"Multi-Operating System Networking: Living with UNIX, NetWare, and NT" [NOOK Book]

Overview

Here is all the practical, hands-on information you need to build, manage and maintain a heterogeneous computing environment with hardware, software, and network equipment from a number of different vendors. Packed with real-world case studies and proven techniques for integrating disparate platforms, operating systems and servers, Multi-Operating System Networking is a one-stop, no-nonsense guide that shows corporate end-users how to make competing products fit into their environments efficiently, effectively ...
See more details below

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$129.95
BN.com price

Overview

Here is all the practical, hands-on information you need to build, manage and maintain a heterogeneous computing environment with hardware, software, and network equipment from a number of different vendors. Packed with real-world case studies and proven techniques for integrating disparate platforms, operating systems and servers, Multi-Operating System Networking is a one-stop, no-nonsense guide that shows corporate end-users how to make competing products fit into their environments efficiently, effectively and economically.
Read More Show Less

Product Details

  • ISBN-13: 9780203997598
  • Publisher: Taylor & Francis, Inc.
  • Publication date: 11/8/1999
  • Series: Best Practices Series
  • Sold by: Barnes & Noble
  • Format: eBook
  • Pages: 1360
  • File size: 15 MB
  • Note: This product may take a few minutes to download.

Table of Contents

SECTION I INTRODUCTION
I-1 A Brief History of LAN Operating Systems
Rob Walton and Kenneth W. Kousky
I-2 Assessing Desktop Operating Systems
Randall A. Nagy
I-3 Evaluating Client/Server Operating Systems: Focus on Windows NT
Gilbert Held
I-4 Transitioning from UNIX or NetWare to Windows NT
Nathan J. Muller

SECTION II PORTING AND DEVELOPING APPLICATIONS IN A HETEROGENEOUS ENVIRONMENT
II-1 Porting Issues Due to Operating System Differences
Raj Rajagopal
II-2 Porting Applications between Heterogeneous Environments/Rewriting Applications
Raj Rajagopal
II-3 Porting GUI Programs
Adam Faldalla, Victor Matos, and Paul J. Jalics
II-4 Visual Basic and Object-Oriented Development
William R. Constable, Jr. and Il-Yeol Song
II-5 Developing New Applications in a Heterogeneous Environment
Raj Rajagopal
II-6 Accessing Windows Applications from UNIX and Vice Versa
Raj Rajagopal
II-7 Developing Workstation-Based Client/Server Applications
Steven Rabin
II-8 Using Middleware for Interoperable Systems
Raymond J. Posch
II-9 Implementing OLE on Non-Windows Platforms Using ObjectBroker
Jeff Tancill and John Parodi
II-10 Comparing Object-Oriented Development and Component-Based Development Using Visual Basic, Powerbuilder, and Visual C++
Steve Krehbiel and Narasimhaiah Gorla
II-11 Java Application Development Including Database and Network Integration
Nathan J. Muller
II-12 Using Java for Application Development and Comparison with CGI/PERL
Nathan J. Muller

SECTION III DESKTOPS IN A HETEROGENEOUS ENVIRONMENT
III-1 Enterprise Desktops and Emulators
Raj Rajagopal
III-2 Desktop Evolution Driving Connectivity Technologies
Robin L. Zak
III-3 Considerations for Implementing Corporate Intranets
Nathan J. Muller
III-4 The Mainframe as Enterprise Server
Brian Jeffery
III-5 Managing Applications on the Network
Bill Yaman and John Fiske

SECTION IV DATA ACCESS IN A HETEROGENEOUS ENVIRONMENT
IV-1 Equivalent Features of DB2, Oracle, Sybase, and Ingres
Noelle Mesick and Il-Yeol Song
IV-2 Distributed Databases
James A. Larson and Carol L. Larson
IV-3 Publishing Database Information on the World Wide Web
James A. Larson and Carol L. Larson
IV-4 Heterogeneous Network File and Print Access
Raj Rajagopal
IV-5 Using CORBA to Integrate Distributed Database Systems
Bhavani Thuraisingham
IV-6 Accessing Multiple Databases Using Federated Databases
James A. Larson and Carol L. Larson
IV-7 Database Interoperability: From Federated Database to a Mobile Federation
Antonio Si
IV-8 Database Gateways and Interoperability
Martin D. Solomon
IV-9 Managing Multiple Databases across Heterogeneous Hardware and Software Systems
James Woods
IV-10 Object-Relational DB2
Nelson Mattos, Stefan Dessloch, Linda DeMichiel, and Michael Carey
IV-11 Legacy Data Conversion
James A. Larson and Carol L. Larson

SECTION V SYSTEMS ADMINISTRATION IN A HETEROGENEOUS ENVIRONMENT
V-1 NetWare Considerations
Raj Rajagopal
V-2 Configuring Windows NT clients in a NetWare Environment
Gilbert Held
V-3 Comparing [Windows] NT and UNIX System Administration
Raj Rajagopal
V-4 Managing Distributed Network Systems Using Single Sign-On, Password Synchronization, and the Authentication Server
Jeffrey Carr
V-5 Managing Heterogeneous Environments
Raj Rajagopal
V-6 Business Continuity in the Distributed Environment
Steven P. Craig
V-7 Controlling a Multivendor Environment
Thomas Fleishman
V-8 Managing Multivendor Environments
Thomas Fleishman
V-9 The Help Desk in a Distributed Environment
John L. Connor
V-10 Job Scheduling in the Open Systems Environment
Randy Keck
V-11 Multiple Protocols: The Network Manager's Headache
Joe Pruskowski
V-12 Managing Multivendor Networks Using DEC's Polycenter Framework
Nathan J. Muller
V-13 Managing Multivendor Networks Using Hewlett-Packard's OpenView
Nathan J. Muller

SECTION VI COMMUNICATIONS IN A HETEROGENEOUS ENVIRONMENT
VI-1 The Essentials of Enterprise Networking
Keith G. Knightson
VI-2 High-Speed Services for LAN Interconnection
Nathan J. Muller
VI-3 Enterprise Network Strategies
Keith G. Knightson
VI-4 Enterprise Network Monitoring and Analysis
Colin Wynd
VI-5 Multicast Network Infrastructures
C. Kenneth Miller
VI-6 Internetworking at the Physical and Data Link Layers
David Koehler
VI-7 Planning, Designing, and Optimization of Enterprise Networks
Roshan L. Sharma
VI-8 Distributed Network Support and Control
Ira Hertzoff
VI-9 Comparing Popular E-mail Systems
Gary Cannon
VI-10 E-Mail and Internet in Heterogeneous Environments
Raj Rajagopal
VI-11 Managing Coexisting SNA and LAN Internetworks
Anura Guruge
VI-12 SNA-LAN Integration Strategies
Nathan J. Muller
VI-13 SNA Over Frame Relay
Dick Thunen
VI-14 Operating a Network [Manager's] Help Desk in a Heterogeneous Environment
Jeff C. Hafer
VI-15 An Expert Operating System That Manage Multi-Network Communications
Yemm anur Jayachandra, Hal Sanders, Gita Jayachandra

SECTION VII SECURITY IN A HETEROGENEOUS ENVIRONMENT
VII-1 Windows NT Server Security Features
Carol A. Siegel
VII-2 UNIX Security Features
Allen B. Lum
VII-3 Software Tools for Detecting Misuse on UNIX Systems
Stephen E. Smaha and Jessica Winslow
VII-4 Novell NetWare 4.X Security
Jeffrey L. Ott
VII-5 AS/400 Security Controls
Wayne O. Evans
VII-6 Implementing Kerberos in Distributed Systems
Ray Kaplan, Joe Kovara, and Glen Zorn
VII-7 E-Mail Security Using Pretty Good Privacy
William Stallings
VII-8 Introduction to Internet Security and Firewall Policies
William Hugh Murray
VII-9 Applets and Network Security
Al Berg
VII-10 Oracle Database Security
Mary Ann Davidson
VII-11 Relational Database Access Controls Using SQL
Ravi S. Sandhu

SECTION VIII DISTRIBUTED HETEROGENEOUS SYSTEMS
VIII-1 Developments and Challenges in Distributed Data Communications Management Systems
Bhavani Thuraisingham
VIII-2 Distributed Processing for Distributed Databases
Michael D. Krasowski
VIII-3 Securing Distributed Data Networks
Nathan J. Muller
VIII-4 Managing Distributed Computing
Richard Ross

SECTION IX IMPLEMENTING HETEROGENEOUS SYSTEMS

IX-1 Heterogeneous Solution Selection Factors and Guidelines
Raj Rajagopal
IX-2 Acquiring Systems for Multivendor Environments
Thomas Fleishman
IX-3 Evaluating Vendor Support Policies
James A. Papola
IX-4 WAN Network Integration: A Case Study
Charles Breakfield
IX-5 Remote LAN/WAN Connections: A Case Study
Charles Breakfield and Roxanne Burkey
IX-6 Frame Relay in an IBM Environment
Glenn R. Brown
IX-7 Turning Host Developers into Object Technicians
Steven Rabin

SECTION X AUDITING SYSTEMS
X-1 Auditing Windows NT LANs
Paul Cullen
X-2 Auditing UNIX: General, Log-In, and Superuser Security
Dan Schultes
X-3 Auditing UNIX: Security Issues, Change Control, and Disaster Recovery
Dan Schultes

APPENDIXES
Additional Information
Glossary
INDEX
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)