Free-format RPG IV [[electronic resource]] / Jim Martin |
Autore | Martin Jim |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Boise, Idaho, : MC Press, c2013 |
Descrizione fisica | 1 online resource (225 p.) |
Disciplina | 005.242 |
Soggetto topico | RPG IV (Computer program language) |
Soggetto genere / forma | Electronic books. |
ISBN | 1-58347-714-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Title Page; Copyright Page; Dedication; Acknowledgments; Contents; Preface to the Second Edition; A Note About Source Entry; Chapter 1: Pre-Free-Format RPG IV ; RPG IV; Extended Factor 2 ; Built-in Functions; Subprocedures3; Other Changes ; Some "Baggage" That Came Along ; The Future ; Chapter 2: The Case for Free-Format RPG ; Easier to Read and Maintain; Good Field Naming ; Indenting; Use of Comments ; No; Goto; Operations ; Conclusions ; A "Modern" Programming Style; Free-Format RPG IV and C ; Free-Format RPG IV and Java; Conclusions; Being "Current"
The Programmer's Perspective Management's Perspective ; Conclusions; Check It Out ; Chapter 3: Introducing Free-Format RPG IV ; Free-Format Operation Codes ; Evaluate ; If ..................................................................................................................... 26; Controlled Looping ........................................................................................ 27; Mathematics ................................................................................................... 28 Character Strings ............................................................................................ 29The Free-Format Code Block; Coding Free-Format Operations; Naming Variables; Programming Style; A Note About Case ; Programming Style Issues ; Mixing Formats .............................................................................................. 29; Keyed Access ................................................................................................. 32; Named Indicators ........................................................................................... 33 Naming File Indicators .................................................................................. 33Summing Up ; Chapter 4: Input/Output Using Free Format ; Database Input; %Eof; %Found; %Error; %Equal; Data Area Input ; Database Output ; Write; Update; Delete; Except; Workstation I/O ; Write/Read ; Write; Read; ICF I/O ; Dsply; Printer Output ; Overflow Indicator ; Write; Except; Chapter 5: Program Flow Using Free Format ; The If Group; If; Else; Elseif; Endif; The Do Operations; Do While ; Do Until ; Dow and Dou Differences; For; Loop Interrupt; Leave; Iter; The Select Group; Select Operations Absent in Free FormatChapter 6: Embedded SQL Operations Using Free Format ; Database and Embedded SQL ; Fixed-Format Method ; Free-Format Method ; Chapter 7: Data-Manipulation Operations Using Free Format .................... 65; Assignment Statements ; Eval Operation: Numeric ; Eval Operation: Character ; Evaluate Right (EvalR) Operation ; Operation: IS,OC ; Evaluate vs. Move ; Built-in Functions ; Converting Decimal to Character ; Converting Character to Packed Decimal ; Substringing ; Replace; Scan and Replace ; Concatenation and Trim; Converting Character to Integer Extracting Size, Length, and Decimal Positions |
Record Nr. | UNINA-9910453221803321 |
Martin Jim
![]() |
||
Boise, Idaho, : MC Press, c2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Free-format RPG IV [[electronic resource]] / Jim Martin |
Autore | Martin Jim |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Boise, Idaho, : MC Press, c2013 |
Descrizione fisica | 1 online resource (225 p.) |
Disciplina | 005.242 |
Soggetto topico | RPG IV (Computer program language) |
ISBN | 1-58347-714-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Title Page; Copyright Page; Dedication; Acknowledgments; Contents; Preface to the Second Edition; A Note About Source Entry; Chapter 1: Pre-Free-Format RPG IV ; RPG IV; Extended Factor 2 ; Built-in Functions; Subprocedures3; Other Changes ; Some "Baggage" That Came Along ; The Future ; Chapter 2: The Case for Free-Format RPG ; Easier to Read and Maintain; Good Field Naming ; Indenting; Use of Comments ; No; Goto; Operations ; Conclusions ; A "Modern" Programming Style; Free-Format RPG IV and C ; Free-Format RPG IV and Java; Conclusions; Being "Current"
The Programmer's Perspective Management's Perspective ; Conclusions; Check It Out ; Chapter 3: Introducing Free-Format RPG IV ; Free-Format Operation Codes ; Evaluate ; If ..................................................................................................................... 26; Controlled Looping ........................................................................................ 27; Mathematics ................................................................................................... 28 Character Strings ............................................................................................ 29The Free-Format Code Block; Coding Free-Format Operations; Naming Variables; Programming Style; A Note About Case ; Programming Style Issues ; Mixing Formats .............................................................................................. 29; Keyed Access ................................................................................................. 32; Named Indicators ........................................................................................... 33 Naming File Indicators .................................................................................. 33Summing Up ; Chapter 4: Input/Output Using Free Format ; Database Input; %Eof; %Found; %Error; %Equal; Data Area Input ; Database Output ; Write; Update; Delete; Except; Workstation I/O ; Write/Read ; Write; Read; ICF I/O ; Dsply; Printer Output ; Overflow Indicator ; Write; Except; Chapter 5: Program Flow Using Free Format ; The If Group; If; Else; Elseif; Endif; The Do Operations; Do While ; Do Until ; Dow and Dou Differences; For; Loop Interrupt; Leave; Iter; The Select Group; Select Operations Absent in Free FormatChapter 6: Embedded SQL Operations Using Free Format ; Database and Embedded SQL ; Fixed-Format Method ; Free-Format Method ; Chapter 7: Data-Manipulation Operations Using Free Format .................... 65; Assignment Statements ; Eval Operation: Numeric ; Eval Operation: Character ; Evaluate Right (EvalR) Operation ; Operation: IS,OC ; Evaluate vs. Move ; Built-in Functions ; Converting Decimal to Character ; Converting Character to Packed Decimal ; Substringing ; Replace; Scan and Replace ; Concatenation and Trim; Converting Character to Integer Extracting Size, Length, and Decimal Positions |
Record Nr. | UNINA-9910790514903321 |
Martin Jim
![]() |
||
Boise, Idaho, : MC Press, c2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Free-format RPG IV [[electronic resource]] / Jim Martin |
Autore | Martin Jim |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Boise, Idaho, : MC Press, c2013 |
Descrizione fisica | 1 online resource (225 p.) |
Disciplina | 005.242 |
Soggetto topico | RPG IV (Computer program language) |
ISBN | 1-58347-714-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Title Page; Copyright Page; Dedication; Acknowledgments; Contents; Preface to the Second Edition; A Note About Source Entry; Chapter 1: Pre-Free-Format RPG IV ; RPG IV; Extended Factor 2 ; Built-in Functions; Subprocedures3; Other Changes ; Some "Baggage" That Came Along ; The Future ; Chapter 2: The Case for Free-Format RPG ; Easier to Read and Maintain; Good Field Naming ; Indenting; Use of Comments ; No; Goto; Operations ; Conclusions ; A "Modern" Programming Style; Free-Format RPG IV and C ; Free-Format RPG IV and Java; Conclusions; Being "Current"
The Programmer's Perspective Management's Perspective ; Conclusions; Check It Out ; Chapter 3: Introducing Free-Format RPG IV ; Free-Format Operation Codes ; Evaluate ; If ..................................................................................................................... 26; Controlled Looping ........................................................................................ 27; Mathematics ................................................................................................... 28 Character Strings ............................................................................................ 29The Free-Format Code Block; Coding Free-Format Operations; Naming Variables; Programming Style; A Note About Case ; Programming Style Issues ; Mixing Formats .............................................................................................. 29; Keyed Access ................................................................................................. 32; Named Indicators ........................................................................................... 33 Naming File Indicators .................................................................................. 33Summing Up ; Chapter 4: Input/Output Using Free Format ; Database Input; %Eof; %Found; %Error; %Equal; Data Area Input ; Database Output ; Write; Update; Delete; Except; Workstation I/O ; Write/Read ; Write; Read; ICF I/O ; Dsply; Printer Output ; Overflow Indicator ; Write; Except; Chapter 5: Program Flow Using Free Format ; The If Group; If; Else; Elseif; Endif; The Do Operations; Do While ; Do Until ; Dow and Dou Differences; For; Loop Interrupt; Leave; Iter; The Select Group; Select Operations Absent in Free FormatChapter 6: Embedded SQL Operations Using Free Format ; Database and Embedded SQL ; Fixed-Format Method ; Free-Format Method ; Chapter 7: Data-Manipulation Operations Using Free Format .................... 65; Assignment Statements ; Eval Operation: Numeric ; Eval Operation: Character ; Evaluate Right (EvalR) Operation ; Operation: IS,OC ; Evaluate vs. Move ; Built-in Functions ; Converting Decimal to Character ; Converting Character to Packed Decimal ; Substringing ; Replace; Scan and Replace ; Concatenation and Trim; Converting Character to Integer Extracting Size, Length, and Decimal Positions |
Record Nr. | UNINA-9910815528803321 |
Martin Jim
![]() |
||
Boise, Idaho, : MC Press, c2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury |
Autore | Woodbury Carol |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Ketchum, ID, : MC Press, 2012 |
Descrizione fisica | 1 online resource (429 p.) |
Disciplina | 005 |
Soggetto topico |
Computer security
IBM computers - Programming |
Soggetto genere / forma | Electronic books. |
ISBN | 1-58347-703-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 - Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 - Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 - Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 - The Facts About User Profiles
What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 - Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 - Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 - Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 - Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 - Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 - Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 - Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 - Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 - Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 - Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function Security for Vendors and Consultants |
Record Nr. | UNINA-9910453114603321 |
Woodbury Carol
![]() |
||
Ketchum, ID, : MC Press, 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury |
Autore | Woodbury Carol |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Ketchum, ID, : MC Press, 2012 |
Descrizione fisica | 1 online resource (429 p.) |
Disciplina | 005 |
Soggetto topico |
Computer security
IBM computers - Programming |
ISBN | 1-58347-703-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 - Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 - Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 - Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 - The Facts About User Profiles
What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 - Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 - Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 - Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 - Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 - Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 - Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 - Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 - Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 - Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 - Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function Security for Vendors and Consultants |
Record Nr. | UNINA-9910790634303321 |
Woodbury Carol
![]() |
||
Ketchum, ID, : MC Press, 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IBM i security administration and compliance [[electronic resource] /] / by Carol Woodbury |
Autore | Woodbury Carol |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Ketchum, ID, : MC Press, 2012 |
Descrizione fisica | 1 online resource (429 p.) |
Disciplina | 005 |
Soggetto topico |
Computer security
IBM computers - Programming |
ISBN | 1-58347-703-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title Page; Copyright Page; Dedication; Acknowledgments; Table of Contents; CHAPTER 1 - Security-The Reasons You're Reading This Book; Evaluating Your Risks; Evaluating the Threats; Managing the Strategic Issues; Getting Started; Don't Close the Book; CHAPTER 2 - Policies and Procedures; Your Security Policy; Business Events and Procedures; Getting Started with Your Policy; Legal Review; CHAPTER 3 - Security at the System Level; The System Security Level; Security-Related System Values; Locking Down Security-Related System Values; A Helpful Tool; CHAPTER 4 - The Facts About User Profiles
What Are User Profiles?User Profile Attributes; Private Authorities and User Profiles; Helpful Tools; Navigator for i; Copying User Profiles; Validation List Users; CHAPTER 5 - Service Tools Security; Service Tools User IDs; Service Tools Functional Privileges; Device Profiles; The Work with System Security Panel; Monitoring Service Tools Use; Service Tools Security Recommendations; CHAPTER 6 - Object-Level Security; Private Authorities; Group Profiles; Public Authority; Authorization Lists; How IBM i Checks Authority; Adopted Authority; Authorities and Save/Restore Functions Object OwnershipLimit User Function; Helpful Tools; Navigator for i; CHAPTER 7 - Security Considerations for the IFS; IFS Authorities; Managing Authorities to IFS Objects; File Attributes; File Shares: Accessing Objects in the IFS; Gotchas and Helpful Hints; Security Recommendations; Helpful Tools; CHAPTER 8 - Securing Your Printed Output; Security-Related Output Queue Attributes; Output Queue Ownership; Sample Output Queue Security Implementation; Helpful Tools; Navigator for i; CHAPTER 9 - Encryption; Encryption Basics; Transmission of Data; Encrypting Data in Files; Encrypting Backup Media Disaster Recovery ConsiderationsSuccess Depends on Planning; Helpful Resources; CHAPTER 10 - Connecting to the System; Physical Security; System Values; *IOSYSCFG Special Authority; Network Security Attributes; Security Considerations for TCP/IP; Security Considerations for PCs; Using Exit Points; Management Central; Secure Communications; Wireless Considerations; Helpful Tools; Navigator for i; IBM Director; CHAPTER 11 - Internet Security; Determine Your Risk; The Process; Corporate Security Policy; Internet Service Provider; Firewalls; System Values; User Profiles; Resource Security Controlling What Goes OnSecure Web Applications; Exit Programs; Monitoring; Testing and Evaluation; Business Contingency Plan; Be Careful Out There; CHAPTER 12 - Evaluating Applications' Current Implementations and Designing New Ones; From the Beginning; Design Considerations; Implementation Details; Testing, Testing; Moving Forward; CHAPTER 13 - Role-Based Access; Roles; Defining the Roles; Group Profiles; Why Group Profiles?; Implementation; CHAPTER 14 - Role-Based Access for IT; Security and Your IT Staff; Identify the Roles; Define a Secure Environment for Each Business Function Security for Vendors and Consultants |
Record Nr. | UNINA-9910814974503321 |
Woodbury Carol
![]() |
||
Ketchum, ID, : MC Press, 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani |
Autore | Dattani Dinesh D |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boise, ID : , : MC Press, , 2013 |
Descrizione fisica | 1 online resource (225 p.) |
Disciplina | 005.265 |
Soggetto topico |
Computer security
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 1-58347-831-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Securing business data -- pt. 2. Securing the z/OS operating system -- pt. 3. Security infrastructure matters. |
Record Nr. | UNINA-9910453220903321 |
Dattani Dinesh D
![]() |
||
Boise, ID : , : MC Press, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani |
Autore | Dattani Dinesh D |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boise, ID : , : MC Press, , 2013 |
Descrizione fisica | 1 online resource (225 p.) |
Disciplina | 005.265 |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN | 1-58347-831-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Securing business data -- pt. 2. Securing the z/OS operating system -- pt. 3. Security infrastructure matters. |
Record Nr. | UNINA-9910790517103321 |
Dattani Dinesh D
![]() |
||
Boise, ID : , : MC Press, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective / / Dinesh D. Dattani |
Autore | Dattani Dinesh D |
Edizione | [First edition.] |
Pubbl/distr/stampa | Boise, ID : , : MC Press, , 2013 |
Descrizione fisica | 1 online resource (225 p.) |
Disciplina | 005.265 |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN | 1-58347-831-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Securing business data -- pt. 2. Securing the z/OS operating system -- pt. 3. Security infrastructure matters. |
Record Nr. | UNINA-9910815529803321 |
Dattani Dinesh D
![]() |
||
Boise, ID : , : MC Press, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|