Flylib.com
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
ISBN: 0321334213
EAN: 2147483647
Year: 2004
Pages: 103
Authors:
Len Fenster
BUY ON AMAZON
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
Table of Contents
Copyright
Figures
Tables
Foreword
Preface
Acknowledgments
About the Author
Chapter 1. The Configuration Application Block Runtime
What Is the Configuration Application Block?
Design of the Configuration Application Block Runtime
Developing with the Configuration Application Block
Summary
Chapter 2. The Configuration Application Block Design-Time
Configuration and the Enterprise Library Configuration Tool
Behind the Configuration Design-Time
Example: Design-Time Configuration
Summary
Chapter 3. The Data Access Application Block
What Is the Data Access Application Block?
Design of the Data Access Application Block
Using the Data Access Application Block s API
Summary
Chapter 4. The Caching Application Block
What Is the Caching Application Block?
The Design of the Caching Application Block
Developing with the Caching Application Block
Summary
Chapter 5. The Exception Handling Application Block
What Is the Exception Handling Application Block?
The Design of the Exception Handling Application Block
Developing with the Exception Handling Application Block
Summary
Chapter 6. The Logging and Instrumentation Application Block
What Is the Logging and Instrumentation Application Block?
Design of the Logging and Instrumentation Application Block
Developing with the Logging and Instrumentation Application Block
Summary
Chapter 7. The Security Application Block
What Is the Security Application Block?
Design of the Security Application Block
Developing with the Security Application Block
Summary
Chapter 8. The Cryptography Application Block
What Is the Cryptography Application Block?
.NET Cryptography
Design of the Cryptography Application Block
Developing with the Cryptography Application Block
Summary
Chapter 9. Building an Application Block
Vision and Design Goals
Core Functionality
Pluggable Providers
Factories
Runtime Configuration
Design-Time Configuration
Unit Tests
Quick Start Application
Summary
Appendix A. The Data Mapping Application Block
Design of the Data Mapping Application Block
Developing with the Data Mapping Application Block
Summary
Appendix B. Creating a .NET Managed Data Provider
The IDataParameter Interface
The IDataParameterCollection Interface
The IDataReader Interface
The IDbCommand Interface
The IDbConnection and ICloneable Interfaces
The IDbDataAdapter Interface
The IDbTransaction Interface
Appendix C. Enterprise Library for the .NET Framework 2.0
The Core
Data Access
Logging
Security
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
ISBN: 0321334213
EAN: 2147483647
Year: 2004
Pages: 103
Authors:
Len Fenster
BUY ON AMAZON
VBScript Programmers Reference
What VBScript Is and Isn™t!
Windows Script Components
Remote Scripting
Appendix G The Windows Script Host Object Model
Appendix I VBScript Features not in VBA
A+ Fast Pass
Domain 2 Diagnosing and Troubleshooting
Domain 4 Motherboard/Processors/Memory
Domain 1 Operating System Fundamentals
Domain 3 Diagnosing and Troubleshooting
Domain 4 Networks
Network Security Architectures
References
Provisions for E-Commerce and Extranet Design
Applied Knowledge Questions
Software-Based Teleworker Design
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 20. Make 3-D Raytraced Terrain Models
Hack 31. Plot Dymaxion Maps in Perl
How GPS Works
Hack 61. Build a Map of Local GSM Cells
Hack 73. Make Your Own Contour Maps
Programming Microsoft ASP.NET 3.5
The Web Forms Model
The ADO.NET Object Model
Web Forms User Controls
Hosting ASP.NET Outside IIS
Index
Comparing, Designing, and Deploying VPNs
Review Questions
AToM Pseudowire Operation
MPLS Layer 3 VPNs Overview
IPsec: A Security Architecture for IP
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies