Flylib.com
Index_B
Previous page
Table of content
Next page
B
B2B (business-to-business) e-commerce, 175
Base64 encoding attachments, 6062
BaseRetransmissionInterval element, 152
BEA Systems, 77, 81, 142, 187, 229, 230
BinarySecurityToken element
defined, 116
example, 119
overview, 119
Body element, 15, 16
BPELAWS (Business Process Execution Language for Web Services), 187
brokered trust, 193
browser wars, 230
business activity model
defined in WS-AtomicTransaction, 182, 186
overview, 186
Business Process Execution Language for Web Services (BPELAWS), 187
business-to-business (B2B) e-commerce, 175
Previous page
Table of content
Next page
Understanding Web Services Specifications and the WSE (Pro Developer)
ISBN: 0735619131
EAN: 2147483647
Year: 2006
Pages: 79
Authors:
Jeannine Hall Gailey
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Configuring, Manipulating, and Reusing ORM Models
Mapping ORM Models to Logical Database Models
Editing Logical Models”Advanced Aspects
Reverse Engineering Physical Schemas to Logical Models
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Distinguished Names and Certificates
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
High-Speed Signal Propagation[c] Advanced Black Magic
Proximity Effect
Preferred Cable Combinations
Ringing in a New Era
Appendix B. Calculation of Loss Slope
Appendix C. Two-Port Analysis
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
The Cisco 7920 Wireless IP Phone
TCL-Based Automated Attendant
Troubleshooting Cisco CME and Cisco UE Integration
Table vm_bcst_heard
Table vm_mailbox
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity I
IDS and IPS Internals
Cisco Secure IDS
Laws, Standards, and Organizations
Java All-In-One Desk Reference For Dummies
Installing and Using Java Tools
Handling Exceptions
Using Arrays
Using the ArrayList Class
Book IX - Fun and Games
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies