Building an On Demand Computing Environment with IBM: How to Optimize Your Current Infrastructure for Today and Tomorrow (MaxFacts Guidebook series)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

languages [See also internationalization]

     internationalizing, complete example     ISO-3166 country codes

languages, ISO Last-Modified

LDAP 2nd     attributes

     browser program

     connecting to server, alternate approach

     directory information, accessing

     entries, adding     NamingEnumeration and     populating server

     server configuration

     server products

     tree structure

Lea, Dougleaf

     defined

     folder icons Leben, Joe

legacy collections Legion of Bouncy Castle 2nd

Leiserson, Charles

lightweight collection wrappers

Lindholm, Tim

lines

     antialiasing

     dash pattern

linked hash sets

linked lists

     adding elements

     doubly linked

     hash tables

     methods

     reasons to use

     removing elements

linked maps

LinkedBlockingQueue 2nd LinkedHashMap LinkedHashSet

LinkedList

List 2nd ListCellRenderer

listening to tree events

ListIterator 2nd

ListModel

lists

     array

     doubly linked     horizontal and vertical wrap

     inserting and removing values     JList

     linked     linked versus generic collections

     linked, adding elements

     linked, array of

     linked, methods

     linked, reasons to use     linked, removing elements     list models

     long 2nd

     modifiable

     remote objects, listing

     rendering values     resizable

     shuffling

     Swing 2nd ListSelectionListener

ListSelectionModel load time, modifying bytecodes

local clipboard

local encoding of source files

local loopback address

local name 2nd

Locale

locales 2nd

     codes, expressing with

     combo box

     complete example

     country codes

     language codes

     utility classes

localizing [See also internationalization]

     resource bundles

Lock 2nd 3rd

lock methodlock objects     implicit lock

     monitors

     overview     protecting method

     synchronized methods versus

locks

     deadlocks

     explicit

     fair locking policy

     giving up     implicit

     read/write     synchronization without

     testing     thread, waiting for

     timeouts

logging RMI activity

LoggingPermission

login modules     example     JAAS

LoginModule

LookupOp

loops and collection interfaces

lower limitlowercase [See collation]

Категории