ABSTRACT
Here is all the practical, hands-on information you need to build, manage and maintain a heterogeneous computing environment with hardware, software, and network equipment from a number of different vendors. Packed with real-world case studies and proven techniques for integrating disparate platforms, operating systems and servers, Multi-Operating
TABLE OF CONTENTS
part |2 pages
Section I Introduction
chapter |10 pages
A Brief History of LAN Operating Systems
chapter |16 pages
Assessing Desktop Operating Systems
chapter |8 pages
Evaluating Client/Server Operating Systems: Focus on Windows NT
chapter |12 pages
Transitioning to Windows NT
part |6 pages
Section II Porting and Developing Applications in a Heterogeneous Environment
chapter |38 pages
Porting Issues Caused by Operating System Differences
chapter |16 pages
Porting GUI Programs
chapter |26 pages
Visual Basic and Object-Oriented Development
chapter |34 pages
Developing New Applications in a Heterogeneous Environment
chapter |30 pages
Accessing Windows Applications from UNIX and Vice Versa
chapter |12 pages
Developing Workstation-Based Client/Server Applications
chapter |12 pages
Using Middleware for Interoperable Systems
chapter |8 pages
Implementing OLE on Non-Windows Platforms Using ObjectBroker
chapter |10 pages
Using Java for Application Development and Comparison with CGI/PERL
part |2 pages
Section III Desktops in a Heterogeneous Environment
chapter |16 pages
Enterprise Desktops and Emulators
chapter |12 pages
Desktop Evolution Driving Connectivity Technologies
chapter |12 pages
Considerations for Implementing Corporate Intranets
chapter |14 pages
The Mainframe as Enterprise Server
chapter |12 pages
Managing Applications on the Network
part |4 pages
Section IV Data Access in a Heterogeneous Environment
chapter |32 pages
Equivalent Features of DB2, Oracle, Sybase, and Ingres
chapter |10 pages
Distributed Databases
chapter |8 pages
Publishing Database Information on the World Wide Web
chapter |22 pages
Heterogeneous Network File and Print Access
chapter |8 pages
Using CORBA to Integrate Database Systems
chapter |10 pages
Federated Database Systems
chapter |10 pages
Database Gateways and Interoperability
chapter |10 pages
Object-Relational DB2
chapter |12 pages
Legacy Data Conversion
part |6 pages
Section V Systems Administration in a Heterogeneous Environment
chapter |26 pages
NetWare Considerations
chapter |10 pages
Configuring Windows NT in a NetWare Environment
chapter |22 pages
Comparing Windows NT and UNIX System Administration
chapter |14 pages
Managing Heterogeneous Environments
chapter |16 pages
Business Continuity in the Distributed Environment
chapter |10 pages
Controlling a Multivendor Environment
chapter |12 pages
The Help Desk in a Distributed Environment
chapter |8 pages
Job Scheduling in the Open Systems Environment
chapter |6 pages
Multiple Protocols: The Network Manager’s Headache
chapter |8 pages
Managing Multivendor Networks Using DEC’s Polycenter Framework
chapter |10 pages
Managing Multivendor Networks Using Hewlett-Packard’s OpenView
part |4 pages
Section VI Communications in a Heterogeneous Environment
chapter |16 pages
The Essentials of Enterprise Networking
chapter |18 pages
High-Speed Services for LAN Interconnection
chapter |14 pages
Enterprise Network Monitoring and Analysis
chapter |12 pages
Multicast Network Infrastructures
chapter |26 pages
Internetworking at the Physical and Data Link Layers
chapter |18 pages
Planning, Designing and Optimization of Enterprise Networks
chapter |12 pages
Distributed Network Support and Control
chapter |14 pages
Comparing Popular E-mail Systems
chapter |18 pages
E-mail and Internet in Heterogeneous Environments
chapter |20 pages
Managing Coexisting SNA and LAN Internetworks
chapter |14 pages
SNA-LAN Integration Strategies
chapter |18 pages
SNA Over Frame Relay
chapter |18 pages
An Expert Operating System That Manages Multinetwork Communications
part |4 pages
Section VII Security in a Heterogeneous Environment
chapter |10 pages
Windows NT Server Security Features
chapter |20 pages
UNIX Security Features
chapter |12 pages
Software Tools for Detecting Misuse on Unix Systems
chapter |16 pages
Novell NetWare 4.X Security
chapter |20 pages
Implementing AS/400 Security Controls
chapter |20 pages
Implementing Kerberos in Distributed Systems
chapter |20 pages
E-mail Security Using Pretty Good Privacy
chapter |20 pages
An Introduction to Internet Security and Firewall Policies
chapter |8 pages
Applets and Network Security
chapter |14 pages
Oracle Database Security
chapter |18 pages
Relational Database Access Controls Using SQL
part |2 pages
Section VIII Distributed Heterogeneous Systems
chapter |10 pages
Distributed Processing for Distributed Databases
chapter |12 pages
Securing Distributed Data Networks
chapter |14 pages
Managing Distributed Computing
part |2 pages
Section IX Implementing Heterogeneous Systems
chapter |10 pages
Solution Selection Factors and Guidelines
chapter |8 pages
Acquiring Systems for Multivendor Environments
chapter |8 pages
Evaluating Vendor Support Policies
chapter |14 pages
WAN Network Integration: A Case Study
chapter |22 pages
Remote LAN/WAN Connections: A Case Study
chapter |10 pages
Frame Relay in an IBM Environment
chapter |18 pages
Turning Host Developers into Object Technicians
part |2 pages
Section X Auditing Systems