01982nam0 22004573i 450 VAN024932320230530101001.343N978303052279720220829d2020 |0itac50 baengCH|||| |||||Gödel's Theorems and Zermelo's AxiomsA Firm Foundation of MathematicsLorenz Halbeisen, Regula KrapfChamBirkhäuserSpringer2020x, 236 p.ill.24 cmVAN0249324Gödel's Theorems and Zermelo's Axioms290544303-XXMathematical logic and foundations [MSC 2020]VANC019750MF03ExxSet theory [MSC 2020]VANC019939MF03FxxProof theory and constructive mathematics [MSC 2020]VANC024383MF03BxxGeneral logic [MSC 2020]VANC024425MFCompleteness theoremKW:KConstructible universeKW:KIncompleteness theoremKW:KMathematical logicKW:KNon-standard modelsKW:KPeano arithmeticKW:KPresburger arithmeticKW:KSet TheoryKW:KCHChamVANL001889HalbeisenLorenz J.VANV095728767629KrapfRegulaVANV2039571253238Birkhäuser <editore>VANV108193650Springer <editore>VANV108073650ITSOL20240614RICAhttp://doi.org/10.1007/978-3-030-52279-7E-book – Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o ShibbolethBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICAIT-CE0120VAN08NVAN0249323BIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA08CONS e-book 4686 08eMF4686 20220829 Gödel's Theorems and Zermelo's Axioms2905443UNICAMPANIA09750nam 2200589Ia 450 991082491500332120200520144314.0(CKB)1000000000243432(SSID)ssj0000075250(PQKBManifestationID)11125470(PQKBTitleCode)TC0000075250(PQKBWorkID)10126811(PQKB)10280181(MiAaPQ)EBC3306817(Au-PeEL)EBL3306817(CaPaEBR)ebr10112968(OCoLC)939263249(EXLCZ)99100000000024343220040331d2004 uy 0engurcn|||||||||txtccrIBM e-business technology, solution, and design overview /[Brian R. Smith ... et al.]Student ed.Rochester, NY IBMc2004xiv, 376 p. illRedbooks"August 2004."0-7384-9781-9 Includes bibliographical references (p. 3-8) and index.Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. What e-business is -- Outline -- Learning objectives -- 1.1 This publication as a guide to your understanding -- 1.1.1 We guide -- 1.1.2 We reference -- 1.1.3 We elaborate -- 1.2 IBM Certified for e-business -- 1.2.1 IBM Certified for e-business - Solution designer -- Summary -- Key terms and concepts -- Questions -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Exercises -- Team projects -- Case study 1 -- Case study 1 questions -- Case study 2 -- Case study 2 questions -- Case study 3 -- Case study 3 questions -- Chapter 2. e-business concepts and technologies -- Outline -- Learning objectives -- 2.1 Patterns for e-business -- 2.1.1 The Patterns for e-business layered asset model -- 2.1.2 How to use the Patterns for e-business -- 2.1.3 Summary -- 2.2 Technology options -- 2.2.1 Java technology -- 2.2.2 XML -- 2.2.3 Java 2 Platform, Enterprise Edition -- 2.2.4 Presentation layer technologies -- 2.2.5 Web application server -- 2.2.6 Integration server -- 2.2.7 Protocols -- 2.2.8 Objects -- 2.2.9 Struts -- 2.2.10 Eclipse -- 2.2.11 MVC patterns -- 2.2.12 Common Object Request Broker Architecture -- 2.2.13 Transactions -- Summary -- Key terms and concepts -- Questions -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Exercises -- Team project -- Case study 1 -- Case study 1 questions -- Case study 2 -- Case study 2 questions -- Case study 3 -- Case study 3 questions -- Chapter 3. e-business infrastructure management -- Outline -- Learning objectives -- 3.1 Common Information Model -- 3.2 Infrastructure management -- 3.3 Performance and availability management -- 3.4 Performance management -- 3.4.1 Bottlenecks.3.4.2 Technologies -- 3.5 Availability management -- 3.6 IBM Tivoli performance and availability solutions -- 3.7 Configuration and operations management -- 3.7.1 Configuration and operations management overview -- 3.7.2 IBM Tivoli configuration and operations management solutions -- 3.8 Storage management -- 3.8.1 Importance of storage management -- 3.8.2 Storage management technologies -- 3.8.3 Decision hints and tips in choosing a Storage Management solution -- 3.8.4 IBM Tivoli Storage Management solutions -- 3.8.5 IBM top ten data protection recommendations -- 3.9 Suggested further reading and references -- Summary -- Key terms and concepts -- Questions -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Exercises -- Team project -- Case study 1 -- Case study 1 questions -- Case study 2 -- Case study 2 questions -- Case study 3 -- Case study 3 questions -- Chapter 4. Security -- Outline -- Learning objectives -- 4.1 Security for e-business -- 4.2 Cryptography principles -- 4.2.1 Symmetric (secret) key cryptography -- 4.2.2 Asymmetric (public) key cryptography -- 4.2.3 Digital signature algorithm -- 4.2.4 Digital certificates -- 4.3 Secure Sockets Layer protocol -- 4.3.1 Record layer protocol -- 4.3.2 Communication protocols -- 4.4 Secure Electronic Transaction protocol -- 4.5 Techniques for securing the end-to-end model -- 4.5.1 Firewalls -- 4.5.2 Directory services -- 4.5.3 Security architecture -- 4.6 WebSphere Application Server security model -- 4.7 Approaches for securing e-business solutions -- 4.7.1 Securing e-business using packet filtering and application firewalls -- 4.7.2 Securing e-business using circuit-level gateways -- 4.7.3 Securing e-business using SET -- 4.7.4 Securing e-business using VPN -- Summary -- Key terms and concepts -- Questions -- Multiple choice -- Fill in the blank.True or false -- Short answer -- Challenge -- Exercises -- Team projects -- Case study 1 -- Case study 1 questions -- Case study 2 -- Case study 2 questions -- Chapter 5. Design criteria and considerations for e-business solutions -- Outline -- Learning objectives -- 5.1 Understand current business policy -- 5.2 Validate skills needed -- 5.2.1 Solution design -- 5.2.2 Application design and development -- 5.2.3 System administration -- 5.2.4 Technical support -- 5.2.5 End user -- 5.3 Design criteria -- 5.3.1 Flexibility -- 5.3.2 Scalability -- 5.3.3 Reliability -- 5.3.4 Manageability -- 5.3.5 Security -- 5.4 Design considerations -- 5.4.1 Support -- 5.4.2 Availability and performance -- 5.4.3 Legal -- 5.4.4 Data management -- Summary -- Key terms and concepts -- Questions -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Exercises -- Team projects -- Case study 1 -- Case study 1 questions -- Case study 2 -- Case study 2 questions -- Chapter 6. Designing e-business solutions -- Outline -- Learning objectives -- 6.1 The problem space -- 6.2 e-business and objects -- 6.2.1 Development methodologies -- 6.2.2 Object-oriented concepts -- 6.3 Gather requirements -- 6.3.1 Requirements that mandate an e-business solution -- 6.3.2 Long-term business process strategies -- 6.3.3 Potential areas of technology that must be considered -- 6.3.4 Identify and evaluate key design factors to be considered -- 6.3.5 Identify business patterns and solution scenarios -- 6.3.6 Refine e-business solution scenarios based on specific client strategies and requirements -- 6.4 Document and analyze current processes and infrastructure -- 6.4.1 Identify existing processes to be affected by business solution scenario -- 6.4.2 Document the existing process work flow -- 6.4.3 Verify and document the existing infrastructure.6.4.4 Identify application and runtime patterns -- 6.4.5 Re-evaluate possible business solution scenarios in light of existing process -- 6.4.6 Describe opportunities to provide business value through the business solution scenario -- 6.5 Create a functional level e-business solution design -- 6.6 Validate the functional e-business solution design -- 6.6.1 Confirm with the customer that the proposed work flow meets the business requirements -- 6.6.2 Validate the expected benefit of the new e-business solution design -- 6.6.3 Determine the impact that the solution may have on other business processes and units -- 6.6.4 Map the immediate e-business solution design to the customer's long-term business/technology plan -- 6.6.5 Position IBM strategy as mapping to customer's long-term business objectives -- 6.7 Identify and document the specific components of design -- 6.8 Assist in proposing and justifying the solution -- 6.8.1 Solution mapping -- 6.8.2 Map the design considerations to the proposal evaluation criteria to ensure the proposal meets or exceeds the customer standards for acceptance -- 6.8.3 Provide the design expertise to deal with customer objections -- 6.8.4 Support trade-off and alternative proposals -- 6.8.5 Assist in justifying the business value of the proposed e-business solution -- 6.9 Assist the project management team to ensure successful implementation -- Summary -- Key terms and concepts -- Questions -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Exercises -- Case study 1 -- Case study 1 questions -- Case study 2 -- Case study 2 questions -- Case study 3 -- Case study 3 questions -- Appendix A. Answers -- Chapter 1 -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Chapter 2 -- Multiple choice -- Fill in the blank -- True or false -- Short answer.Challenge -- Chapter 3 -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Chapter 4 -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Chapter 5 -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Chapter 6 -- Multiple choice -- Fill in the blank -- True or false -- Short answer -- Challenge -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover.IBM redbooks.Electronic commerceInformation technologyElectronic commerce.Information technology.658.8/72/0285Smith Brian Robert1962-1711466International Business Machines Corporation.International Technical Support Organization.MiAaPQMiAaPQMiAaPQBOOK9910824915003321IBM e-business technology, solution, and design overview4102775UNINA