This text shows traditional Windows developers how - and why - to incorporate .NET functionality into their applications. Filled with practical examples, it demonstrates how various .NET classes provide either a new ability or a markedly improved way of doing something.Therefore, leta#39;s review some of the things youa#39;ve read in this chapter: ac With symmetric encryption two parties each share a private key that is used both to encrypt and decrypt data. ... First, take a look at Figure 4-10 which provides a UML Sequence Diagram of these steps. ... code and call only two methods that write the key values in XML Data Receiver (Krista) Data Sender (Tom) Generates public/privateanbsp;...
Title | : | Extending MFC Applications with the .NET Framework |
Author | : | Tom Archer, Nishant Sivakumar |
Publisher | : | Addison-Wesley Professional - 2004 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: