top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Free-format RPG IV [[electronic resource]] / Jim Martin
Free-format RPG IV [[electronic resource]] / Jim Martin
Autore Martin Jim
Edizione [2nd ed.]
Pubbl/distr/stampa Boise, Idaho, : MC Press, c2013
Descrizione fisica 1 online resource (225 p.)
Disciplina 005.242
Soggetto topico RPG IV (Computer program language)
Soggetto genere / forma Electronic books.
ISBN 1-58347-714-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Title Page; Copyright Page; Dedication; Acknowledgments; Contents; Preface to the Second Edition; A Note About Source Entry; Chapter 1: Pre-Free-Format RPG IV ; RPG IV; Extended Factor 2 ; Built-in Functions; Subprocedures3; Other Changes ; Some "Baggage" That Came Along ; The Future ; Chapter 2: The Case for Free-Format RPG ; Easier to Read and Maintain; Good Field Naming ; Indenting; Use of Comments ; No; Goto; Operations ; Conclusions ; A "Modern" Programming Style; Free-Format RPG IV and C ; Free-Format RPG IV and Java; Conclusions; Being "Current"
The Programmer's Perspective Management's Perspective ; Conclusions; Check It Out ; Chapter 3: Introducing Free-Format RPG IV ; Free-Format Operation Codes ; Evaluate ; If ..................................................................................................................... 26; Controlled Looping ........................................................................................ 27; Mathematics ................................................................................................... 28
Character Strings ............................................................................................ 29The Free-Format Code Block; Coding Free-Format Operations; Naming Variables; Programming Style; A Note About Case ; Programming Style Issues ; Mixing Formats .............................................................................................. 29; Keyed Access ................................................................................................. 32; Named Indicators ........................................................................................... 33
Naming File Indicators .................................................................................. 33Summing Up ; Chapter 4: Input/Output Using Free Format ; Database Input; %Eof; %Found; %Error; %Equal; Data Area Input ; Database Output ; Write; Update; Delete; Except; Workstation I/O ; Write/Read ; Write; Read; ICF I/O ; Dsply; Printer Output ; Overflow Indicator ; Write; Except; Chapter 5: Program Flow Using Free Format ; The If Group; If; Else; Elseif; Endif; The Do Operations; Do While ; Do Until ; Dow and Dou Differences; For; Loop Interrupt; Leave; Iter; The Select Group; Select
Operations Absent in Free FormatChapter 6: Embedded SQL Operations Using Free Format ; Database and Embedded SQL ; Fixed-Format Method ; Free-Format Method ; Chapter 7: Data-Manipulation Operations Using Free Format .................... 65; Assignment Statements ; Eval Operation: Numeric ; Eval Operation: Character ; Evaluate Right (EvalR) Operation ; Operation: IS,OC ; Evaluate vs. Move ; Built-in Functions ; Converting Decimal to Character ; Converting Character to Packed Decimal ; Substringing ; Replace; Scan and Replace ; Concatenation and Trim; Converting Character to Integer
Extracting Size, Length, and Decimal Positions
Record Nr. UNINA-9910453221803321
Martin Jim  
Boise, Idaho, : MC Press, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Free-format RPG IV [[electronic resource]] / Jim Martin
Free-format RPG IV [[electronic resource]] / Jim Martin
Autore Martin Jim
Edizione [2nd ed.]
Pubbl/distr/stampa Boise, Idaho, : MC Press, c2013
Descrizione fisica 1 online resource (225 p.)
Disciplina 005.242
Soggetto topico RPG IV (Computer program language)
ISBN 1-58347-714-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Title Page; Copyright Page; Dedication; Acknowledgments; Contents; Preface to the Second Edition; A Note About Source Entry; Chapter 1: Pre-Free-Format RPG IV ; RPG IV; Extended Factor 2 ; Built-in Functions; Subprocedures3; Other Changes ; Some "Baggage" That Came Along ; The Future ; Chapter 2: The Case for Free-Format RPG ; Easier to Read and Maintain; Good Field Naming ; Indenting; Use of Comments ; No; Goto; Operations ; Conclusions ; A "Modern" Programming Style; Free-Format RPG IV and C ; Free-Format RPG IV and Java; Conclusions; Being "Current"
The Programmer's Perspective Management's Perspective ; Conclusions; Check It Out ; Chapter 3: Introducing Free-Format RPG IV ; Free-Format Operation Codes ; Evaluate ; If ..................................................................................................................... 26; Controlled Looping ........................................................................................ 27; Mathematics ................................................................................................... 28
Character Strings ............................................................................................ 29The Free-Format Code Block; Coding Free-Format Operations; Naming Variables; Programming Style; A Note About Case ; Programming Style Issues ; Mixing Formats .............................................................................................. 29; Keyed Access ................................................................................................. 32; Named Indicators ........................................................................................... 33
Naming File Indicators .................................................................................. 33Summing Up ; Chapter 4: Input/Output Using Free Format ; Database Input; %Eof; %Found; %Error; %Equal; Data Area Input ; Database Output ; Write; Update; Delete; Except; Workstation I/O ; Write/Read ; Write; Read; ICF I/O ; Dsply; Printer Output ; Overflow Indicator ; Write; Except; Chapter 5: Program Flow Using Free Format ; The If Group; If; Else; Elseif; Endif; The Do Operations; Do While ; Do Until ; Dow and Dou Differences; For; Loop Interrupt; Leave; Iter; The Select Group; Select
Operations Absent in Free FormatChapter 6: Embedded SQL Operations Using Free Format ; Database and Embedded SQL ; Fixed-Format Method ; Free-Format Method ; Chapter 7: Data-Manipulation Operations Using Free Format .................... 65; Assignment Statements ; Eval Operation: Numeric ; Eval Operation: Character ; Evaluate Right (EvalR) Operation ; Operation: IS,OC ; Evaluate vs. Move ; Built-in Functions ; Converting Decimal to Character ; Converting Character to Packed Decimal ; Substringing ; Replace; Scan and Replace ; Concatenation and Trim; Converting Character to Integer
Extracting Size, Length, and Decimal Positions
Record Nr. UNINA-9910790514903321
Martin Jim  
Boise, Idaho, : MC Press, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Free-format RPG IV [[electronic resource]] / Jim Martin
Free-format RPG IV [[electronic resource]] / Jim Martin
Autore Martin Jim
Edizione [2nd ed.]
Pubbl/distr/stampa Boise, Idaho, : MC Press, c2013
Descrizione fisica 1 online resource (225 p.)
Disciplina 005.242
Soggetto topico RPG IV (Computer program language)
ISBN 1-58347-714-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Title Page; Copyright Page; Dedication; Acknowledgments; Contents; Preface to the Second Edition; A Note About Source Entry; Chapter 1: Pre-Free-Format RPG IV ; RPG IV; Extended Factor 2 ; Built-in Functions; Subprocedures3; Other Changes ; Some "Baggage" That Came Along ; The Future ; Chapter 2: The Case for Free-Format RPG ; Easier to Read and Maintain; Good Field Naming ; Indenting; Use of Comments ; No; Goto; Operations ; Conclusions ; A "Modern" Programming Style; Free-Format RPG IV and C ; Free-Format RPG IV and Java; Conclusions; Being "Current"
The Programmer's Perspective Management's Perspective ; Conclusions; Check It Out ; Chapter 3: Introducing Free-Format RPG IV ; Free-Format Operation Codes ; Evaluate ; If ..................................................................................................................... 26; Controlled Looping ........................................................................................ 27; Mathematics ................................................................................................... 28
Character Strings ............................................................................................ 29The Free-Format Code Block; Coding Free-Format Operations; Naming Variables; Programming Style; A Note About Case ; Programming Style Issues ; Mixing Formats .............................................................................................. 29; Keyed Access ................................................................................................. 32; Named Indicators ........................................................................................... 33
Naming File Indicators .................................................................................. 33Summing Up ; Chapter 4: Input/Output Using Free Format ; Database Input; %Eof; %Found; %Error; %Equal; Data Area Input ; Database Output ; Write; Update; Delete; Except; Workstation I/O ; Write/Read ; Write; Read; ICF I/O ; Dsply; Printer Output ; Overflow Indicator ; Write; Except; Chapter 5: Program Flow Using Free Format ; The If Group; If; Else; Elseif; Endif; The Do Operations; Do While ; Do Until ; Dow and Dou Differences; For; Loop Interrupt; Leave; Iter; The Select Group; Select
Operations Absent in Free FormatChapter 6: Embedded SQL Operations Using Free Format ; Database and Embedded SQL ; Fixed-Format Method ; Free-Format Method ; Chapter 7: Data-Manipulation Operations Using Free Format .................... 65; Assignment Statements ; Eval Operation: Numeric ; Eval Operation: Character ; Evaluate Right (EvalR) Operation ; Operation: IS,OC ; Evaluate vs. Move ; Built-in Functions ; Converting Decimal to Character ; Converting Character to Packed Decimal ; Substringing ; Replace; Scan and Replace ; Concatenation and Trim; Converting Character to Integer
Extracting Size, Length, and Decimal Positions
Record Nr. UNINA-9910815528803321
Martin Jim  
Boise, Idaho, : MC Press, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury
Autore Woodbury Carol
Edizione [1st ed.]
Pubbl/distr/stampa Ketchum, ID, : MC Press, 2012
Descrizione fisica 1 online resource (429 p.)
Disciplina 005
Soggetto topico Computer security
IBM computers - Programming
Soggetto genere / forma Electronic books.
ISBN 1-58347-703-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 - Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 - Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 - Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 - The Facts About User Profiles
What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 - Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 - Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions
Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 - Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 - Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 - Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media
Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 - Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 - Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security
Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 - Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 - Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 - Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function
Security for Vendors and Consultants
Record Nr. UNINA-9910453114603321
Woodbury Carol  
Ketchum, ID, : MC Press, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury
Autore Woodbury Carol
Edizione [1st ed.]
Pubbl/distr/stampa Ketchum, ID, : MC Press, 2012
Descrizione fisica 1 online resource (429 p.)
Disciplina 005
Soggetto topico Computer security
IBM computers - Programming
ISBN 1-58347-703-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 - Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 - Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 - Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 - The Facts About User Profiles
What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 - Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 - Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions
Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 - Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 - Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 - Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media
Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 - Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 - Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security
Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 - Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 - Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 - Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function
Security for Vendors and Consultants
Record Nr. UNINA-9910790634303321
Woodbury Carol  
Ketchum, ID, : MC Press, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury
Autore Woodbury Carol
Edizione [1st ed.]
Pubbl/distr/stampa Ketchum, ID, : MC Press, 2012
Descrizione fisica 1 online resource (429 p.)
Disciplina 005
Soggetto topico Computer security
IBM computers - Programming
ISBN 1-58347-703-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 - Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 - Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 - Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 - The Facts About User Profiles
What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 - Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 - Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions
Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 - Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 - Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 - Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media
Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 - Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 - Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security
Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 - Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 - Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 - Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function
Security for Vendors and Consultants
Record Nr. UNINA-9910814974503321
Woodbury Carol  
Ketchum, ID, : MC Press, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani
Autore Dattani Dinesh D
Edizione [First edition.]
Pubbl/distr/stampa Boise, ID : , : MC Press, , 2013
Descrizione fisica 1 online resource (225 p.)
Disciplina 005.265
Soggetto topico Computer security
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-58347-831-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Securing business data -- pt. 2. Securing the z/OS operating system -- pt. 3. Security infrastructure matters.
Record Nr. UNINA-9910453220903321
Dattani Dinesh D  
Boise, ID : , : MC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani
Autore Dattani Dinesh D
Edizione [First edition.]
Pubbl/distr/stampa Boise, ID : , : MC Press, , 2013
Descrizione fisica 1 online resource (225 p.)
Disciplina 005.265
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-58347-831-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Securing business data -- pt. 2. Securing the z/OS operating system -- pt. 3. Security infrastructure matters.
Record Nr. UNINA-9910790517103321
Dattani Dinesh D  
Boise, ID : , : MC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani
Autore Dattani Dinesh D
Edizione [First edition.]
Pubbl/distr/stampa Boise, ID : , : MC Press, , 2013
Descrizione fisica 1 online resource (225 p.)
Disciplina 005.265
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-58347-831-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Securing business data -- pt. 2. Securing the z/OS operating system -- pt. 3. Security infrastructure matters.
Record Nr. UNINA-9910815529803321
Dattani Dinesh D  
Boise, ID : , : MC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui