Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] identity permissions IIOP.NET benefits of examples of usage limitations of resources scope of solution IMAP (Internet Message Access Protocol) imperative programming Indigo [See WCF (Windows Communication Foundation).] Indirect Data Access strategy (data access interoperability) example of usage patterns scope of solution benefits of limitations of integration [See also interoperability, in Java EE.] asynchronous integration [See asynchronous integration.] need for synchronous integration [See synchronous integration.] integration strategies [See also interoperability, in Java EE; management.] availability of reliability and scalability of Internet e-mail strategy (messaging) benefits of example of usage limitations of scope of solution Internet Message Access Protocol (IMAP) interoperability [See also integration, need for; integration strategies.] .NET security features business need for in .NET Framework .NET Remoting asynchronous Web services code level interoperability COM Interop data interoperability messaging technologies P/Invoke presentation layer interoperability summary table synchronous Web services Web services enhancements (WSE) Windows Communication Foundation (WCF) in Java EE business process integration distributed objects JMS Web services Java security features management of applications [See management.] messaging [See messaging, in .NET Remoting.] security for audit control and compliance best practices Business tier patterns pitfalls Resource tier secure data transport Secure Object Handler strategy Secure Tracer strategy standards Web SSO MEX Web tier WS-I Basic Security Profile WS-Policy specification WS-Security WSPL XACML transactions and commercial products messaging strategy Web services transaction strategy Web services and interoperability guidelines (Web services) ISO Network Management model 2nd accounting management bridging solutions configuration management example scenario fault management integration strategy comparison performance management platform unification strategy 2nd security management Web services management strategy isolation (transactions) isolation levels .NET transactions Java transactions |