Flylib.com
Index_X
Previous page
Table of content
Next page
X
X.509 certificates
attaching to SOAP messages, 129131
defined, 105
security token request example, 196198
signing SOAP messages, 135138
X.509 standard
attaching certificates to SOAP messages, 129131
Public Key Infrastructure, 104, 201
X509SecurityToken object, 129131, 214
XML (Extensible Markup Language)
CollectionService example, 1617
example, 10
namespaces, 11, 12
overview, 10
schemas, 12
URIs, 11
XML Encryption, 38
background, 111
overview, 111112
SOAP message examples, 111112
XML Signature, 38
background, 111
overview, 113115
SOAP message examples, 113115
XML Web services.
See
Web services
XML-Encryption Syntax and Processing standard.
See
XML Encryption
XML-Signature Syntax and Processing standard.
See
XML Encryption
XMLTextReader class, 62
XMLTextWriter class, 60
X/Open DTP model, 174
XSD (XML schema definition) documents, 12
Previous page
Table of content
Next page
Understanding Web Services Specifications and the WSE (Pro Developer)
ISBN: 0735619131
EAN: 2147483647
Year: 2006
Pages: 79
Authors:
Jeannine Hall Gailey
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Searching with the DirectorySearcher
.NET Attribute Value Conversion
Authentication Using SDS
Handcrafted COM Interop Declarations
InvalidOperationException from DirectorySearcher
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Reversing a String
Determining a Days Number Within a Given Year
Using Constructors and Destructors to Manage Resources (or RAII)
Getting Information About a File
Introduction
Systematic Software Testing (Artech House Computer Library)
Detailed Test Planning
Analysis and Design
Test Implementation
Test Execution
Improving the Testing Process
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Setting the System Prompt
How Packets Match a List Entry
Distance-Vector and Link-State Routing Protocols
IS-IS
Quality of Service
Comparing, Designing, and Deploying VPNs
Advantages and Disadvantages of MPLS Layer 3 VPNs
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Summary
Designing and Building SSL Remote Access VPNs (WebVPN)
VBScript in a Nutshell, 2nd Edition
VBScripts History and Uses
The Outlook Object Model
Windows Script Host 5.6
Section B.4. Date Format Constants
Section B.5. Error Constant
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies