd 3rd

admin_priority keyword

Administration clients

Administration notification logs

definition

examples 2nd 3rd

FFDC (first-failure data capture) 2nd

Administrative authority 2nd 3rd 4th 5th 6th 7th 8th 9th

Administrative authorization

Administrators

Advanced Peer-to-Peer Networking (APPN)

Advanced Program-to-Program Communication (APPC)

After trigger

AFTER triggers 2nd

Agent pool, configuring instances 2nd

Agent private memory

Agentlevel operations memory

Agentlevel private memory 2nd 3rd

Agents

active subagents

associated (idle) subagents

case study

coordinator agents 2nd 3rd 4th 5th

coordinator partitions

definition

monitoring and tuning 2nd 3rd

unassociated subagents 2nd

Alert notification feature 2nd 3rd

Alerts

Aliases

allow no access option 2nd 3rd

allow read access option

allow write access option

ALTER BUFFERPOOL statement 2nd

ALTER DATABASE PARTITION GROUP statement 2nd

ALTER PROCEDURE statement

ALTER SEQUENCE statement, uses for

ALTER statement

ALTER TABLE statement

adding columns 2nd

locking tables 2nd

ALTER TABLESPACE statement 2nd 3rd 4th 5th 6th 7th 8th

ALTERIN schema privilege 2nd 3rd

Ambiguous cursors

American National Standard Code for Information Interchange (ASCII)

ANYORDER modifier

APAR (authorized program analysis report)

API (application programming interface)

definition

modifying isolation levels

APPC (Advanced Program-to-Program Communication)

APPL

Application control heap 2nd 3rd

Application Development Client 2nd

Application group shared heap 2nd 3rd

Application group shared memory 2nd 3rd

Application IDs

Application names

Application programming interface (API)
[See API (application programming interface]

Application requesters

Application servers

Application shared memory

Application-level EDUs 2nd 3rd 4th

Application-level operations memory

Applications

APPN (Advanced Peer-to-Peer Networking)

Archival logging 2nd 3rd 4th 5th

Archived logs

ARCHRETRYDELAY parameter

ASC (nondelimited ASCII)

ASC (nondelimited ASCII) format

ASCII (American National Standard Code for Information Interchange)

Associated (idle) subagents

AST (automatic summary table)

ASYNC (Asynchronous) mode 2nd 3rd 4th

Asynchronous (ASYNC) mode 2nd 3rd 4th

Asynchronous I/O

Attach

attach command 2nd

Attachments

versus connections

Authenticating users

at the client
[See security]

at the server
[See security]

DRDA clients
[See security]

encryption
[See security]

GSSAPI plugins
[See security]

trusted clients
[See security]

untrusted clients
[See security]

with Kerberos
[See security]

Authentication

definition
[See security]

type

client, summary table of
[See security]

configuring at a client
[See security]

configuring at a server
[See security]

server, summary table of
[See security]

AUTHENTICATION parameter 2nd 3rd 4th

Authorities, storing and retrieving 2nd 3rd 4th 5th 6th

Authority

Authorization

Authorization ID

Authorized program analysis report (APAR)

Autocommit 2nd

autoconfigure command 2nd

Automatic configuration parameters

Automatic summary table (AST)

Autonomic computing systems

Autonomic ondemand business model

Average active applications 2nd

AVG_APPLS parameter

AWE (Address Windowing Extensions) 2nd 3rd

/ 312