programming4us
           
 
 
Programming
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 >  |  Displaying page 13 of 14, items 361 to 390 of 398.
What is New in iPhone SDK 3.2 for the iPad (part 2)
As of iOS 3.2, Apple has changed the way the MPMoviePlayerController class works. In previous versions, videos were always played in a full-screen player interface. The iPad now offers an enhanced movie player that can be displayed in either full-screen mode or embedded within your app's views.
What is New in iPhone SDK 3.2 for the iPad (part 1)
The new UIBezierPath class may not be one of the most talked about or publicized new features in iPhone SDK 3.2, but if you do any kind of 2D drawing in your app, its inclusion is actually a pretty big deal.
Programming with DirectX : Rendering Geometry - Colors
The first property, aside from vertex positions, that we will discuss is vertex colors. In Direct3D a structure called D3DXCOLOR is used to represent colors.
ASP.NET Security : The Membership and Role Management API (part 3) - Role
Roles in ASP.NET simplify the implementation of applications that require authorization. A role is just a logical attribute assigned to a user. An ASP.NET role is a plain string that refers to the logical role the user plays in the context of the application.
ASP.NET Security : The Membership and Role Management API (part 2) - Provider
The beauty of the membership model lies not merely in the extremely compact code you need to write to validate or manage users but also in the fact that the model is abstract and extensible.
ASP.NET Security : The Membership and Role Management API (part 1)
In ASP.NET 2.0 and beyond, the core of Forms authentication is the same as in ASP.NET 1.x. Most of the tricks and techniques you have learned remain valid and usable. The most notable change to Forms authentication in ASP.NET 2.0 and newer versions is the introduction of a complementary API—the membership API.
ASP.NET Security : Security-Related Controls (part 2)
The LoginView control also allows you to define blocks of user interface to display to all logged-in users who belong to a particular role.
ASP.NET Security : Security-Related Controls (part 1)
In addition to the membership and role management APIs, ASP.NET from version 2.0 onward offers several server controls that make programming security-related aspects of a Web application easier than ever: Login, LoginName, LoginStatus, LoginView, PasswordRecovery, ChangePassword, and CreateUserWizard.
WCF Security Concepts
One of the .most fundamental concepts of security is knowing who is knocking on your door. Authentication is the process of establishing a clear identity for an entity, for example, by providing evidence such as username and password
Certificate-Based Encryption
Certificates, and the claims they represent, are a secure, general-purpose method for proving identity. They embody a robust security mechanism that makes them a great option for encryption and authentication.
Encryption Using SSL
SSL is a convenient, secure way to encrypt communications. It’s well understood by IT organizations, it is firewall friendly, and there are many management and performance tools on the market. Using SSL with BasicHttpBinding enables the broadest reach of a secure Web service.
Security Privileges and Services
You have to think about a number of things when it comes to services and security. Services themselves have to run in a security context that has permissions to do what you program the service to do.
Client Credentials
With authentication, it should be no surprise that the client providing credentials to the service is a common scenario. Two questions must be addressed: which credentials should be used and how they should be provided.
User-Level Security : Service Credentials
There is also a way for the service to present a set of credentials to the client. This is required to support mutual authentication and message protection. Also, when transport security is specified, the service’s credentials might be needed to provide the required functionality.
User-Level Security : Custom Authentication
Although the options that WCF offers for authentication are helpful, there are always gaps through which specific requirements will fall. It is not possible to guarantee that all the available choices will cover every possible scenario, so in the typical WCF manner, you can extend the authentication process with your own custom mechanism.
User-Level Security : Authorization and Impersonation (part 4) - Impersonation
The custom authorization policy (or any authorization policy) is built to add claims to the security context for the request. However, this is not the only place where claims are added. When a request first arrives at the service, the security tokens included with the request are evaluated. These claims are also added to the security context.
User-Level Security : Authorization and Impersonation (part 3) - Security Token Authentication
The custom authorization policy (or any authorization policy) is built to add claims to the security context for the request. However, this is not the only place where claims are added. When a request first arrives at the service, the security tokens included with the request are evaluated. These claims are also added to the security context.
User-Level Security : Authorization and Impersonation (part 2) - Claims-Based Authorization
Along with being able to be integrated into Windows authentication, WCF also supports a claims-based technique for authorization. Before going into the mechanics of claims-based authorization, a couple of moments defining the terminology are helpful.
User-Level Security : Authorization and Impersonation (part 1) - Authorization
Being able to identify the client is just half the process. Included in the security story for WCF is authorization, which determines the access that is allowed to various resources. This is related to granting access on the service side.
Publisher Certificates
Strong names provide unique identities for assemblies and protect against tampering, but they do not contain any information about the identity of the assembly publisher. The .NET Framework supports the Signcode scheme, which requires a publisher to prove its identity to a trusted third-party authority and obtain a software publisher's certificate (SPC).
Using LINQ To SQL
There are multiple forms of LINQ when using Microsoft Visual Basic, such as LINQ for DataSets and LINQ To SQL. We will use LINQ To SQL, which is one technology that extends the abilities of Visual Basic 2008.
Service Management API (part 2) - Making API Requests
API requests are simply HTTP calls against a specified URI under management.core.windows.net.
Service Management API (part 1)
You can access the service management capabilities and perform day-to-day tasks (creating, deleting, and updating stuff) through the Service Management API. This RESTful HTTP API can be accessed from both inside and outside Microsoft data centers
Windows Services : A Service Control Shell
You can control Windows Services from the Administrative Tools, where there is a Services icon. Alternatively, you can control services from the Windows command sc.exe.
ASP.NET Applications and the Web Server
ASP.NET applications always work in conjunction with a web server—a specialized piece of software that accepts requests over Hypertext Transport Protocol (HTTP) and serves content.
Internet Information Services (IIS)
As you've probably guessed by now, deploying a web application is just the process of copying your web application files to a web server.
Managing Websites with IIS Manager (part 7) - Confidentiality with SSL and Certificates
A certificate allows you to demonstrate that your site and your organization information are registered and verified with a certificate authority. This generally encourages customer confidence, although it doesn't guarantee the company or organization acts responsibly or fairly.
Managing Websites with IIS Manager (part 6) - The Machine Key and Windows Authentication
As you learned earlier in this chapter, some organizations use groups of web servers that work together to host web applications. This arrangement, called a web farm, has some side effects.
Managing Websites with IIS Manager (part 5) - The Default Page and Custom Error Pages
IIS scans the default document list from top to bottom and returns the first matching page. Using the list in Figure 9, IIS will check first for a Default.htm file and then for Default.asp, index.htm, index.html, iisstart.asp, and default.aspx, which is the home page that most ASP.NET applications use
Managing Websites with IIS Manager (part 4) - Configuration
The ASP.NET group includes ASP.NET-specific settings. Technically, these settings are simply a nice graphical wrapper over various sections in the web.config file. In other words, you use the convenient graphical interface IIS provides, and IIS updates the corresponding configuration elements in your web.config file.
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us