Title:
All-in-one Lotus Notes and Domino R5 exam guide
Personal Author:
Edition:
1st ed.
Publication Information:
New York : Osborne/McGraw-Hill, 2001
ISBN:
9780071350907
Added Author:
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000005180710 | HF5548.4 L692 S35 2001 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Lotus have required that, for version 5, established certificate holders apply for re-certification, alongside new candidates. The all-in-one format of this guide is suitable for both groups. Hundreds of sample questions are included, with the CD-ROM providing many more.
Table of Contents
Introduction | p. xxxvii |
Part I Introduction Maintaining Domino Servers and Users | p. 1 |
Chapter 1 Domino Systems and Infrastructure | p. 3 |
Administration Tools | p. 4 |
System Access | p. 31 |
Summary | p. 36 |
Review Questions | p. 36 |
Review Answers | p. 38 |
Chapter 2 Advanced Domino and Web Servers | p. 39 |
Clustering | p. 39 |
Partitioning | p. 45 |
Web Servers | p. 45 |
Summary | p. 62 |
Review Questions | p. 63 |
Review Answers | p. 65 |
Chapter 3 Domino Directories, Users, and Groups | p. 67 |
Domino Directories | p. 68 |
Domino Users | p. 84 |
Domino Groups | p. 98 |
Summary | p. 105 |
Review Questions | p. 105 |
Review Answers | p. 107 |
Chapter 4 Domino Messaging | p. 109 |
Mail Backgrounder | p. 110 |
Monitoring Messaging | p. 115 |
Troubleshooting Messaging | p. 122 |
Customizing Mail Routing | p. 128 |
Moving Mail Files | p. 133 |
Migrating to Domino | p. 136 |
POP3 and IMAP Clients | p. 144 |
Calendaring and Scheduling | p. 148 |
Summary | p. 152 |
Review Questions | p. 153 |
Review Answers | p. 155 |
Chapter 5 Domino Applications and Replication | p. 157 |
Monitoring Databases | p. 158 |
Manipulating Databases | p. 162 |
Adding a Database to a Server | p. 175 |
Replication | p. 188 |
Application Security | p. 204 |
Application Backup and Recovery | p. 217 |
Updating Databases | p. 218 |
Fixing Databases | p. 221 |
Summary | p. 223 |
Review Questions | p. 223 |
Review Answers | p. 225 |
Part II Implementing a Domino R5 Infrastructure | p. 227 |
Chapter 6 Installing and Configuring Servers and Clients | p. 229 |
Before You Begin... Some Planning | p. 230 |
Installing Servers | p. 241 |
Configuring the First Server | p. 244 |
Installing Workstations | p. 251 |
Configuring Workstations | p. 251 |
Register Certifiers, Servers, and Users | p. 255 |
Configuring Additional Servers | p. 273 |
Additional Configuration | p. 274 |
Summary | p. 281 |
Review Questions | p. 282 |
Review Answers | p. 284 |
Chapter 7 Advanced Server Configuration | p. 287 |
Transaction Logging | p. 287 |
Partitioned Servers | p. 290 |
Clustering | p. 292 |
Web Servers | p. 298 |
Administration Process (AdminP) | p. 306 |
Summary | p. 309 |
Review Questions | p. 311 |
Review Answers | p. 313 |
Chapter 8 Directories | p. 315 |
Domino Directory | p. 315 |
Using Multiple Directories | p. 328 |
Summary | p. 341 |
Review Questions | p. 341 |
Review Answers | p. 343 |
Chapter 9 Mobile and Remote | p. 345 |
Remote Connections | p. 345 |
Configuring Passthru | p. 346 |
Summary | p. 353 |
Review Questions | p. 353 |
Review Answers | p. 355 |
Chapter 10 Configuring Domino Security | p. 357 |
Domino Server and User ID Files | p. 358 |
Physical and Network Security | p. 362 |
Domino Security Overview | p. 363 |
Agent Security | p. 399 |
File Security | p. 401 |
Securing the Domino Directory | p. 403 |
Review Questions | p. 404 |
Review Answers | p. 406 |
Chapter 11 Implementing Domino Messaging | p. 409 |
Messaging Primer | p. 409 |
Connecting to Different Servers | p. 416 |
Mail Topology | p. 427 |
Shared Mail | p. 431 |
Enhancing Mail Performance | p. 438 |
Troubleshooting and Tracking Mail | p. 440 |
Review Questions | p. 446 |
Review Answers | p. 449 |
Chapter 12 Implementing Replication | p. 451 |
Creating Replicas | p. 452 |
Types of Replication | p. 454 |
Server-to-Server Replication | p. 457 |
Communication Pathways | p. 462 |
Replication Passthru | p. 467 |
Factors Affecting Replication | p. 469 |
Process of Replication | p. 479 |
Workstation-to-Server Replication | p. 481 |
Troubleshooting Replication | p. 485 |
Review Questions | p. 487 |
Review Answers | p. 488 |
Chapter 13 Configuring Monitoring | p. 491 |
Administration Tools | p. 491 |
Notes Log | p. 506 |
Monitors | p. 507 |
Probes | p. 512 |
Statistics | p. 515 |
Review Questions | p. 516 |
Review Answers | p. 518 |
Part III Deploying Domino R5 Applications | p. 519 |
Chapter 14 Deploying Applications Based on Database Structure and Document Characteristics | p. 521 |
Deploying Based on NSF Structure | p. 522 |
Deploying Based on Document Characteristics | p. 528 |
Deploying Based on Database Views | p. 530 |
Deploying Based on Archiving | p. 531 |
Summary | p. 533 |
Review Questions | p. 535 |
Review Answers | p. 537 |
Chapter 15 Deploying Applications Based on Design Elements | p. 539 |
Actions Versus Shared Actions | p. 540 |
Fields and Shared Fields | p. 541 |
Forms Versus Subforms | p. 545 |
Sections | p. 547 |
Attachments | p. 548 |
Shared Graphic Images | p. 550 |
Summary | p. 551 |
Review Questions | p. 552 |
Review Answers | p. 553 |
Chapter 16 Deploying Applications Based on Coding | p. 555 |
Deploying Applications Written in C | p. 556 |
Deploying Applications Written in Formula Language | p. 557 |
Deploying Applications Written in JavaScript | p. 558 |
Deploying Applications Written in Java | p. 558 |
Deploying Applications Written in LotusScript | p. 561 |
Summary | p. 565 |
Review Questions | p. 568 |
Review Answers | p. 569 |
Chapter 17 Deploying Based on Replication and Routing | p. 571 |
Replication Deployment Issues | p. 572 |
Routing Deployment Issues | p. 590 |
End User Replication and Routing Issues | p. 598 |
Review Questions | p. 601 |
Review Answers | p. 604 |
Chapter 18 Securing Applications | p. 605 |
Authentication and Server Access | p. 606 |
Database Security | p. 619 |
View and Form Access Lists | p. 632 |
Document Level Security | p. 634 |
User Roles | p. 645 |
Agent Security | p. 646 |
File Security | p. 648 |
Review Questions | p. 649 |
Review Answers | p. 651 |
Chapter 19 Integrating with Host Data | p. 653 |
Domino Connectors | p. 654 |
LCTEST | p. 656 |
DECS | p. 656 |
LEI | p. 667 |
Review Questions | p. 668 |
Review Answers | p. 669 |
Chapter 20 Planning the Domino Infrastructure | p. 671 |
Planning for Size and Performance | p. 672 |
Web Versus Notes--Special Considerations | p. 682 |
License Types | p. 684 |
Summary | p. 685 |
Review Questions | p. 687 |
Review Answers | p. 689 |
Chapter 21 Distributing Application Design | p. 691 |
Design Templates | p. 691 |
Applying the Changes | p. 694 |
After the Redesign | p. 701 |
Review Questions | p. 703 |
Review Answers | p. 705 |
Part IV Domino R5 Designer Fundamentals | p. 707 |
Chapter 22 Know Thy Client | p. 709 |
Which Clients? | p. 709 |
What to Avoid | p. 710 |
What to Use | p. 713 |
Summary | p. 716 |
Chapter 23 Creating a Database | p. 717 |
Notes Databases and Applications | p. 718 |
Synopsis | p. 748 |
Practice | p. 749 |
Review Questions | p. 751 |
Review Answers | p. 753 |
Chapter 24 Understanding and Implementing Basic Security | p. 755 |
Database-Level Security | p. 756 |
Document-Level Security | p. 773 |
Synopsis | p. 777 |
Practice | p. 778 |
Review Questions | p. 780 |
Review Answers | p. 782 |
Chapter 25 Creating Pages and Forms | p. 785 |
Creating a Page | p. 785 |
Summary | p. 843 |
Practice | p. 843 |
Review Questions | p. 847 |
Review Answers | p. 849 |
Chapter 26 Creating Fields and Formulas | p. 851 |
Creating a Field | p. 851 |
Formulas in Fields | p. 874 |
Summary | p. 892 |
Practice | p. 892 |
Review Questions | p. 908 |
Review Answers | p. 911 |
Chapter 27 Creating Views, Columns, and Folders | p. 913 |
View Basics | p. 913 |
Creating a View | p. 914 |
View Properties InfoBox | p. 919 |
Selecting Documents for the View | p. 929 |
Adding Columns to the View | p. 930 |
Summary | p. 941 |
Practice | p. 941 |
Review Questions | p. 946 |
Review Answers | p. 948 |
Chapter 28 Creating Actions, Agents, and Hotspots | p. 949 |
Actions | p. 949 |
Summary | p. 966 |
Practice | p. 966 |
Review Questions | p. 969 |
Review Answers | p. 971 |
Chapter 29 Creating Navigation | p. 973 |
Outlines | p. 973 |
Imagemaps | p. 983 |
Navigators | p. 984 |
Summary | p. 986 |
Practice | p. 986 |
Review Questions | p. 989 |
Review Answers | p. 991 |
Chapter 30 Creating Framesets | p. 993 |
Create the Frameset | p. 993 |
Add Content to the Frames | p. 995 |
Summary | p. 1001 |
Practice | p. 1001 |
Review Questions | p. 1003 |
Review Answers | p. 1005 |
Part V Application Security and Workflow | p. 1007 |
Chapter 31 Planning and Designing Workflow Applications | p. 1009 |
Introduction to Workflow | p. 1010 |
Summary | p. 1020 |
Practice | p. 1021 |
Review Questions | p. 1023 |
Review Answers | p. 1025 |
Chapter 32 Creating a Workflow Application | p. 1027 |
Creating the Workflow Forms | p. 1028 |
Summary | p. 1047 |
Practice | p. 1048 |
Review Questions | p. 1050 |
Review Answers | p. 1052 |
Chapter 33 Creating a Mail-In Database | p. 1055 |
Mail-In Databases and Workflow | p. 1055 |
Summary | p. 1060 |
Practice | p. 1060 |
Review Questions | p. 1063 |
Review Answers | p. 1064 |
Chapter 34 Domino Security Architecture | p. 1067 |
Network Security Issues | p. 1068 |
Server Security Issues | p. 1069 |
Database Security Issues | p. 1069 |
Document Security Issues | p. 1076 |
View Security Issues | p. 1083 |
Field Security Issues | p. 1084 |
Password Security Issues | p. 1092 |
Summary | p. 1095 |
Practice | p. 1095 |
Review Questions | p. 1099 |
Review Answers | p. 1101 |
Chapter 35 Mail and Workstation Security | p. 1103 |
Workstation ECL | p. 1104 |
Summary | p. 1120 |
Practice | p. 1121 |
Review Questions | p. 1125 |
Review Answers | p. 1127 |
Chapter 36 Web Security | p. 1129 |
Network Level | p. 1130 |
Database Level | p. 1132 |
Document Level | p. 1138 |
Field Level | p. 1138 |
Form Level | p. 1139 |
View Level | p. 1140 |
Workstation Level | p. 1143 |
Secure Sockets Layer (SSL) | p. 1144 |
Summary | p. 1147 |
Practice | p. 1148 |
Review Questions | p. 1151 |
Review Answers | p. 1153 |
Chapter 37 Troubleshooting Workflow Applications | p. 1155 |
Replication Issues | p. 1156 |
Roles/Security Issues | p. 1157 |
Routing Issues | p. 1161 |
Rules Issues | p. 1164 |
Summary | p. 1164 |
Practice | p. 1165 |
Review Questions | p. 1167 |
Review Answers | p. 1169 |
Part VI Domino R5 Application Architecture | p. 1171 |
Chapter 38 Designing and Planning for Alternative Coding | p. 1173 |
Overview | p. 1173 |
Programmable Objects in Domino: SmartIcons | p. 1175 |
Database | p. 1176 |
Hotspots | p. 1180 |
Form, Selection, and Column Formulas | p. 1182 |
Window Title, Section Access, Insert Subform, and Section Title Formulas | p. 1184 |
Field Design Formulas | p. 1187 |
HTML in Form, Pages, or Views | p. 1190 |
Events | p. 1191 |
Database | p. 1191 |
View/Folder | p. 1192 |
Form/Subform/Page | p. 1192 |
Field | p. 1194 |
Action | p. 1194 |
Button | p. 1194 |
Hotspot | p. 1195 |
Agent | p. 1195 |
Summary | p. 1196 |
Review Questions | p. 1196 |
Review Answers | p. 1198 |
Chapter 39 Planning and Designing for Replication and Routing | p. 1199 |
Planning a Distributed Application | p. 1201 |
Replication Design | p. 1202 |
Routing Design Issues | p. 1207 |
Summary | p. 1208 |
Review Questions | p. 1209 |
Review Answers | p. 1210 |
Chapter 40 Distributing Updates | p. 1213 |
Design Updates by Designer Task | p. 1214 |
Refreshing/Replacing the Design of a Database | p. 1214 |
Design Updates by Replication | p. 1218 |
Summary | p. 1219 |
Review Questions | p. 1220 |
Review Answers | p. 1221 |
Chapter 41 Designing and Planning for Secure Applications | p. 1223 |
Design Secure Applications | p. 1224 |
Authentication | p. 1225 |
Notes | p. 1225 |
Web | p. 1225 |
Application Security | p. 1226 |
ACLs | p. 1228 |
Roles | p. 1232 |
Agents | p. 1233 |
Document Level | p. 1233 |
Section Level | p. 1235 |
Field Level | p. 1236 |
View Level | p. 1236 |
Summary | p. 1237 |
Review Questions | p. 1238 |
Review Answers | p. 1239 |
Chapter 42 Design Applications That Integrate with Host Data | p. 1241 |
Lotus Enterprise Integrator (LEI) | p. 1242 |
Open Database Connectivity (ODBC) | p. 1246 |
Using Structured Query Language (SQL) | p. 1260 |
Maintaining Data Integrity | p. 1262 |
Summary | p. 1265 |
Review Questions | p. 1266 |
Review Answers | p. 1267 |
Chapter 43 Planning for Modes of Usage | p. 1269 |
Web Versus Notes | p. 1270 |
Field Validations | p. 1272 |
Refreshing Documents | p. 1273 |
Dialog Boxes | p. 1276 |
Connected Versus Disconnected | p. 1276 |
Summary | p. 1280 |
Review Questions | p. 1280 |
Review Answers | p. 1281 |
Chapter 44 Planning for Capacity | p. 1283 |
Key Performance and Scaling Enhancements | p. 1284 |
General Considerations | p. 1285 |
Platform Choices | p. 1286 |
Performance Considerations | p. 1287 |
Review Questions | p. 1290 |
Review Answers | p. 1292 |
Index | p. 1293 |