亲属 发表于 2025-3-23 11:27:40

http://reply.papertrans.cn/19/1824/182366/182366_11.png

发表于 2025-3-23 17:12:14

Lecture Notes in Physics MonographsEarlier in the book, you created your own personal card and accessed third-party sites that use CardSpace and information cards. By the end of this chapter, you’ll have working code that can serve as an example of how to accept CardSpace cards on your own site.

发怨言 发表于 2025-3-23 18:30:06

http://reply.papertrans.cn/19/1824/182366/182366_13.png

FAZE 发表于 2025-3-24 01:55:19

Interaction of Gases with SurfacesThus far in the book, I’ve focused primarily on two participants—the owner of an information card and the relying parties (RPs) that would accept that card. Starting with this chapter, the book will begin to focus on the third perspective—that of the identity provider.

继而发生 发表于 2025-3-24 04:28:58

http://reply.papertrans.cn/19/1824/182366/182366_15.png

除草剂 发表于 2025-3-24 07:00:40

http://reply.papertrans.cn/19/1824/182366/182366_16.png

似少年 发表于 2025-3-24 14:11:16

http://reply.papertrans.cn/19/1824/182366/182366_17.png

aphasia 发表于 2025-3-24 17:08:33

http://reply.papertrans.cn/19/1824/182366/182366_18.png

大漩涡 发表于 2025-3-24 19:03:44

http://reply.papertrans.cn/19/1824/182366/182366_19.png

CUB 发表于 2025-3-25 00:58:17

Consuming Multiple Information Card-Secured Services in Smart Client Applications,The previous chapter introduced you both to Windows Communication Foundation (WCF) and to how to secure WCF services with information cards. This chapter continues the exploration of using WCF and information cards and shows how to create service-powered smart clients.
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Beginning Information Cards and CardSpace; From Novice to Profe Marc Mercuri Book 2007 Marc Mercuri 2007 Internet.Java.Open Source.Phishing