Z6B <k&CLr
VfD&CLr"&CLrDw?V,T0vpI1rTs<ITCZ0&CLr* "\mw1&\?~DXF.B#K&\?~Jm*"_r\m1+Tsr4I1< k=n?cNa9P#<km>+&CLrD;vr`vi~S OS/400 b4F=0& CLr*"\mw1n?cNa9P#9C0<k?~1(IMPPART) n44PKY w#
>BhvgN+vpTsr{v&CLr<k=n?cNa9P,"a)KXZgN 4PK}LD;)p=8<E"#Z<k&CLr.0,z&C()1d4DA
ADTS/400: Application Development Manager Introduction and Planning Guide PPX <k&CLrDG;Z,P>Kz&C<GD;)Bn#
<k=n?cNa9P
(#,\m19C IMPPART n44F{v&CLrr_&CLrD;s?V,x* "_\I\;4F\YD4I1rTs#\m1IT+Tsr4I1<kn?cNa 9PDNNiP;*"_IT+G<k={GTd_PBCJ(DiP#
XkTzk<kDTsMD~_Pc;D(^#h*T4D~_P *USE (^E\<k dI1,xXkTzk<kDNNTs_P *USE M0Ts\m1(^#g{zTT< <kDTs;P}7D(^,r IMPPART n+'\#
g{zD&CLrV"Z8vbP,rITWH<k;vbPDyPTsMI1,; sYLxB;vb,1=I&X<k&CLrDyPi~*9#
g{8(K REPLACE(*NO),r IMPPART ngT0GyKw#g{Z+,;<
g{8(K
g{f REPLACE(*YES) ;p98(K
*,$0&CLr*"\mw1Dj{T,;)<kDTsI*n?PD?~,rT y<kTsDyP(^Ma;D#Ty<kTsD+C(^;hC* *EXCLUDE#T y<kTsD(C(^G9C(^Pm4hCD#PXji,N{ iSeries Security
Reference#
g{z9C0`L*"\mw15CLr,rIT9C09Ci1A;OD!n 38(< k)4<kI1MTs#9IT9CF* IM M IO DC'(e!n4ozzxP< k#IM +<kI1,IO +<kTs#PXgN4PKYwDE",N{Z2083D:9 CC'(e!n;#
© Copyright IBM Corp. 1992, 2001 | 49 |