Building an On Demand Computing Environment with IBM: How to Optimize Your Current Infrastructure for Today and Tomorrow (MaxFacts Guidebook series)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

sandbox

     defined     policy files

     running code outside SASL

save points SavePoint

SAX

     DOM versus

     overview

     parsing SAXParser SAXParserException

SAXParserFactory

SAXSource

scaling graphics

Scanner scheduled execution

ScheduledExecutorService

schemas     additional references

     DTD equivalents     DTDs versus schema parsing

     using

     XML complete example

scrolling

     result set cursor

     result sets and editing

     result sets without editing

     result sets, scrollable

     result sets, syntax

search, binary

SecretKeyFactory

SecretKeySpec

security 2nd [See also permissions]

     additional references 2nd

     authentication

         intermediary

         keys         role-based     authorization

     bytecode verification 2nd

    certificates         certificate fingerprints

         generating

         signing

         software developer

         X.509 2nd

     ciphers and speed issues

     class loaders 2nd         namespaces and

         policy files         writing your own

     code signing 2nd     digital signatures 2nd

     downloading programs

     DSA public key exchange

     encryption 2nd

         cipher streams         public key ciphers         symmetric ciphers

     JAR file signing

     Java 2

     key pairs

         DSA         example

         public and private

    keys         authentication

         random, generating     message authentication

     message digests

     message signing

     monitors

     native methods and error handling

    permissions

         ActiveX issues

         applet, signed

         authorization and

         call stack during permission checking

         class hierarchy

         class implementation

         custom

         custom security manager

         implying

         ordering

         target formats         targets and actions         test program

         user

     policy files         custom permissions

         locations

         platform independent

     security managers 2nd

         custom

         test program

     types of     using class loaders and namespaces

     VeriSign     X.509 certificate format

Security Java security managers 2nd 3rd

     applets

     checks performed by

     custom

     test program security policies SecurityManager 2nd

SecurityPermission

SELECT statement

self-signed certificates

Semaphore 2nd 3rd Serializable

SerializablePermission

serialization     defined

     Swing componentsservers

     client/server overview

     connecting to 2nd

     CORBA, implementing

     half-close

     implementing

     LDAP configuration

     local loopback address

     multiple clients

     object activation

     posting form data

     RMI, starting

     server object, defined

     simple example

     threads for multiple clients

ServerSocket 2nd

services [See also print services]     print service attributes     print services

     stream print services

Set setProgress method

sets

     bit sets

     property

    result [See result sets]

SGML and XML

SHA1 Shamir, Rivest, and Adleman

Shape 2ndshape boundaries [See rendering]

shapes [See also areas]     antialiasing

     boundary style

     class relationships

     classes 2nd

     clipping     complex, creating     coordinate transformations

     intersection, subtraction

     JDK 1.0 process

     points, moving all

     rotation     scaling

     shape makers

     shear     size, restricting

     translation shearing

shuffling

Sieve of Eratosthenes

signalAll method 2nd

Signature

signatures

    code signing [See code signing]

    digital [See digital signatures]

     encoding for native methods

    message signing [See message signing]

signing

    certificates [See certificates]

    code [See code signing]

simple properties

SimpleDoc

single-thread rule

     exceptions to     Swing threads and single-value annotation

sleep method

     blocked threads     interrupted status, clearing

     isInterrupted and

SMALLINT data type

SOAP 2nd 3rd [See also web services]

     overview 2nd

Socket 2nd 3rd

SocketChannelsockets

     advanced programming     email

     half-close     interruptible

     opening 2nd

     timeouts

     URL connections

     URLs and URIs SortedMap 2nd SortedSet 2nd

sorting [See also collation]

     collections

     elements

     filter models     Swing filter model

     Swing sort filter

source code     annotation processing

     annotations     bytecode engineering 2nd

     character encoding

     metadata

source pixel

split panes

sprint function

SQL 2nd [See also databases, JDBC]

     additional references 2nd

    commands

         executing

         syntax

     data types and Java data types

     data types, advanced

     equality testing

     joins

     optimizing result sets

     overview     prepared statements     queries, executing 2nd

     queries, writing

     sample JDBC program     statements and syntax

     text file, reading data from

     transactions

     type conversions

SQLException

SQLPermission

square cap SQuirrel database tool

SSL over HTTP Stack

stack     call stack during permission checking

     Stack class

Stallings, William

standard annotations 2nd

Statement 2nd 3rd 4th 5thstatements     overview

     prepared

     transactions

states

     thread states 2nd     threads

static fields and native methods

static methods     Java, calling

     synchronized Stein, Clifford

stop method

StreamPrintServiceFactory

StreamResult

streams

     cipher

     JavaBeans 2nd

     print services

     saving object to stream

StreamSource

string parameters

strings [See also messages]

     choice formats

     conversion for native methods

     internationalizing

     Java strings, accessing from C

     property sets     string parameters     string parameters and native methods

strokes

     AWT 2nd     dash pattern

     example

     join style

Structured Query Language [See SQL]

stubs

     class generation

     nonremote objects, passing     remote method, calling

     remote objects, locating     remote objects, passing

     RMI     RMI deployment checklist

     security managers

     stub object

Subject

subranges subtract operations and areas subtrees

Suetonius

Sun Microsystems

     laws of logic versus

     Legion of Bouncy Castle     sun.security.x509 package

suspend method

Swing     additional references

     advanced 2nd    cells

         custom editors

         editing

         rendering 2nd 3rd 4th

         rendering default actions

         selecting

    columns

         hiding

         resizing

         selecting

     component organizers

     data transfer

     drag and drop 2nd

     filter models

     fonts, stylized

    frames

         dialogs in internal frames         internal         internal, cascading

         internal, illustration

         internal, tiling         outline dragging in internal frames

     JavaBeans persistence

     JTable

     lists 2nd

         inserting and removing values

         list models

         long 2nd         rendering values

         wrap    nodes

         enumeration         rendering

     panes

         desktop

         split panes

         tabbed panes     persistence     progress bars 2nd

     progress indicators 2nd

    progress monitors

         creating

         input streams     property settings, vetoing

     queries, displaying

    rows         adding/removing columns

         selecting     single-thread rule

     sort filters

     table model filter

     tables 2nd

         simple

         table model filter

         table models

     text components 2nd

     thread safety issues

     threads and

     trees 2nd

         custom tree models

         diagram

         editing

         forest

         inheritance

         object inspection tree         overview         paths

         simple

         subtrees, collapsed and expanded         terminology

         tree events, listening

     user interface, internationalizing

    windows

         cascading

         close buttons

         tiling     workers

SwingWorkerTasksymmetric ciphers [See ciphers]

synchronization [See also locks, multithreading]     blocks

     foregoing, issues

     lock-free

     lock/condition objects versus synchronized

     monitors     overview     race conditions

     ReentrantLock

     static methods

     synchronization motto

     synchronization wrapper     synchronized keyword

     unsynchronized versus

     volatile fields synchronized blocks

synchronized keyword 2nd 3rd synchronized views

synchronizers

SynchronousQueue 2nd 3rd

syntax [See also class name]

     annotation 2nd

     Java IDL

     JDBC

     native methods

     remote method calls

     SQL

     URI specification

     user authentication

     XML DTD

     XML element attributes

     XML schema

     XML schema syntax

System 2nd system class loader 2nd system clipboard

Категории