Team LiB
Previous Section Next Section

List of Tables

Chapter 2: Operating Systems and the .NET Enterprise Servers

Table 2-1: An Overview of the Features in the Windows 2000 Server Family
Table 2-2: Overview of the Feature Set of the Windows Server 2003 Family
Table 2-3: Recommended Use of Microsoft Operating Systems in a Multitier Application

Chapter 3: Cluster Techniques

Table 3-1: Overview of When Each Clustering Technique Is Suitable for Use

Chapter 4: An Overview of the Windows Server Family

Table 4-1: Objects Made Available by the Executive
Table 4-2: Synchronization Methods the Executive Exposes
Table 4-3: Subcomponents of the Security Subsystem
Table 4-4: Basic Scaling-Up Possibilities of the Various Windows Server Versions
Table 4-5: Scaling-Out Possibilities in Windows
Table 4-6: New Features and Improvements to MSCS in Windows Server 2003

Chapter 5: The Enterprise Application Architecture

Table 5-1: Database Naming Conventions
Table 5-2: Evaluating the Results

Chapter 7: Internet Information Services

Table 7-1: Overview of the Isolation Modes of IIS 6.0 After Installation
Table 7-2: Overview of the Authentication Methods in IIS 6.0

Chapter 8: Data Storage Design and SQL Server

Table 8-1: SQL Server 2000 Editions Overview
Table 8-2: Lock Levels in SQL Server
Table 8-3: The Six Modes of SQL Server Locks

Chapter 9: An Example Application

Table 9-1: The R & R Enterprise
Table 9-2: The First Estimate of the Indexes for Our Application
Table 9-3: The Different Interfaces for Data Providers
Table 9-4: The Controls That Should Be Added to the Login Page

Team LiB
Previous Section Next Section