Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introduction
Figure 1.1: Service-oriented application
Figure 1.2: Portal technology
Chapter 2: Services
Figure 2.1: One-way pattern
Figure 2.2: Request-response pattern
Figure 2.3: Notification pattern
Figure 2.4: Solicit-response pattern
Figure 2.5: Request and callback
Figure 2.6: Orchestration
Figure 2.7: Choreography
Figure 2.8: Conversation over time
Chapter 3: Highlight Insurance
Figure 3.1: Sales process at Highlight Insurance
Figure 3.2: Context diagram for the Highlight Insurance project
Figure 3.3: Software for issuing a quote
Figure 3.4: Software for issuing a policy
Chapter 4: XML
Figure 4.1: XML engines at Web-service run time
Figure 4.2: XML tree structure
Chapter 5: Established SOA Standards
Figure 5.1: Established SOA standards
Figure 5.2: SOAP at run time
Chapter 6: Introduction to XPath
Figure 6.1: Context
Chapter 7: Introduction to BPEL
Figure 7.1: Connected orchestrations
Figure 7.2: Partner link
Figure 7.3: Scope
Figure 7.4: Peer and nesting scopes
Figure 7.5: Correlation in BPEL
Figure 7.6: Concurrency example
Chapter 8: BPEL Activity Highlights
Figure 8.1: Sequential forEach
Figure 8.2: Concurrent forEach
Figure 8.3: doXSLTransform, single transformation
Figure 8.4: doXSLTransfer, iterative constructionformation
Chapter 9: Introduction to SCA
Figure 9.1: Perspectives on services
Figure 9.2: A composite includes components
Figure 9.3: A component can configure a composite
Figure 9.4: Component
Figure 9.5: Composite
Figure 9.6: Higher- and lower-level composites
Chapter 10: Introduction to SDO
Figure 10.1: Data graph
Figure 10.2: Employee transfer at start
Figure 10.3: Employee transfer after the service's change
Figure 10.4: Employee transfer after the SDO runtime reacts
Previous page
Table of content
Next page
SOA for the Business Developer: Concepts, BPEL, and SCA (Business Developers series)
ISBN: 1583470654
EAN: 2147483647
Year: 2004
Pages: 157
Authors:
Ben Margolis
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Hacker and Cracker Descriptions
Study Strategies
Apply Your Knowledge
Session Hijacking
Study Tools
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Network Security Architectures
Emerging Security Technologies
IPsec Outsourcing
Network Design Considerations
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
What Are Functions and Commands?
Display an Are You Sure? Message
Parse a Text String
Schedule Agent to Send a Daily, Weekly, or Monthly Email Report
Add an Icon to an Action Button
Special Edition Using Crystal Reports 10
Using Cross-Tabs for Summarized Reporting
Understanding Subreports
Troubleshooting
Crystal Enterprise User Launchpad
The Application Tier
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Triggers
Indirect Privilege Escalation
Attacking Oracle PL/SQL Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies