Sponsored Ads

Monday, June 1, 2009

Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities


Understanding Windows CardSpace: An Introduction to a Concepts as well as Challenges of Digital Identities

by Vittorio Bertocci, Garrett Serack , Caleb Baker 384 pages
Publisher: Addison-Wesley Professional; 1 book (January 6, 2008)
ISBN-10: 0321496841
ISBN-13: 978-0321496843

Windows CardSpace empowers organizations to forestall temperament burglary as well as evenly residence a extended spectrum of confidence as well as remoteness challenges. Understanding Windows CardSpaceis a initial insider’s beam to Windows CardSpace as well as a broader subject of temperament government for technical as well as commercial operation professionals. Drawing upon a authors’ forlorn knowledge warranted by operative with a CardSpace product group as well as by implementing state-of-the-art CardSpace-based systems during heading enterprises, it offers rare discernment in to a realities of temperament management: from formulation as well as pattern by deployment.

Part we introduces a elemental concepts of user-centered temperament management, explains a context in which Windows CardSpace operates, as well as reviews a problems CardSpace aims to solve. Next, a authors travel by CardSpace from a technical standpoint, describing a technologies, elements, artifacts, operations as well as growth practices, as well as make use of scenarios. Finally, they delicately examination a pattern as well as commercial operation considerations compared with architecting solutions formed upon CardSpace or any alternative user-centered temperament management

system. Coverage includes
The stipulations of stream approaches to authentication as well as temperament management
Detailed report upon modernized Web services
The Identity Metasystem, a laws of identity, as well as a preferred authentication system
Windows CardSpace: What it is, how it works, as well as how developers as well as managers can make use of it in their organizations
CardSpace technology: user experience, Information Cards, in isolation desktops, as well as formation with .NET 3.5 as well as Windows Vista
CardSpace implementation: from HTML formation by federation, Web services integration, as well as beyond
Adding personal label await to a website: a detailed, scenario-based explanation
Choosing or apropos an temperament provider: opportunities, commercial operation impacts, operational issues, as well as pitfalls to avoid
Using CardSpace to precedence certitude relations as well as strike phishing

Whether you’re a developer, confidence specialist, or commercial operation decision-maker, this book will answer your many consequential questions about temperament management, so we can strengthen all which matters: your people, your assets, your partners, as well as your customers.

Foreword xv

Preface xviii

Part we Setting a Context

Chapter 1: The Problem 3

The Advent of Profitable Digital Crime 4

Passwords: Ascent as well as Decline 29

The Babel of Cryptography 36

The Babel of Web User Interfaces 79

Summary 84

Chapter 2: Hints Toward a Solution 87

A World Without a Center 89

The Seven Laws of Identity 92

The Identity Metasystem 110

Trust 115

WS-* Web Services Specifications: The Reification of a Identity Metasystem 136

Presenting Windows CardSpace 161

Summary 164

Part II THE TECHNOLOGY

Chapter 3: Windows CardSpace 169

CardSpace Walkthroughs 169

Is CardSpace Just for Websites? 175

System Requirements 176

What CardSpace Provides 177

A Deeper Look during Information Cards 184

Features of a CardSpace UI 204

Common CardSpace Management Tasks 210

User Experience Changes in .NET Framework 3.5 218

Summary 221

Chapter 4: CardSpace Implementation 223

Using CardSpace in a Browser 224

Federation with CardSpace 248

CardSpace as well as Windows Communication Foundation 252

CardSpace Without Web Services 262

Summary 268

Chapter 5: Guidance for a Relying Party 269

Deciding to Be a Relying Party 270

Putting CardSpace to Work 274

Privacy as well as Liability 299

Summary 302

Part III PRACTICAL CONSIDERATIONS

Chapter 6: Identity Consumers 305

Common Misconceptions about Becoming an Identity Provider 306

Criteria for Selecting an Identity Provider 309

Relying upon an IP 315

Migration Issues 320

Summary 321

Chapter 7: Identity Providers 323

Uncovering a Rationale for Becoming an Identity Provider 324

What Does an Identity Provider Have to Offer? 334

Walking a Mile in a User’s Shoes 338

An Organization’s Identity 341

Summary 342

Index 343

Download from rapidshare


Bookmark and Share

No comments:

Post a Comment

Sponsored Ads

Add to My AOL Add to Google Reader or Homepage Subscribe in Bloglines

Hot Actresses Online

Movie & TV Show Preview Widget

Search 2.0

Search MyMegaLinks.info

Page Navigation

My Mega Links