.NET Information center

General information about .NET, Silverlight, WPF, WCF and everything else

Sunday, March 27, 2011

WCF How To’s Index

This is index of available How-To’s for Windows Communication Foundation (WCF) distilled from the WCF Documentation available on MSDN. Topics covered:

Getting Started

  • How to: Define a Windows Communication Foundation Service Contract
  • How to: Implement a Windows Communication Foundation Service Contract
  • How to: Host and Run a Basic Windows Communication Foundation Service
  • How to: Create a Windows Communication Foundation Client
  • How to: Configure a Basic Windows Communication Foundation Client
  • How to: Use a Windows Communication Foundation Client
Designing Service Contracts

  • How to: Create a Request-Reply Contract
  • How to: Create a Basic Data Contract for a Class or Structure
  • How to: Create a One-Way Contract
  • How to: Create a Duplex Contract
  • How to: Access Services with a Duplex Contract
  • How to: Enable Streaming 
Defining and Specifying Faults

  • How to: Declare Faults in Service Contracts
  • How to: Set the ProtectionLevel Property
Using Sessions

  • How to: Create a Service That Requires Sessions
  • How to: Exchange Messages Within a Reliable Session
  • How to: Secure Messages within Reliable Sessions
  • How to: Create a Custom Reliable Session Binding with HTTPS
  • How to: Create a Secure Session
  • How to: Create a Security Context Token for a Secure Session
(more...)

Read more: Alik Levin's
Posted via email from Jasper-Net
Tags: Tutorial, WCF
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Search This Blog

Translate

Popular Posts

  • Managed Extensibility Framework
    MEF это новый подход разработанный Майкрософт, который позволяет загружать расширения для вашего приложения очень легко. Он позволяет обнар...
  • Moonlight 3.0 Preview 1
    We have just released our first preview of Moonlight 3.0. This release contains many updates to our 3.0 support, mostly on the infrastructu...
  • 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
    The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead t...
  • The Truth About .NET Objects And Sharing Them Between AppDomains
    I have written already some time ago how big a .NET object is. John Skeet as also made a very detailed post about object sizes in .NET. I wa...
  • Selenium Two Tutorial using C#/NUnit and InternetExplorerDriver
    With the hard work for Selenium 2 going on I thought that I would start creating new tutorials to get people used to the idea of using Sele...
  • An Excellent Tutorial on Secure Networking Protocols
    Yesterday, while searching for information about related topics, I stumbled across a tutorial on Secure Networking Protocols from RAD Unive...
  • WMI Code Creator
    Previously, my colleague Jeff demonstrated the power of Scriptomatic 2.0. To recap, Scriptomatic is a tool that helps you write scripts to...
  • How to Change .NET Configuration Files at Runtime (including for WCF)
    One of the most common issues people run into with WCF configuration, and .NET applications in general, is that configuration files appear ...
  • Did you start your SQL Server Engine correctly?
    Often we run into situations where there is a need to add a trace flag or a startup parameter other than the default startup parameters tha...
  • Man-in-the-Middle Attack Against Chip and PIN
    Nice attack  against the EMV -- Eurocard Mastercard Visa -- the "chip and PIN" credit card payment system. The attack allows a cr...
Awesome Inc. theme. Theme images by chuwy. Powered by Blogger.