Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 4: Looking Behind the Scenes at Web Service Protocols
Table 4.1: Entries within the WSDL Document
Chapter 6: Making .NET Web Services Available to Others
Table 6.1: The UDDI Data Structures
Table 6.2: The Five Key .disco Entries That Programs Can Use to Discover Web Services
Chapter 9: Securing Communication between a Web Service and a Client
Table 9.1: The Purpose of Layers within the Seven-Layer ISO/OSI Network Model
Chapter 12: Examining Key Web Service Files
Table 12.1: Support Files Created by Visual Studio .NET for the Web Services You Create
Table 12.2: Entries Common to a .NET Assembly
Table 12.3: Files That Visual Studio .NET Creates That Use the .asmx Extension for Each Web Service You Create
Table 12.4: Three Files with the Name
Global
That Use the .asax File Extension
Table 12.5: Entries Common to the Web.config File
Chapter 13: Unlocking Remote Access
Table 13.1: Windows Account Types That Define the Service’s Context
Previous page
Table of content
Next page
.NET Web Services Solutions
ISBN: 0782141722
EAN: 2147483647
Year: 2005
Pages: 161
Authors:
Kris Jamsa
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Criteria for Causality
Relations Diagram
Reliability and Predictive Validity
Measuring Levels Is Not Enough
Getting Started with a Software Metrics Program
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
The Cisco 7914 Expansion Module
The Cisco Analog Telephony Adaptor
Implementing Shared Lines and Hunt Groups
Customizing Softkeys
Using H.450.x Tandem IP-to-IP Gateway
Documenting Software Architectures: Views and Beyond
Overview
A Standard Organization for Interface Documentation
Where to Document Behavior
Discussion Questions
Appendix A. Excerpts from a Software Architecture Documentation Package
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity I
Tcpdump
Snort
Policy and Procedures
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Home Communication System Basics
Designing and Installing a Home Telephone System
Water Management Systems
Troubleshooting and Maintaining a Home Security System
Home Access Control Systems
FileMaker 8 Functions and Scripts Desk Reference
DatabaseNames
Get(CurrentDate)
Get(RequestCount)
GetSummary()
If()
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies