December 2007
Intermediate to advanced
512 pages
15h 28m
English
Chapter 1. SOA requires new approaches to security
Table 1.1. Evidence you, the user, can present to prove your identity to an application
Table 1.2. Possible authentication strategies in different service invocation scenarios
Table 1.3. Currently available options for implementing SOA security in different scenarios
Chapter 2. Getting started with web services
Table 2.1. Prerequisites for running examples in this book
Table 2.2. Instructions for installing Axis
Table 2.3. Instructions for setting up examples
Table 2.4. Instructions for running example 1
Table 2.5. The four faultCode values predefined by SOAP 1.1 specification
Table 2.6. Instructions for consuming the brokerage service with a .NET-based client
Chapter 3. Extending ...