In Appendixes:
Limits
Setting Up Sample Applications
Troubleshooting Essbase Errors
Estimating Disk and Memory Requirements
Using ESSCMD
Naming Restrictions for Essbase Applications, Databases, Dimensions, Members, and Aliases
Differences in Security-Related Operations in Different Security Models