But, more importantly, although the technique of intercepting application exceptions is well-known, is it really appropriate in case of Web services invocations?
但更重要的是,尽管拦截应用程序异常的技术广为人知,但它真的适合于Web服务调用吗?
Often, programmers will leave the door open to attacks by using poor technique, like not strictly defining the types of data they expect as input to Web services.
通常,程序员会为使用拙劣技术进行的攻击留下后门,如没有严格地定义Web服务所需的输入数据的类型。
That is, the it team needs to acknowledge SOA as an architectural discipline compared with Web services, which is currently the most popular SOA implementation technique.
即,IT团队需要认识到,SOA是一个体系结构规程,而Web服务是目前最流行的SOA实现技术。
Although this technique works for any kind of data you can pass through a URL, this article focuses on Web services, so I'll start with the simple SOAP message in Listing 1.
虽然这项技术适用于任何能够通过URL传递的数据,但本文主要讨论Web服务,因此我们从一个简单的SOAP消息开始,如清单1所示。
This technique lets you expose your existing applications as Web services, and sometimes more importantly, it means that existing applications can consume Web services without change.
此技术允许您将现有应用程序作为Web服务公开,有时更重要的是,这意味着现有的应用程序无需更改即可使用Web服务。
A secret technique many web services implement is redirecting mobile devices to a sub-domain containing the alternative mobile version of the site layout.
另外,一项登录网站的隐私保护技术也对网站服务提供了支持。 在进行网站设计时,这项技术能够将移动终端设备变为一个次级转换单位,使得网站包含手机影像转换的功能。
Adopt and use a good service modeling technique to determine appropriate coarse-grained services for a business solution and leverage web services to implement a SOA solution.
引入和采用良好的服务建模技术来确定供业务解决方案使用的恰当粗粒度服务,并利用Web服务来实现SOA解决方案。
One popular technique enables clients to re-face 3270 user interfaces with tools like Host Access Transformation (HATS) to generate Web-based interfaces as well as services.
一个颇受欢迎的技术可让客户使用HostAccessTransformation (HATS)之类的工具重构3270个用户界面,以生成基于Web的接口和服务。
A server integrated technique is proposed, which integrates HTTP, FTP and user defined protocol together, and uses one TCP port and one thread to supply all web services.
提出服务器集成概念,将HTTP、FTP和用户自定义TCP测量协议集成,用一个端口和线程来提供所有网络服务。
The attack USES a technique, known at XML signature wrapping or XML rewriting, that has been known since 2005 and exploits a weakness in the way Web services validate signed requests.
攻击采用了一种在XML签名包装或XML重写中认出的技术,它2005年就为人所知,并利用了网络服务验证签名需求的弱点。
The attack USES a technique, known at XML signature wrapping or XML rewriting, that has been known since 2005 and exploits a weakness in the way Web services validate signed requests.
攻击采用了一种在XML签名包装或XML重写中认出的技术,它2005年就为人所知,并利用了网络服务验证签名需求的弱点。
应用推荐