"Artech's WCF Anatomy series" series of technical Articles to organize the collection

Source: Internet
Author: User

"Artech's WCF Anatomy series" series of technical Articles to organize the collection

1 Control of concurrent access three-channel barrier: WCF current limit (throttling) system quest [Next]

2 Mission: In-depth analysis of reliable WCF sessions [example] (with beautiful pictures, the force of the poor caution)

3 Mission: An in-depth analysis of reliable conversations in WCF [concept article]

4WCF How to overcome the limitations of the HTTP transport Protocol to provide implementation of different message transmission patterns

5WCF concurrency (Concurrency) and current limit (throttling) system in-depth analysis series [Total 7 articles]

6 mission Required: In-depth analysis of reliable WCF sessions [protocol] (Part one)

7 Mission Required: In-depth analysis of reliable WCF sessions [protocol] (bottom)

8 mission Required: In-depth analysis of reliable conversations in WCF [programming] (top)

bug!! for reliable sessions in 9WCF

10 mission Required: In-depth analysis of reliable conversations in WCF [programming] (bottom)

11 mission: An in-depth analysis of reliable conversations in WCF [Principles of The Secret chapter] (Part One)

12 mission Required: In-depth analysis of WCF's reliable sessions [principles of The Secret chapter] (bottom)

13 mission Required: In-depth analysis of reliable WCF sessions [total 8 articles]

Basic concepts and principles of 14WCF Transport Security (Transfer): Certification (authentication) [Prev]

15 serious problems caused by Callcontextinitializer-based WCF extensions

16 about a very "silent" bug! of WCF

17[WCF Safety Series] from two security modes

18[WCF Security Series] authentication and credentials: username/password Authentication and Windows authentication

19[WCF Security Series] certifications and credentials: certificates

20[WCF Security Series] bindings, security mode, and client credential type: BasicHttpBinding

21[WCF Security Series] bindings, security mode, and client credential types: Wshttpbinding and wsdualhttpbinding

22[WCF Security Series] bindings, security mode, and client credential types: NetNamedPipeBinding, nettcpbinding, and NetMsmqBinding

23[WCF Security Series] bindings, security mode, and client credential types: summary

24[WCF Safety Series] Example Demo: Application of Tls/ssl in WCF [SSL over TCP]

25[WCF Safety Series] Example Demo: Application of Tls/ssl in WCF [HTTPS]

26[WCF Security Series] Service vouchers (services credential) and service identities (services Identity)

27[WCF Security Series] Talk about client authentication for WCF [Windows authentication]

28[WCF Safety Series] Talk about client authentication for WCF [username/password Authentication]

29[WCF Safety Series] Talk about client authentication for WCF [certificate authentication]

30[WCF Security Series] message protection level [Prev]

31[WCF Security Series] message protection level [next]

32[WCF Security Series] The implementation of various bindings to message protection through binding elements

33 Automatic delivery of context data in WCF by adding HTTP headers

34[WCF rights control] from two important concepts: identity and principal[on the previous chapter]

35[WCF rights control] from two important concepts: identity and principal[next article]

36[WCF Rights control]WCF three modes of authorization

37[WCF rights Control] Authorization method based on Windows user Group [previous]

38[WCF rights Control] Authorization method based on Windows user Group [next]

39[WCF Rights Control] simulation (impersonation) and delegation (delegation) [Prev]

40[WCF rights control]asp.net roles authorization [prev]

41[WCF rights control]asp.net roles authorization [next]

42[WCF rights control] by extending its own implementation of service authorization [provide source download]

43[WCF Rights Control] provides current principal[principle with WCF Custom authorization mode]

44[WCF Rights Control] provide current principal[instance with WCF Custom authorization mode]

45[WCF permission control]WCF customizing authorization system [Principle]

46[WCF rights control]WCF custom Authorization system [Example]

47 Application of simulation in WCF

48 in-depth analysis of the implementation of authorization in WCF [total 14 articles]

49WCF Service End Runtime architecture architecture [Previous]

50WCF Service End Runtime architecture architecture [Medium]

51WCF Service End Runtime architecture architecture [next]

52WCF Service End Runtime Architecture architecture [sequel]

53 message compression via WCF extensions

54WCF Client Runtime Architecture architecture detailed [prev]

55WCF Client Runtime Architecture architecture [next]

56 extending the "four behaviors" to WCF [rationale]

57 extending the "four behaviors" to WCF [example]

58 implementing extensions to WCF by customizing ServiceHost [rationale]

59 implementing extensions to WCF with custom ServiceHost [Example]

60WCF Runtime framework Construction and expansion [Total 10]

61[WCF 4.0 new feature] default endpoint

62[WCF 4.0 new features] default bindings and behavior configuration

63[WCF 4.0 new feature] standard endpoint with none (. SVC) file Service activation

64[WCF 4.0 new features] routing services [rationale]

65[WCF 4.0 new features] routing service [example]

66来 design pattern from WCF: Extensible object pattern [prev]

67来 design pattern from WCF: Extensible object mode [next]

68 "WCF service Programming" a debatable place on "queue service"

69[wcf-discovery] Wcf-discovery's protocol base: Ws-discovery

70[wcf-discovery] How services can be "discovered"

71[wcf-discovery] How can a client "probe" to an available service?

72[wcf-discovery] Example Demo: How to use the service discovery mechanism to implement a "dynamic" invocation of a service?

73[wcf-discovery] Let the service automatically send up/down notifications [rationale]

74[wcf-discovery] Let the service automatically send up/down notifications [Example]

75[wcf-discovery] How do I use discovery agents to achieve real-time maintenance of available services?

76WCF security audits-record who's banging your door

77WCF 4.0 new Features Summary [total 12 articles]

78WCF three name/namespace, are you silly to know?

79WCF Service for Bulk Homestay

80 through a simulation program to let you understand WCF approximate execution process

81WCF 4.0 a little-known change [and collection of titles]

821 examples of invoking WCF rest services across domains via JSONP (for example in jquery)

83[WCF Rest] A simple instance of rest service

84[WCF REST] webhttpbinding and message encoding

85[WCF REST] Web message body style (message body style)

86[WCF REST] help pages and automatic message Format (json/xml) selection

87[WCF REST] Webservicehost What's so special about it?

88[WCF REST] UriTemplate, uritemplatetable and Webhttpdispatchoperationselector

89[WCF REST] Implement declarative caching with ASP. NET Output Caching

90[WCF REST] An effective means of extracting high performance: Conditional resource Acquisition (Conditional retrieval)

91[WCF REST] An effective means of resolving resource concurrency Modification: Conditional update (Conditional update)

92WCF Rest Series Article summary (total 9 articles)

93 WCF comprehensive analysis (below)-catalogue

94 "WCF Comprehensive Analysis" (previous)-catalogue

95 "Comprehensive analysis of WCF"-Introduction to chapter content

96 Full interpretation of WCF (upper and lower volumes) officially published

97 "WCF Comprehensive Analysis" (top and bottom) probation Chapter PDF download

98 How do I pop up a confirmation dialog box before invoking a WCF service?

99yield errors in WCF using--99% developers are likely to make mistakes [prev]

100yield errors in WCF using--99% developers are likely to make mistakes [next]

"Artech's WCF Anatomy series" series of technical Articles to organize the collection

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.