Sun Microsystems. “Java Remote Method Invocation Specification”. Feb. 10, 1997.* |
van Hoff, Arthur et al. “The HTTP Distribution and Replication Protocol”. Aug. 25, 1997.* |
P. Hallam-Baker et al. “HTTP Authentication: Basic and Digest Access Authentication”. Nov. 21, 1997.* |
Eastlake et al. “CyberCash Credit Card Protocol Version 0.8” p. 1-45, Feb. 1996.* |
IETF. “HTTP: A Protocol for networked information” p. 1-11. May 1994.* |
SUN. “Java Remote Method Inovocation Specification” p. 1-90, Feb. 1997.* |
Berners-Lee, T. et al. “Hypertext Transfer Protocol—HTTP/1.0” p. 1-35, May 1996.* |
Borenstein, N. “MIME Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies” p. 1-57, Sep. 1993.* |
Microsoft Windows NT Server, DCOM Technical Overview, White Paper. Microsoft Corporation, Redmond, WA. 1996. |
Distributed Component Object Model (DCOM) Binary Protocol), Web page at http://www.microsoft.com/workshop/prog/com/dcom.htm. Microsoft Corporation, Redmond, WA. May 1996. |
The Component Object Model: Technical Overview, Web page at http://www.microsoft.com/oledev/olecom/Com_modl.htm. Microsoft Corporation, Redmond, WA. 1996. |
Rooney, P., “Microsoft puts toe in warehousing waters,” PCWEEK ONLINE ZDNet's IT Resource, Web page at http://www.zdnet.com/eweek/news/0805/05data.html, 3 pp., Aug. 1996. |
Pleas, K., “ActiveX goes server-side,” Microsoft Interactive Developer, Web page at http://www.microsoft.com/mind/0796/preview0796.htm, 4pp., Sep. 1996. |
Kirtland, M., “Writing a Smart Server Application with Denali,” Microsoft Interactive Developer, Web page at http://www.microsoft.com/mind/1296/denali.htm, 13 pp., Dec. 1996. |
“Making Sure Your Server's Secure,” Microsoft Interactive Developer, Web page at http://msdn.microsoft.com/library/periodic/period96/IISSecurity.htm, 13 pp., Nov. 1996. |