Szpuszta / Rammer | Advanced .NET Remoting | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 608 Seiten

Szpuszta / Rammer Advanced .NET Remoting


2. ed
ISBN: 978-1-4302-0011-6
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 608 Seiten

ISBN: 978-1-4302-0011-6
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark



* Proven best-seller and award winner on the market. Insiders highly recommended this title. * More than 150 pages of new material plus a preview of changes for Whidbey (Visual Studio 2005). * Goes far beyond any documentation, white papers and specialist documents available on the subject.

Mario Szpuszta is working in the Developer and Platform Group of Microsoft, Austria. Before he started working for Microsoft, Mario was involved in several projects based on COM+ and DCOM with Visual Basic and Visual C++ as well as projects based on Java and J2SE. With beta 2 of the .NET Framework, he started developing Web applications with ASP.NET. As developer evangelist for Microsoft Austria, he is doing workshops, trainings, and proof-of-concept projects together with independent software vendors in Austria based on .NET, Web Services, and Office 2003 technologies.

Szpuszta / Rammer Advanced .NET Remoting jetzt bestellen!

Weitere Infos & Material


1;Contents;7
2;About the Authors;17
3;About the Technical Reviewer;18
4;Acknowledgments;19
5;Introduction;20
6;Part I Understanding;25
6.1;Chapter 1 Introduction to Remoting;26
6.1.1;What Is Remoting?;26
6.1.2;Scenarios for .NET Remoting;26
6.1.3;Evolution of Remoting;27
6.1.4;Summary;30
6.2;Chapter 2 NET Remoting Basics;31
6.2.1;Advantages of .NET Remoting;31
6.2.2;Summary;45
6.3;Chapter 3 .NET Remoting in Action;46
6.3.1;Types of Remoting;46
6.3.2;Types of Invocation;67
6.3.3;Multiserver Configuration;80
6.3.4;Sharing Assemblies;88
6.3.5;Summary;95
6.4;Chapter 4 Configuration and Deployment;96
6.4.1;Configuration Files;97
6.4.2;What About Interfaces?;121
6.4.3;Deployment;129
6.4.4;Summary;142
6.5;Chapter 5 Securing .NET Remoting;143
6.5.1;Building Secure Systems;143
6.5.2;Authentication Protocols in Windows;144
6.5.3;Identities and Principals: A Short Overview;149
6.5.4;Securing with IIS;153
6.5.5;Security Outside of IIS;160
6.5.6;Implementing Authorization in the Server;169
6.5.7;Security with Remoting in .NET 2.0 (Beta);171
6.5.8;Summary;180
6.6;Chapter 6 Creating Remoting Clients;181
6.6.1;Creating a Server for Your Clients;181
6.6.2;Creating a Console Client;183
6.6.3;Creating Windows Forms Clients;187
6.6.4;Creating Back-End–Based Clients;189
6.6.5;Summary;204
6.7;Chapter 7 In-Depth .NET Remoting;205
6.7.1;Managing an Object’s Lifetime;205
6.7.2;Using the CallContext;229
6.7.3;Remoting Events;233
6.7.4;Summary;244
6.8;Chapter 8 The Ins and Outs of Versioning;245
6.8.1;.NET Framework Versioning Basics;245
6.8.2;Versioning in .NET Remoting—Fundamentals;253
6.8.3;Advanced Versioning Concepts;266
6.8.4;Summary;293
6.9;Chapter 9 .NET Remoting Tips and Best Practices;295
6.9.1;.NET Remoting Use Cases;295
6.9.2;The Nine Rules of Scalable Remoting;300
6.9.3;Using Events and Sponsors;301
6.9.4;SoapSuds vs. Interfaces in .NET Remoting;306
6.9.5;Custom Exceptions;308
6.9.6;Scaling Out Remoting Solutions;310
6.9.7;Summary;321
6.10;Chapter 10 Troubleshooting .NET Remoting;322
6.10.1;Debugging Hints;322
6.10.2;Configuration File Settings;324
6.10.3;BinaryFormatter Version Incompatibility;328
6.10.4;Changing Security Restrictions with TypeFilterLevel;330
6.10.5;Using Custom Exceptions;332
6.10.6;Multihomed Machines and Firewalls;334
6.10.7;Summary;337
7;Part II Extending;338
7.1;Chapter 11 Inside the Framework;339
7.1.1;Looking at the Five Elements of Remoting;339
7.1.2;Client-Side Messaging;349
7.1.3;Server-Side Messaging;351
7.1.4;All About Asynchronous Messaging;356
7.1.5;Summary;366
7.2;Chapter 12 Creation of Sinks;367
7.2.1;Understanding Sink Providers;367
7.2.2;Using Dynamic Sinks;374
7.2.3;Summary;375
7.3;Chapter 13 Extending .NET Remoting;376
7.3.1;Creating a Compression Sink;376
7.3.2;Encrypting the Transfer;392
7.3.3;Passing Runtime Information;407
7.3.4;Changing the Programming Model;419
7.3.5;Avoiding the BinaryFormatter Version Mismatch;426
7.3.6;Using a Custom Proxy;430
7.3.7;Some Final Words of Caution;436
7.3.8;Summary;436
7.4;Chapter 14 Developing a Transport Channel;438
7.4.1;Protocol Considerations;438
7.4.2;Encapsulating the Protocols;443
7.4.3;Implementing the Client Channel;462
7.4.4;Implementing the Server Channel;470
7.4.5;Wrapping the Channel;479
7.4.6;Using the SmtpChannel;482
7.4.7;Some Final Words of Caution;485
7.4.8;Summary;485
7.5;Chapter 15 Context Matters;486
7.5.1;Working at the MetaData Level;488
7.5.2;Creating a Context;489
7.5.3;Checking Parameters in an IMessageSink;497
7.5.4;Summary;500
7.5.5;Conclusion;501
8;Part III Reference;502
8.1;APPENDIX A .NET Remoting Usage Reference;503
8.1.1;System Types;503
8.1.2;System.Runtime.Remoting;507
8.1.3;System.Runtime.Remoting.Channels;515
8.1.4;System.Runtime.Remoting.Channels.Http;520
8.1.5;System.Runtime.Remoting.Channels.Tcp;522
8.1.6;System.Runtime.Remoting.Lifetime;524
8.1.7;System.Runtime.Remoting.Messaging;528
8.1.8;System.Runtime.Remoting.Metadata;530
8.1.9;System.Runtime.Remoting.Services;532
8.1.10;ystem.Runtime.Serialization;534
8.1.11;System.Runtime.Serialization.Formatters;537
8.1.12;Summary;539
8.2;APPENDIX B .NET Remoting Extensibility Reference;540
8.2.1;System.Runtime.Remoting.Messaging;540
8.2.2;System.Runtime.Remoting.Activation;544
8.2.3;System.Runtime.Remoting.Proxies;545
8.2.4;System.Runtime.Remoting.Channels;546
8.2.5;Summary;555
8.3;APPENDIX C .NET Remoting Links;556
8.3.1;Ingo’s .NET Remoting FAQ Corner;556
8.3.2;MSDN and MSDN Magazine Articles;556
8.3.3;.NET Remoting Interoperability;559
8.3.4;Custom .NET Remoting Channels;559
8.3.5;Interesting Technical Articles;561
8.3.6;Remoting Tools;563
9;Index;564



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.