Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010148548 | CP 10187 | Computer File Accompanies Open Access Book | Compact Disc Accompanies Open Access Book | Searching... |
On Order
Summary
Summary
EXAM PREP GUIDE
Ace your preparation for the skills measured by MCTS Exam 70-529--and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you've learned by applying your knowledge to real-world case scenarios and labs. This official Microsoft study guide is designed to help you make the most of your study time.
Maximize your performance on the exam by learning to:
Configure, customize, and deploy a Web service application Format and extend XML Web services with customized SOAP headers and extensions Create, debug, and host remoting server and client applications Invoke methods and manage events with .NET Remoting or .NET Web Services Enable Web Services Enhancements 3.0 and add digital signatures to SOAP messages Create serviced components and manage message queuesPRACTICE TESTS
Assess your skills with practice tests on CD. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers?including a customized learning path that describes how and where to focus your studies.
Your kit includes:
Official self-paced study guide. Practice tests with multiple, customizable testing options and a learning plan based on your results. 400+ practice and review questions. Case scenarios and lab exercises. Microsoft Visual Basic and Visual C# code samples on CD. 90-day evaluation version of Microsoft Visual Studio 2005 Professional Edition. Fully searchable eBook of this guide.For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Author Notes
Bill Ryan is an MVP for Windows Embedded and a frequent speaker at industry events including Microsoft Code Camps and .NET User?s Groups. GrandMasters is an IT consulting firm specializing in content development, exam development, and customized technical support.
Table of Contents
Introduction | p. xxvii |
Hardware Requirements | p. xxvii |
Software Requirements | p. xxviii |
Installing SQL Server 2005 Express | p. xxx |
Installing the Adventure Works Database | p. xxxi |
Using the CD and DVD | p. xxxi |
How to Install the Practice Tests | p. xxxii |
How to Use the Practice Tests | p. xxxii |
Microsoft Certified Professional Program | p. xxxiv |
Technical Support | p. xxxiv |
Foundation Edition Software Support | p. xxxv |
1 Creating an XML Web Service | p. 1 |
Before You Begin | p. 1 |
Lesson 1 How to Create a Web Service | p. 3 |
What Is a Web Service? | p. 3 |
How to Create a New Web Service Project | p. 4 |
The WebMethods Framework | p. 7 |
Lab 1 Creating a Web Service Project Using Visual Studio | p. 11 |
Lesson Summary | p. 13 |
Lesson Review | p. 13 |
Lesson 2 How to Create a Web Service Method | p. 15 |
Applying the WebMethod Attribute | p. 15 |
Configuring a Web Service Method | p. 16 |
Creating a One-Way Method | p. 17 |
Lab 2 Creating a Public Web Service Method | p. 20 |
Lesson Summary | p. 22 |
Lesson Review | p. 23 |
Lesson 3 How to Test and Consume a Web Service | p. 24 |
Testing Your Web Service | p. 24 |
Consuming a Web Service | p. 28 |
Lab 3 Testing and Consuming a Web Service | p. 29 |
Lesson Summary | p. 31 |
Lesson Review | p. 31 |
Chapter Review | p. 33 |
Chapter Summary | p. 33 |
Key Terms | p. 33 |
Case Scenarios | p. 34 |
Case Scenario 1 Deciding to Use Web Services | p. 34 |
Case Scenario 2 Testing your Web Service | p. 34 |
Suggested Practices | p. 34 |
Take a Practice Test | p. 35 |
2 Extending XML Web Services with SOAP Formatting, Custom Headers, and Extensions | p. 37 |
Before You Begin | p. 38 |
Lesson 1 How to Configure SOAP Messages | p. 39 |
Configuring SOAP Messages | p. 39 |
Customizing SOAP Messages with XML Serialization | p. 49 |
Lab 1 How to Configure SOAP Messages | p. 52 |
Lesson Summary | p. 54 |
Lesson Review | p. 54 |
Lesson 2 How to Implement SOAP Headers | p. 56 |
What Is a SOAP Header? | p. 56 |
Adding a Custom SOAP Header Class | p. 57 |
Building a Client that Processes the SOAP Header | p. 60 |
How to Handle Unknown SOAP Headers | p. 62 |
Lab 2 How to Implement a Custom SOAP Header | p. 63 |
Lesson Summary | p. 70 |
Lesson Review | p. 70 |
Lesson 3 How to Implement SOAP Extensions | p. 72 |
What Is a SOAP Extension? | p. 72 |
Creating a Custom SOAP Extension Class | p. 74 |
Configuring the SOAP Extension | p. 78 |
Lab 3 How to Implement a Custom SOAP Extension | p. 80 |
Lesson Summary | p. 85 |
Lesson Review | p. 85 |
Chapter Review | p. 87 |
Chapter Summary | p. 87 |
Key Terms | p. 88 |
Case Scenarios | p. 88 |
Case Scenario 1 Creating a Custom SOAP Header | p. 88 |
Case Scenario 2 Creating a SOAP Extension | p. 88 |
Suggested Practices | p. 89 |
Take a Practice Test | p. 89 |
3 Configuring and Publishing XML Web Services | p. 91 |
Before You Begin | p. 92 |
Lesson 1 How to Manage State in a Web Service | p. 93 |
Using the Application Object | p. 93 |
Using the Session Object | p. 95 |
Handling Session State on the Client with Cookies | p. 96 |
Performance Implications | p. 99 |
Lab 1 Using the Session Object to Maintain State in a Web Service | p. 99 |
Lesson Summary | p. 101 |
Lesson Review | p. 102 |
Lesson 2 How to Configure a Web Service Application | p. 104 |
Using a Configuration File | p. 104 |
Using the Machine.config File | p. 107 |
Configuring the Session State Mode | p. 108 |
Lab 2 Configuring a Web Service Application | p. 109 |
Lesson Summary | p. 110 |
Lesson Review | p. 111 |
Lesson 3 How to Deploy and Publish a Web Service | p. 112 |
Publishing Your Web Service | p. 112 |
Using a Static Discovery File | p. 113 |
Using a Dynamic Discovery File | p. 114 |
Deploying a Web Service Application | p. 115 |
Lab 3 Deploying a Web Service Using a Web Setup Project | p. 117 |
Lesson Summary | p. 119 |
Lesson Review | p. 119 |
Chapter Review | p. 121 |
Chapter Summary | p. 121 |
Key Terms | p. 122 |
Case Scenarios | p. 122 |
Case Scenario 1 Creating a Session Variable to Store the Selected Vendor ID | p. 122 |
Case Scenario 2 Creating a Custom Service Help Page for All Your Web Services | p. 122 |
Case Scenario 3 Creating Setup Projects to Deploy Your Web Services | p. 123 |
Suggested Practices | p. 123 |
Take a Practice Test | p. 124 |
4 Creating a Remoting Server Application | p. 125 |
Before You Begin | p. 126 |
Lesson 1 Remoting Basics | p. 127 |
What Is Remoting? | p. 127 |
Types of Remote Objects | p. 129 |
Hosting a Remote Server Application | p. 129 |
Activating Your Remote Object | p. 130 |
Selecting a Communication Channel | p. 131 |
Marshal-by-Value | p. 132 |
Creating a Remote Server Object | p. 132 |
Lab 1 Creating a Remote Server Application | p. 136 |
Lesson Summary | p. 139 |
Lesson Review | p. 140 |
Lesson 2 How to Configure a Server Application Programmatically | p. 141 |
Specifying the Name of the Server Application | p. 142 |
Registering the Remote Object | p. 142 |
Configuring Versioning | p. 144 |
Registering a Communication Channel | p. 145 |
Lab 2 How to Configure a Remote Server Application Programmatically | p. 147 |
Lesson Summary | p. 150 |
Lesson Review | p. 150 |
Lesson 3 How to Configure a Server Application with a Configuration File | p. 152 |
Creating a Configuration File | p. 152 |
The Application Element | p. 156 |
Configuring Versioning | p. 158 |
Configuring Formatting | p. 158 |
Configuration Examples | p. 159 |
Lab 3 How to Configure a Server Application Using a Configuration File | p. 161 |
Lesson Summary | p. 162 |
Lesson Review | p. 162 |
Chapter Review | p. 164 |
Chapter Summary | p. 164 |
Key Terms | p. 164 |
Case Scenarios | p. 165 |
Case Scenario 1 Suggesting a Distributed Technology | p. 165 |
Case Scenario 2 Using a Configuration File to Configure Your Remoting Application | p. 165 |
Suggested Practices | p. 165 |
Take a Practice Test | p. 166 |
5 Creating a Remoting Client Application | p. 167 |
Before You Begin | p. 167 |
Lesson 1 Creating a Client Application to Access a Remote Object | p. 169 |
How to Create a Client Instance of a Remote Object | p. 169 |
How to Configure a Client Application Programmatically | p. 171 |
Lab 1 Creating a Client Application | p. 185 |
Lesson Summary | p. 191 |
Lesson Review | p. 192 |
Lesson 2 How to Configure a Client Application Using a Configuration File | p. 193 |
Configuring the Communication Channel | p. 197 |
Configuring the Activation Mode | p. 201 |
Lab 2 Creating a Client Application | p. 205 |
Lesson Summary | p. 207 |
Lesson Review | p. 208 |
Lesson 3 How to Access a Remote Method | p. 209 |
Lab 3 How to Access a Remote Method | p. 210 |
Lesson Summary | p. 212 |
Lesson Review | p. 212 |
Chapter Review | p. 214 |
Chapter Summary | p. 214 |
Key Terms | p. 215 |
Case Scenarios | p. 215 |
Case Scenario 1 Creating a Secure Globally Distributed Application | p. 215 |
Case Scenario 2 Improving the Remoting Client Using Interfaces | p. 216 |
Suggested Practices | p. 216 |
Take a Practice Test | p. 217 |
6 Debugging and Deploying Remote Applications | p. 219 |
Before You Begin | p. 219 |
Lesson 1 How to Deploy a Remoting Application | p. 222 |
.NET Remoting Deployment | p. 222 |
Hosting Remote Objects | p. 222 |
Deploying Remote Objects | p. 225 |
Creating a Web Setup Project | p. 228 |
Lab 1 Creating and Installing a Web Setup Project | p. 235 |
Lesson Summary | p. 237 |
Lesson Review | p. 237 |
Lesson 2 How to Debug a Remoting Application | p. 239 |
Visual Studio 2005 Debugger | p. 239 |
The RemotingException Class | p. 242 |
Using Performance Counters | p. 243 |
.NET Remoting Tracking Services | p. 246 |
Lab 2 Debugging a Remoting Application | p. 249 |
Lesson Summary | p. 253 |
Lesson Review | p. 253 |
Lesson 3 How to Manage the Lifetime of Remote Objects | p. 255 |
Lab 3 Managing the Lifetime of Remote Objects | p. 261 |
Lesson Summary | p. 261 |
Lesson Review | p. 261 |
Chapter Review | p. 263 |
Chapter Summary | p. 263 |
Key Terms | p. 264 |
Case Scenarios | p. 264 |
Case Scenario 1 Tracking and Improving the Performance of a Distributed Application | p. 264 |
Case Scenario 2 Simplifying Remote Object Deployment | p. 265 |
Suggested Practices | p. 265 |
Take a Practice Test | p. 266 |
7 Method Invocations and Event Management with .NET Web Services | p. 267 |
Before You Begin | p. 268 |
Lesson 1 Calling Web Methods | p. 269 |
Calling a Web Method Synchronously | p. 269 |
Calling a Web Method Asynchronously | p. 272 |
Lab 1 Calling a Web Method | p. 280 |
Lesson Summary | p. 281 |
Lesson Review | p. 282 |
Lesson 2 Polling Web Methods for Completion | p. 284 |
Polling | p. 284 |
Begin[left angle bracket]methodName[right angle bracket] and IAsyncResult | p. 285 |
Lab 2 Calling a Web Method Asynchronously | p. 290 |
Lesson Summary | p. 292 |
Lesson Review | p. 293 |
Chapter Review | p. 295 |
Chapter Summary | p. 295 |
Key Terms | p. 296 |
Case Scenarios | p. 296 |
Case Scenario 1 Exposing Functionality Through .NET Web Services | p. 296 |
Case Scenario 2 Refining the Use of Web Services | p. 298 |
Suggested Practices | p. 298 |
Take a Practice Test | p. 299 |
8 Method Invocations and Event Management with .NET Remoting | p. 301 |
Before You Begin | p. 302 |
Lesson 1 Calling Remoting Methods | p. 303 |
Calling a Remoting Method Synchronously | p. 304 |
Stateless Invocation Using One-Way Calls | p. 306 |
Calling a Remoting Method Asynchronously | p. 309 |
Lab 1 Invoking a Remoting Method | p. 311 |
Lesson Summary | p. 317 |
Lesson Review | p. 317 |
Lesson 2 Callbacks and Remoting | p. 319 |
Polling | p. 319 |
Determining Whether an Asynchronous Call Has Finished | p. 320 |
Polling for Completion | p. 322 |
Polling Using a Callback Method | p. 324 |
Lab 2 Calling a Remoting Method Asynchronously | p. 327 |
Lesson Summary | p. 334 |
Lesson Review | p. 334 |
Lesson 3 Implementing and Responding to Events | p. 336 |
Handled Remote Events | p. 337 |
Lab 3 Handle Events from a Remote Object | p. 339 |
Lesson Summary | p. 345 |
Lesson Review | p. 345 |
Chapter Review | p. 347 |
Chapter Summary | p. 347 |
Key Terms | p. 347 |
Case Scenarios | p. 348 |
Case Scenario 1 Building Robust, Scalable Enterprise Applications | p. 348 |
Suggested Practices | p. 349 |
Take a Practice Test | p. 349 |
9 Web Services Enhancements 3.0 in Client and Server Applications | p. 351 |
Before You Begin | p. 352 |
Lesson 1 Enabling and Referencing WSE 3.0 | p. 354 |
Adding References to WSE Assemblies in Client Applications | p. 356 |
Inheriting from the WebServicesClientProtocol Class | p. 358 |
Editing the Proxy Class | p. 360 |
Lab 1 Adding WSE 3.0 to a Project | p. 362 |
Lesson Summary | p. 363 |
Lesson Review | p. 363 |
Lesson 2 Using soapExtensionTypes | p. 365 |
Configuration File Structure | p. 366 |
Adding a Child Element with the [left angle bracket]add[right angle bracket] Element | p. 369 |
Specifying a Priority | p. 369 |
Specifying a Group | p. 369 |
Lab 2 Creating a Class That Inherits from WebServicesClientProtocol | p. 370 |
Lesson Summary | p. 377 |
Lesson Review | p. 377 |
Lesson 3 Using Digital Signatures to Ensure Message Integrity | p. 379 |
Digital Signature Basics | p. 379 |
X.509 Certificates | p. 381 |
Kerberos Token | p. 381 |
UserNameToken | p. 382 |
Lab 3 Creating a Policy for Digital Signatures | p. 383 |
Lesson Summary | p. 388 |
Lesson Review | p. 389 |
Chapter Review | p. 390 |
Chapter Summary | p. 390 |
Key Terms | p. 390 |
Case Scenarios | p. 391 |
Case Scenario 1 Where Does WSE Fit into My Application Development Strategy? | p. 391 |
Case Scenario 2 Refining the Process? | p. 392 |
Suggested Practices | p. 393 |
Take a Practice Test | p. 393 |
10 WSE Security | p. 395 |
Before You Begin | p. 396 |
Lesson 1 Web Service Policy | p. 399 |
Creating a Policy | p. 400 |
Using a Policy File | p. 406 |
Lab 1 Configuring Security | p. 406 |
Lesson Summary | p. 408 |
Lesson Review | p. 409 |
Lesson 2 Custom Policies | p. 410 |
Overview | p. 410 |
Basic Encryption | p. 411 |
Creating a Custom Policy Assertion | p. 413 |
Encryption with a Security Token | p. 421 |
Decryption | p. 424 |
Using a Security Token Issuing Service | p. 424 |
Lab 2 Signing and Encrypting a Message Exchange Using Custom Policy | p. 427 |
Lesson Summary | p. 439 |
Lesson Review | p. 440 |
Lesson 3 Message Filters | p. 441 |
Message Filters Overview | p. 442 |
Implementation and Migration | p. 443 |
Lab 3 Creating a Custom Filter | p. 446 |
Lesson Summary | p. 448 |
Lesson Review | p. 448 |
Chapter Review | p. 450 |
Chapter Summary | p. 450 |
Key Terms | p. 452 |
Case Scenario | p. 452 |
Case Scenario 1 How Secure Is Secure Enough? | p. 452 |
Suggested Practices | p. 454 |
Take a Practice Test | p. 454 |
11 Messaging and Routing | p. 455 |
Before You Begin | p. 456 |
Lesson 1 How to Configure WSE Messaging | p. 457 |
WSE Soap Messaging | p. 457 |
Selecting a Communication Protocol | p. 458 |
Implementing One-Way Messaging | p. 459 |
Implementing Two-Way (Bidirectional) Messaging | p. 463 |
Sending Attachments | p. 466 |
Lab 1 Data Transfer with MTOM | p. 469 |
Lesson Summary | p. 479 |
Lesson Review | p. 479 |
Lesson 2 How to Create a WSE Router | p. 481 |
What Is a WSE Router? | p. 481 |
Creating a WSE Router Application | p. 482 |
Configuring the WSE Router Application | p. 484 |
Configuring a Referral Cache for Routing | p. 486 |
Lab 2 Creating a WSE Router | p. 489 |
Lesson Summary | p. 492 |
Lesson Review | p. 492 |
Lesson 3 How to Add and Verify Security Credentials | p. 494 |
Why Add Security Credentials? | p. 494 |
Adding Security Credentials Using an X.509 Certificate | p. 494 |
Other Security Tokens | p. 498 |
Verifying the Security Credential | p. 499 |
Lab 3 Adding Security to Your WSE Router | p. 500 |
Lesson Summary | p. 502 |
Lesson Review | p. 503 |
Chapter Review | p. 505 |
Chapter Summary | p. 505 |
Key Terms | p. 506 |
Case Scenarios | p. 506 |
Case Scenario 1 Performing a Server Upgrade | p. 506 |
Case Scenario 2 Selecting a Security Method for Your WSE Router | p. 506 |
Suggested Practices | p. 507 |
Implement WSE SOAP Messaging | p. 507 |
Route SOAP Messages by using a WSE Router | p. 507 |
Add and Verify Security Credentials | p. 508 |
Take a Practice Test | p. 508 |
12 Creating Serviced Components | p. 509 |
Before You Begin | p. 509 |
Lesson 1 Serviced Component Overview | p. 511 |
COM+ Services | p. 513 |
Creating a Serviced Component | p. 517 |
Register a Serviced Component | p. 521 |
Adding Attributes to a Serviced Component | p. 525 |
Implementing Security on a Serviced Component | p. 537 |
Services Without Components | p. 542 |
System.Transactions | p. 544 |
Lab 1 Building a Simple Serviced Component | p. 546 |
Lesson Summary | p. 552 |
Lesson Review | p. 553 |
Lesson 2 Consuming the Serviced Component | p. 555 |
Referencing the Assembly that Contains the Component | p. 555 |
Declaring and Instantiating the Component | p. 556 |
Access Properties, Methods, and Events of the Component | p. 557 |
Lab 2 Using the Serviced Component in a Separate Application | p. 558 |
Lesson Summary | p. 559 |
Lesson Review | p. 559 |
Chapter Review | p. 561 |
Chapter Summary | p. 561 |
Key Terms | p. 561 |
Case Scenario | p. 562 |
Case Scenario 1 Reliability Through Transactions | p. 562 |
Case Scenario 2 Optimizing Performance | p. 563 |
Suggested Practices | p. 563 |
Create, Configure, and Access a Serviced Component | p. 563 |
Implement Security in a Serviced Component | p. 564 |
Using Automatic Transactions | p. 564 |
Take a Practice Test | p. 565 |
13 Serviced Component Management | p. 567 |
Before You Begin | p. 568 |
Lesson 1 Message Queues | p. 570 |
Message Queuing Basics | p. 570 |
Setting Up a Message Queue | p. 572 |
Sending a Message to a Message Queue | p. 577 |
Reading a Message from a Queue | p. 586 |
Deleting a Message | p. 588 |
Sending and Receiving a Message Asynchronously | p. 588 |
Sending and Receiving a Message Synchronously | p. 588 |
Listening to a Queue Asynchronously | p. 589 |
Sending Objects Using Messages | p. 589 |
Sending a Message Using Queued Components | p. 595 |
Setting Permissions on a Message Queue | p. 597 |
Peeking and Enumerating Messages | p. 602 |
Correlating Messages | p. 606 |
Rules and Triggers | p. 610 |
Lab 1 Creating a Message and Sending It to a Queue | p. 610 |
Lesson Summary | p. 617 |
Lesson Review | p. 618 |
Lesson 2 Securing Messaging | p. 620 |
Signing a Message | p. 620 |
Validating a Message | p. 627 |
Encrypting a Message | p. 631 |
Lab 2 Encrypting a Message and Verifying Its Authenticity After Transmission | p. 634 |
Lesson Summary | p. 637 |
Lesson Review | p. 638 |
Chapter Review | p. 640 |
Chapter Summary | p. 640 |
Key Terms | p. 640 |
Case Scenarios | p. 641 |
Case Scenario 1 Online Shop | p. 641 |
Case Scenario 2 Batches | p. 642 |
Suggested Practices | p. 642 |
Create, Delete, and Set Permissions on a Message Queue | p. 642 |
Send and Receive Messages | p. 643 |
Sign and Encrypt Messages | p. 644 |
Take a Practice Test | p. 644 |
Answers | p. 645 |
Glossary | p. 687 |
Index | p. 693 |