Chapter 10 |
10
|
Controlling Access to Resources
|
10.1
|
Displaying the Rights Identifiers of Your Process
|
10.2
|
Security Profile of Objects
|
10.2.1
|
Modifying a Security Profile
|
10.3
|
Interpreting Protection Codes
|
10.4
|
Default File Protection
|
10.4.1
|
Default UIC Protection
|
10.4.2
|
Default ACL Protection
|
10.4.3
|
Renaming Files
|
10.4.4
|
Explicit File Protection
|
10.5
|
Accessing Files Across Networks
|
10.5.1
|
Access Control Strings
|
10.5.2
|
Protecting Access Control Strings
|
10.5.3
|
Using Proxy Login Accounts to Protect Passwords
|
10.5.4
|
General Access Proxy Accounts
|
10.6
|
Auditing Access to Your Account and Files
|
10.6.1
|
Observing Your Last Login Time
|
10.6.2
|
Events That Can Trigger Security Alarms
|
10.6.3
|
Security Audit Log Files
|
10.6.4
|
Adding ACEs to Sensitive Files
|
Chapter 11 |
11
|
Defining Logical Names for Devices and Files
|
11.1
|
Logical Name Characteristics
|
11.2
|
Using System-Defined Logical Names
|
11.3
|
Creating Logical Names
|
11.3.1
|
Using the DEFINE Command
|
11.3.2
|
Creating Logical Names in Command Procedures for File I/O
|
11.3.3
|
Rules for Creating Logical Names
|
11.3.4
|
Translation Attributes
|
11.3.5
|
Access Modes
|
11.3.6
|
Creating Logical Node Names
|
11.3.6.1
|
Using Logical Node Names in File Specifications
|
11.3.6.2
|
Overriding Access Control Strings
|
11.3.7
|
Creating Multiple Logical Names for the Same Object
|
11.4
|
Deleting Logical Names
|
11.5
|
Logical Name Translation
|
11.5.1
|
Iterative Translation
|
11.5.2
|
Missing Fields Filled in with System Defaults
|
11.5.3
|
Default Search Order for Logical Name Translations
|
11.6
|
Displaying Logical Names
|
11.6.1
|
Specifying a Logical Name Table to Search
|
11.6.2
|
Displaying Translation Attributes and Access Modes
|
11.7
|
Creating and Using Search Lists
|
11.7.1
|
Using Search Lists with Commands That Accept Wildcards
|
11.7.2
|
Using a Search List with the SET DEFAULT Command
|
11.7.3
|
Using a Search List with the RUN Command
|
11.7.4
|
Search Order for Multiple Search Lists
|
11.8
|
Logical Name Table Characteristics
|
11.8.1
|
Logical Name Table Directories
|
11.8.2
|
Displaying the Structure of Directory Tables
|
11.9
|
Default Logical Name Tables
|
11.9.1
|
Process Logical Name Directory
|
11.9.2
|
Process Logical Name Table
|
11.9.3
|
System Logical Name Directory
|
11.9.4
|
Shareable Logical Name Tables
|
11.9.5
|
Default Protection of Shareable Logical Name Tables
|
11.9.6
|
Privilege and Access Requirements for Managing Shareable Logical Names
|
11.10
|
Creating Logical Name Tables
|
11.10.1
|
Creating Process-Private Logical Name Tables
|
11.10.2
|
Creating Shareable Logical Name Tables
|
11.10.3
|
Creating Clusterwide Logical Name Tables
|
11.10.4
|
Privilege and Access Requirements
|
11.10.5
|
Modifying the Default Protection
|
11.10.6
|
Establishing Quotas for Logical Name Tables
|
11.10.6.1
|
Setting Job Table Quotas
|
11.11
|
Modifying the Order of Logical Name Translations
|
11.12
|
Deleting Logical Name Tables
|
11.13
|
Process-Permanent Logical Names
|
11.13.1
|
Equivalence Name Differences Between Interactive and Batch Processing
|
11.13.2
|
Redirecting File I/O Using Process-Permanent Logical Names
|
11.13.2.1
|
Redefining SYS$INPUT
|
11.13.2.2
|
Redefining SYS$OUTPUT
|
11.13.2.3
|
Redefining SYS$ERROR
|
11.13.2.4
|
Redefining SYS$COMMAND
|
Chapter 12 |
12
|
Defining Symbols, Commands, and Expressions
|
12.1
|
About Symbols
|
12.1.1
|
Comparing Logical Names and Symbols
|
12.2
|
Using Symbols
|
12.2.1
|
Using Symbols to Represent DCL Commands
|
12.2.2
|
Symbol Abbreviation
|
12.2.3
|
Defining Foreign Commands
|
12.2.4
|
Symbol Substitution
|
12.2.5
|
Deleting Symbols
|
12.3
|
Displaying Symbols
|
12.4
|
Using Symbols with Other Symbols
|
12.4.1
|
Symbol Concatenation
|
12.4.2
|
Including Symbols in String Assignments
|
12.5
|
Using Symbols to Store and Manipulate Data
|
12.6
|
Character Strings
|
12.6.1
|
Defining Character Strings
|
12.6.2
|
Character String Expressions
|
12.6.3
|
Character String Operations
|
12.6.4
|
Comparing Character Strings
|
12.6.5
|
Replacing Substrings
|
12.7
|
Using Numeric Values and Expressions
|
12.7.1
|
Specifying Numbers
|
12.7.2
|
Internal Storage of Numbers
|
12.7.3
|
Performing Arithmetic Operations
|
12.7.4
|
Comparing Numbers
|
12.7.5
|
Performing Numeric Overlays
|
12.8
|
Using Logical Values and Expressions
|
12.8.1
|
Logical Operations
|
12.8.2
|
Logical Expressions
|
12.8.3
|
Logical Operation Results
|
12.8.4
|
Using Values Returned by Lexical Functions
|
12.8.5
|
Order of Operations
|
12.8.6
|
Evaluating Data Types
|
12.9
|
Converting Value Types in Expressions
|
12.9.1
|
Converting Strings to Integers
|
12.9.2
|
Converting Integers to Strings
|
12.10
|
Understanding Symbol Tables
|
12.10.1
|
Local Symbol Tables
|
12.10.2
|
Global Symbol Tables
|
12.10.3
|
Symbol Table Search Order
|
12.11
|
Masking the Value of Symbols
|
12.11.1
|
SET SYMBOL Command
|
12.11.2
|
Symbol Scoping State
|
12.12
|
Understanding Symbol Substitution
|
12.12.1
|
Forced Symbol Substitution
|
12.12.2
|
Symbol Substitution Operators
|
12.13
|
The Three Phases of Command Processing
|
12.13.1
|
Phase 1: Command Input Scanning
|
12.13.2
|
Phase 2: Command Parsing
|
12.13.3
|
Phase 3: Expression Evaluation
|
12.13.4
|
Repetitive and Iterative Substitution
|
12.13.5
|
Undefined Symbols
|
12.14
|
An Alternative to Using Symbols: Automatic Foreign Commands
|
12.14.1
|
Using Automatic Foreign Commands
|
12.14.2
|
Automatic Foreign Command Restrictions
|