CopyrightForewordAcknowledgmentsIntroductionWhy We Wrote This BookWho This Book Is ForHow This Book Is OrganizedSystem RequirementsMicrosoft Learning Technical Support Part I: The Web Services Architecture Chapter 1. Introduction to the Web Services ArchitectureMessage OrientationProtocol ComposabilityAutonomous ServicesManaged TransparencyProtocol-Based IntegrationThe Web Services Architecture Chapter 2. Core MessagingXML and the InfosetSOAPMessage Exchange PatternsTransport IndependenceAddressing Chapter 3. Metadata Chapter 4. SecurityMessage Integrity and ConfidentialityTrust Based on Security TokensSecure SessionsSecurity PoliciesSystem Federations Chapter 5. DiscoveryDirectoriesDynamic Discovery Chapter 6. CoordinationReliable Messaging and TransactionsReliable MessagingCoordinating Web ServicesDesignated CoordinatorsAtomic TransactionsQueued SystemsLong Duration Activities Chapter 7. Enumeration, Transfer, and EventingEnumerationTransferEventing Chapter 8. Management Part II: Example Scenarios Chapter 9. Introduction to the Example Scenarios Chapter 10. Core Messaging ExampleXML and the InfosetSOAPTransport IndependenceAddressing: Using Endpoint ReferencesAddressing: RepliesAddressing: Reference Parameters and Reference PropertiesAddressing: Message Identification and CorrelationAddressing: Processing Semantics Chapter 11. Metadata ExampleWSDLWS-Policy: Custom PoliciesPoliciesPolicy AttachmentMetadata Exchange Chapter 12. Security ExampleMessage Integrity and ConfidentialityTrust Based on Security Tokens Chapter 13. Directory-Based Discovery ExampleUDDI Chapter 14. Designated Coordinators ExampleAtomic Transactions Chapter 15. Dynamic Discovery ExampleProbe and Probe MatchHello and Bye Chapter 16. Enumeration, Transfer, and Eventing ExampleEnumerationTransferEventing Chapter 17. Management ExampleAddressing ResourcesGeneral MessagingResource InformationEvents and Message Delivery Chapter 18. Concluding Remarks Part III: Appendixes Appendix A. Glossary Appendix B. XML Infoset Information Items Appendix C. Common Security Attacks Appendix D. Sample Namespace Reference Appendix E. WS-Addressing Action URI ReferenceWS-DiscoveryWS-EnumerationWS-EventingWS-ManagementWS-MetadataExchangeWS-SecureConversationWS-TransferWS-Trust Appendix F. ReferencesCore SpecificationsWeb Services SpecificationsInteroperability ProfilesOther ResourcesLuis Felipe CabreraChris KurtIndex