I



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

identity permissions
IIOP.NET
     benefits of
     examples of usage
     limitations of
     resources
     scope of
     solution
IMAP (Internet Message Access Protocol)
imperative programming
Indigo [See WCF (Windows Communication Foundation).]
Indirect Data Access strategy (data access interoperability)
     example of usage
     patterns
     scope of
     solution
         benefits of
         limitations of
integration [See also interoperability, in Java EE.]
    asynchronous integration [See asynchronous integration.]
     need for
    synchronous integration [See synchronous integration.]
integration strategies [See also interoperability, in Java EE; management.]
     availability of
     reliability and
     scalability of
Internet e-mail strategy (messaging)
     benefits of
     example of usage
     limitations of
     scope of
     solution
Internet Message Access Protocol (IMAP)
interoperability [See also integration, need for; integration strategies.]
     .NET security features
     business need for
     in .NET Framework
         .NET Remoting
         asynchronous Web services
         code level interoperability
         COM Interop
         data interoperability
         messaging technologies
         P/Invoke
         presentation layer interoperability
         summary table
         synchronous Web services
         Web services enhancements (WSE)
         Windows Communication Foundation (WCF)
     in Java EE
         business process integration
         distributed objects
         JMS
         Web services
     Java security features
    management of applications [See management.]
    messaging [See messaging, in .NET Remoting.]
     security for
         audit control and compliance
         best practices
         Business tier
         patterns
         pitfalls
         Resource tier
         secure data transport
         Secure Object Handler strategy
         Secure Tracer strategy
         standards
         Web SSO MEX
         Web tier
         WS-I Basic Security Profile
         WS-Policy specification
         WS-Security
         WSPL
         XACML
     transactions and
         commercial products
         messaging strategy
         Web services transaction strategy
     Web services and
interoperability guidelines (Web services)
ISO Network Management model 2nd
     accounting management
     bridging solutions
     configuration management
     example scenario
     fault management
     integration strategy comparison
     performance management
     platform unification strategy 2nd
     security management
     Web services management strategy
isolation (transactions)
isolation levels
     .NET transactions
     Java transactions




Java EE and. Net Interoperability(c) Integration Strategies, Patterns, and Best Practices
Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
ISBN: 0131472232
EAN: 2147483647
Year: N/A
Pages: 170

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net