Flylib.com
List of Code Examples
Previous page
Table of content
Chapter 3: Remoting in Action
Example 3-1: The Interface Definition That Will Be Compiled to a DLL
Example 3-2: A Simple Client Application
Example 3-3: The Complete Server Implementation
Example 3-4: A Server That Offers a Client-Activated Object
Example 3-5: The Client Accesses the Client-Activated Object
Example 3-6: The Factory Design Pattern
Example 3-7: The Shared Interfaces for the Factory Design Pattern
Example 3-8: The Server-Side Factory Pattern's Implementation
Example 3-9: The Client Uses the Factory Pattern
Example 3-10: A Client That Calls a Timed-Out CAO
Example 3-11: The Shared Assembly's Source Code
Example 3-12: A Server with Some Long-Running Methods
Example 3-13: The First Client Calls the Methods Synchronously
Example 3-14: Using a Delegate in a Local Application
Example 3-15: The New Client Now Using Asynchronous Delegates
Example 3-16: The Shared Interfaces DLL Defines the One-Way Method
Example 3-17: Try/Catch Blocks Are Added to the Client
Example 3-18: Removing the
[OneWay()]
Attribute
Example 3-19: Using Abstract Base Classes in the Shared Assembly
Example 3-20: The First Server
Example 3-21: The Second Server
Example 3-22: Server That Presents a SAO
Example 3-23: Wrapped Proxies Simplify the Client's Source Code
Example 3-24: A SoapSuds-Generated Wrapped Proxy
Example 3-25: The Client with a Nonwrapped Proxy
Chapter 4: Configuration and Deployment
Example 4-1: A Shared [Serializable] Class
Example 4-2: The Server-Side Implementation of CustomerManager
Example 4-3: The SoapSuds-Generated server.cs File
Example 4-4: The Working Client Application (Excluding server.cs)
Example 4-5: A Baseline Windows Service
Example 4-6: A Basic Windows Service Installer
Example 4-7: A Simple Windows Service to Host Your Remote Components
Example 4-8: Server-Side Implementation of the SAO
Example 4-9: An Anonymous Client
Chapter 5: Securing .NET Remoting
Example 5-1: Client That Uses IIS' Built-In Authentication Methods
Example 5-2: Checking the Membership in Windows Groups When Hosting in IIS
Chapter 6: In-Depth .NET Remoting
Example 6-1: Implementation Showing the Effects of Different Lifetime Settings
Example 6-2: The Client Calling the Various SAOs with Different Delays
Example 6-3: This Class Is the Base for the Following Examples
Example 6-4: Catching the Exception When Calling an Expired Object
Example 6-5: Registering the Sponsor to Avoid Premature Termination of the Object
Example 6-6: The Server-Side Sponsor That Is Pinged by the Client
Example 6-7: Version 1.0.0.1 of the Server
Example 6-8: Version 1.0.0.1 of the Client Application
Example 6-9: The New Version 2.0.0.1 of the Server
Example 6-10: The SoapSuds-Generated Nonwrapped Proxy's Source
Example 6-11: The First Version of the Serializable Object
Example 6-12: Manual Serialization Allows More Sophisticated Versioning
Example 6-13: Trying to Use a Delegate with a SoapSuds-Generated Proxy
Example 6-14: SoapSuds -gc Output for a Simple SAO
Example 6-15: The SoapSuds-Generated server.cs After Removing the Attribute
Example 6-16: The Client Using a Wrapper Function
Example 6-17: The RemotingHelper Called with typeof(ISomeInterface)
Example 6-18: The IBroadcaster Interface (Nonworking Sample)
Example 6-19: The Server-Side Implementation of IBroadcaster
Example 6-20: The First Client's Implementation, That Won't Work
Example 6-21: The Shared Assembly Now Contains the BroadcastEventWrapper
Example 6-22: The New Listening Client's Source Code
Example 6-23: EventInitiator Simply Calls BroadcastMessage()
Example 6-23: Invoking Each Delegate on Your Own
Chapter 9: Extending .NET Remoting
Example 9-1: A Skeleton IClientChannelSink
Example 9-2: Class Returning Compressed or Uncompressed Streams
Example 9-3: A Basic IServerChannelSink
Example 9-4: The Client-Side Sink Provider
Example 9-5: The Server-Side Sink Provider
Example 9-6: A Complete Keyfile Generator
Example 9-7: The EncryptionHelper Encapsulates the Details of the Cryptographic Process
Example 9-8: The EncryptionClientSink
Example 9-9: The EncryptionServerSink
Example 9-10: The EncryptionClientSinkProvider
Example 9-11: The EncryptionServerSinkProvider
Example 9-12: The Complete PriorityEmitterSink
Example 9-13: The Client-Side PriorityEmitterSinkProvider
Example 9-14: The Server-Side PriorityChangerSink
Example 9-15: The Server-Side PriorityChangerSinkProvider
Example 9-16: The Test Client
Example 9-17: The UrlAuthenticator Stores Usernames and Passwords
Example 9-18: The UrlAuthenticationSink
Example 9-19: The UrlAuthenticationSinkProvider
Example 9-20: A Skeleton Custom Remoting Proxy
Example 9-21: Using a Custom Proxy
Example 9-22: This Custom Proxy Dumps the Request and Response Messages' Contents
Chapter 10: Developing a Transport Channel
Example 10-1: Encapsulating the Lower-Level SMTP Protocol
Example 10-2: A Retrieved and Parsed Message
Example 10-3: IChannel and IChannelSender
Example 10-4: The SMTPClientTransportSinkProvider
Example 10-5: IChannel and IChannelReceiver
Example 10-6: IChannelSinkBase and IServerChannelSink
Example 10-7: The SMTPChannel
Chapter 11: Context Matters
Example 11-1: The First Version of the Organization Object
Example 11-2: A ContextAttribute That Allows You to Intercept Calls
Example 11-3: The IContextProperty Interface
Example 11-4: The IContributeObjectSink Interface
Example 11-5: The CheckableContextProperty
Example 11-6: The CheckerSink's First Iteration
Example 11-7: The Organization Now Is a ContextBoundObject
Example 11-8: This Client Is Using the ContextBoundObject
Example 11-9: The CheckAttribute
Example 11-10: The CheckerSink
Example 11-11: This Client Does Not Honor the Business Logic Constraints
Previous page
Table of content
Advanced .NET Remoting (C# Edition)
ISBN: 1590590252
EAN: 2147483647
Year: 2002
Pages: 91
Authors:
Ingo Rammer
BUY ON AMAZON
CISSP Exam Cram 2
OPERATIONS SECURITY
Introduction
How to Prepare for the Exam
The Ideal CISSP Candidate
Applications and Systems-Development Security
Certified Ethical Hacker Exam Prep
Determining Assessment Scope
Key Terms
Summary
Public Key Infrastructure
Contacting Que Certification
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Defeating Virtual Private Databases
Accessing the File System
Accessing the Network
MPLS Configuration on Cisco IOS Software
VPLS Overview
Command Reference
Introduction to QoS-Classification and Marking
Modular QoS CLI: Configuration of QoS on Cisco Routers
Case Study 10: BGP Site of Origin
Digital Character Animation 3 (No. 3)
Hierarchies and Character Animation
Animation Interfaces
Conclusion
Four-Legged Mammals
Acting and Story
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies