Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: C
- caching database data: 7.2.5. Data Caching Issues
- CallableStatement class: 7.1.2.3. Statement
- cancel( ): C.4.6. cancel( )
- CAs (certification authorities): 5.4.2. Public Key Methods
- 5.5.5. Distributing Certified Public Keys
- 5.7.2.2. Certificates and authentication techniques
- catch clause: 1.3.4. Fault Tolerance Through Exception Handling
- certification: 5.5.4. Certification: The Last Identity Link
- certification authorities (CAs): 5.4.2. Public Key Methods
- 5.5.5. Distributing Certified Public Keys
- 5.7.2.2. Certificates and authentication techniques
- digital signatures (see digital signatures)
- distributing public keys: 5.5.5. Distributing Certified Public Keys
- presently available techniques for: 5.7.2.2. Certificates and authentication techniques
- public key certificates: 5.4.2. Public Key Methods
- CFDContentHandler class (example): 2.2. URLs, URLConnections, and ContentHandlers
- CFDContentHandlerFactory class (example): 2.2. URLs, URLConnections, and ContentHandlers
- character-based I/O: 2.1.4. Streams, Readers, and Writers for Input and Output
- CharArrayReader class: 2.1.4. Streams, Readers, and Writers for Input and Output
- CharArrayWriter class: 2.1.4. Streams, Readers, and Writers for Input and Output
- chat system (example): 10.1. A Simple Chat System
- checkPermission( ): 5.5.3. An Authenticating Credit Agent
- chess-playing agents example: 6.1. Messages Defined
- Chess...Event classes (example): 6.6.2. Distributed Events
- ChessEventServer class (example): 6.6.2. Distributed Events
- ChessMessage class (example): 6.4. Fixed Protocols
- ChessMove class (example): 6.4.2. Objects as Message Arguments
- 6.5.4. An Adaptable Message Handler
- ChessPlayer class (example): 6.4. Fixed Protocols
- ChessServer class (example): 6.4. Fixed Protocols
- 6.4. Fixed Protocols
- fixed message protocol for: 6.4. Fixed Protocols
- Java events for: 6.6.2. Distributed Events
- RMI implementation of: 6.7. Using Remote Objects
- synchronous vs. asynchronous handling: 6.3.1. Asychronous vs. Synchronous Message Handling
- Cipher class: 5.6.1. Ciphers for Secure Data Transfers
- classes
- ClassLoader class: 2.3. The ClassLoader
- object serialization versus: 3.6.6. Serializing Objects
- ClassNotFoundException: 2.3.1. Loading Classes from the Network
- downloading for applets: A.2. Class Downloads
- locking for threads: 4.3.1. Synchronizing Threads
- references to: 3.2.1. Creating Remote Objects
- clients
- interface for object classes: 3.3. Features of Distributed Object Systems
- object stub: 3.3. Features of Distributed Object Systems
- IDL interface and: 3.5.4. Client Stubs
- 3.5.5.2. The client stubs
- Java RMI and: 3.6.4. Client Stubs and Server Skeletons
- PipedClient class (example): 2.1.4. Streams, Readers, and Writers for Input and Output
- RunnableSolverClient class (example): 4.2.1. Implementing Runnable
- SimpleClient class (example): 1.3.5. Network Support
- code, obtaining online: 0.3. About the Source Code
- collaborative systems
- chat system (example): 10.1. A Simple Chat System
- Collaborator interface (example): 9.3.1. Building the Infrastructure with Message Passing
- 9.3.1. Building the Infrastructure with Message Passing
- collaborator requirements: 9.3.1. Building the Infrastructure with Message Passing
- CollaboratorMessage class (example): 9.3.1. Building the Infrastructure with Message Passing
- concerns with: 9.2. Issues with Collaboration
- definition of: 9.1. What Is a Collaborative System?
- infrastructure of: 9.3. A Basic Collaborative Infrastructure
- with message passing: 9.3.1. Building the Infrastructure with Message Passing
- MessageCollaborator interface (example): 9.3.1. Building the Infrastructure with Message Passing
- 9.3.1. Building the Infrastructure with Message Passing
- A.1. Whiteboard Applet
- with RMI: 9.3.2. Collaborating with RMI
- shared whiteboard (example): 10.2. A Shared Whiteboard
- commit( ): 7.1.2.3. Statement
- communication protocols: 1.2.2. Flexible, Extendible Communication Protocols
- complexity of cryptographic algorithms: 5.7.1.2. Sophistication and complexity
- concede( ): 6.4. Fixed Protocols
- ConcedeMessage class (example): 6.4. Fixed Protocols
- configuring JDBC drivers: 7.2.1. JDBC Driver Configurations
- ConfirmMoveMessage class (example): 6.4. Fixed Protocols
- 6.4.1. Heterogeneous Argument Lists
- connect( ): 9.3.1. Building the Infrastructure with Message Passing
- ConnectException: D.1. The java.rmi Package
- ConnectIOException: D.1. The java.rmi Package
- Connection interface: 7.1.2.2. Connection
- connect_pull_supplier( ): B.2.2. Interface Specifics
- constraintsFor( ): 7.2.4. JDBC-Enabled Data Objects
- consume( ):
8.4.2. Real Data Monitoring
- consumeAll( ):
8.4.2. Real Data Monitoring
- ConsumerAdmin interface:
B.2. Event Service
- ContentConsumer class (example): 8.4.2. Real Data Monitoring
- ContentHandler class: 2.2. URLs, URLConnections, and ContentHandlers
- ContentHandlerFactory class: 2.2. URLs, URLConnections, and ContentHandlers
- ContentProducer class (example): 8.4.2. Real Data Monitoring
- CORBA: 3.5. CORBA
- B. CORBA Services
- Event Service: B.2. Event Service
- IDL (Interface Definition Language): 3.5.2. The Interface Definition Language (IDL)
- Solver interface (example): 3.5.5.1. The IDL interface
- Naming Service: B.1. Naming Service
- java.rmi.Naming versus: B.1.1. Comparison to the RMI Registry
- ORB (Object Request Broker): 3.5.1. The Object Request Broker (ORB)
- RMI versus: 3.7. RMI vs. CORBA
- Security Service: B.3. Security Service
- CosEventChannelAdmin module: B.2.2. Interface Specifics
- CosEventComm module: B.2.2. Interface Specifics
- CosNaming module: B.1. Naming Service
- costs of cryptography: 5.7.1.5. Financial and legal issues
- createRegistry( ): D.2. The java.rmi.registry Package
- createServerSocket( ): D.3. The java.rmi.server Package
- createSocket( ): D.3. The java.rmi.server Package
- createStatement( ): 7.1.2.3. Statement
- Credential class: B.3.2. Security Model
- crypt( ): 5.6.1. Ciphers for Secure Data Transfers
- cryptography
- algorithms for: 5.2.1.1. The User API
- 5.7. Choosing a Cryptographic Algorithm
- JCE (Java Cryptography Extension): 5.2.2. The Core Security API
- SSL for: 5.7.3.1. Secure Socket Layer (SSL)
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.
|