Flylib.com
WebDAV. Next Generation Collaborative Web Authoring
WebDAV. Next Generation Collaborative Web Authoring
ISBN: 130652083
EAN: N/A
Year: 2003
Pages: 146
BUY ON AMAZON
Main Page
Table of content
Copyright
Prentice Hall PTR Series in Computer Networking and Distributed Systems
About Prentice Hall Professional Technical Reference
Preface
Readers
Organization of the Book
Acknowledgments
Chapter 1. Introduction
1.1 What Is Authoring?
1.2 Third-Generation Web Authoring
1.3 WebDAV History
1.4 Requirements and Scenarios
1.5 Extended Example, Concepts, and Terminology
1.6 What WebDAV Is and Is Not
1.7 Roles for WebDAV
1.8 Summary
Chapter 2. History of Web and Collaborative Authoring
2.1 A Brief History of Web Authoring
2.2 Network-Enabled Web Authoring Tools
2.3 The Standards Revolution in Web Authoring
2.4 HTTP, Pre-WebDAV
2.5 The File Transfer Protocol
2.6 WebDAV for Sharing Documents
2.7 Summary
Chapter 3. HTTP Mechanics
3.1 URLs
3.2 Message Structure
3.3 HTTP Methods
3.4 HTTP ETags
3.5 Beyond the RequestResponse Model
3.6 HTTP Security
3.7 HTTP Headers
3.8 Summary
Chapter 4. Data Model
4.1 Basic Components
4.2 URLs and WebDAV Resources
4.3 Using the Hierarchy
4.4 Metadata
4.5 Locks
4.6 Summary
Chapter 5. WebDAV Modifications to HTTP
5.1 WebDAV URLs and Feature Discovery
5.2 New Response Status Codes
5.3 GET
5.4 PUT
5.5 DELETE
5.6 Summary
Chapter 6. WebDAV Hierarchy Operations
6.1 Why WebDAV Defines New Methods
6.2 MKCOL: Create Collection
6.3 MOVE
6.4 COPY
6.5 Summary
Chapter 7. Property Operations
7.0.1 HTML and HTTP Metadata
7.1 Property Representation
7.2 PROPFIND
7.3 PROPPATCH
7.4 How Properties Are Stored
7.5 Required Properties
7.6 Summary
Chapter 8. Lock Operations
8.1 Lock Tokens
8.2 LOCK Method
8.3 UNLOCK Method
8.4 Using Locked Resources
8.5 Lock-Related Properties
8.6 Client Responsibilities
8.7 Lock Interactions
8.8 Problems with Lock-Null Resources
8.9 Summary
Chapter 9. Putting the Pieces Together
9.1 Scenario Walk-Through
9.2 Open Web Folder
9.3 Create a Folder
9.4 Create a New File
9.5 Editing a File
9.6 Close the File
9.7 Copy to Publishing Directory
9.8 Publish Document
9.9 Summary
Chapter 10. WebDAV Products and Tools
10.1 Client Software
10.2 Server Software
10.3 Services
10.4 Compliance Tests
10.5 Summary
Chapter 11. Versioning
11.1 Introduction to Versioning
11.2 Core Versioning
11.3 Editing Version-Controlled Resources
11.4 Labels
11.5 Using Existing WebDAV Methods with Versioning
11.6 Using Non-DeltaV Clients
11.7 Version Trees
11.8 Multiple Checkouts with Working Resources
11.9 Checkout Determinism
11.10 DeltaV Special Mechanisms
11.11 Summary
Chapter 12. Multifile Versioning
12.1 Workspaces
12.2 Change Sets
12.3 Branches
12.4 MERGE
12.5 History of Multiple Resources
12.6 Other Feature Interactions
12.7 DeltaV Features and Packages
12.8 Summary
Chapter 13. Access Control
13.0.1 Prior Approaches
13.1 What Is Access Control?
13.2 Getting Access Control Information
13.3 Setting Access Control Information
13.4 Principals
13.5 Standardization Challenges
13.6 Summary
Chapter 14. Custom WebDAV Applications
14.1 Online Photo Album
14.2 Email and Calendaring
14.3 Presence and Instant Messaging
14.4 Pacific National Laboratories
14.5 Other Application Ideas
14.6 Summary
Chapter 15. Designing WebDAV Applications
15.1 Metadata Usage
15.2 Performance Considerations
15.3 Security Considerations
15.4 Technology Considerations
15.5 Deployment Considerations
15.6 Summary
Appendix A. Microsoft and Windows Tips
A.1 Supporting Legacy Windows Applications
A.2 Internet Explorer Tips
A.3 Microsoft WebDAV
Appendix B. HTTP Status Codes
B.1 Informational Status Codes
B.2 Success Status Codes
B.3 Redirect Status Codes
B.4 Client Failure Status Codes
B.5 Server Failure Status Codes
References
IETF Documents: RFCs
Microsoft Support Articles
WebDAV. Next Generation Collaborative Web Authoring
ISBN: 130652083
EAN: N/A
Year: 2003
Pages: 146
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Physical (Environmental) Security
Understanding Certification and Accreditation
The Certification Phase
Appendix B Glossary of Terms and Acronyms
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Java for RPG Programmers, 2nd Edition
The Java Onion
Arrays And Vectors
Exceptions
Database Access
Appendix A Using Java on the AS/400
Systematic Software Testing (Artech House Computer Library)
The Test Organization
The Software Tester
Appendix B Testing Survey
Appendix E Simplified Unit Test Plan
Appendix F Process Diagrams
MySQL Clustering
Installing MySQL-Max
Obtaining, Installing, and Configuring MySQL Cluster on Other Platforms
MySQL Cluster Errors
Common Setups
Cluster Topographies
Comparing, Designing, and Deploying VPNs
Advantages and Disadvantages of MPLS Layer 3 VPNs
Deploying Site-to-Site IPsec VPNs
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Python Programming for the Absolute Beginner, 3rd Edition
Visitor: Walking Trees Generically
Transferring Files over the Net
PyTree: A Generic Tree Object Viewer
ppembed: A High-Level Embedding API
Section B.3. Environment Configuration
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies