Table 1.1: Implementation Requirements to Support the IStorageProviderReader Interface 14 Table 1.2: Methods Needed by a Derived Transformer to Support the ITransformer Interface 36 Table 1.3: Configuration Settings Properties 47 Table 1.4: Configuration Context Methods and Properties 51 Table 1.5: ConfigurationManager Public Methods and Events 53 Table 2.1: Possible RegistryRoot Values for the RegistryStorageProvider 71 Table 2.2: Required Properties for the SqlStorageProvider 72 Table 2.3: Services Initialized and Added by the ConfigurationDesignHost 94 Table 2.4: IConfigurationDesignManager Interface Methods 98 Table 3.1: The Methods for the Database Class 116 Table 3.2: SqlDatabase's Methods and Properties 118 Table 3.3: OracleDatabase's Methods and Properties 121 Table 3.4: DB2Database's Methods and Properties 123 Table 3.5: Methods and Properties of the DbCommandWrapper Class 126 Table 4.1: CacheManager Class 188 Table 4.2: BaseBackingStore Methods and Properties 202 Table 5.1: PostHandlingAction Values 253 Table 5.2: ExceptionFormatter's Methods and Properties 264 Table 5.3: TextExceptionFormatter's Methods and Properties 268 Table 5.4: Logging Handler Properties 295 Table 6.1: Fields Expected for the LogEntry Constructor 314 Table 6.2: Keys and Values for the ComPlusInformationProvider 317 Table 6.3: Keys and Values for the ManagedSecurityContextInformationProvider 319 Table 6.4: Keys and Values for the UnmanagedSecurityContextInformationProvider 319 Table 6.5: LogEntry's Intrinsic Properties 324 Table 6.6: The LogSink's Protected Methods 348 Table 6.7: Constructs Needed by a TokenFunction 359 Table 6.8: Configuration Properties for the Logging Sinks 385 Table 6.9: LoggerWrite Overloads and Examples 391 Table 6.10: Tracer Constructors 393 Table 7.1: ISecurityCacheProvider's Interface Methods 415 Table 7.2: Classes Derived from BooleanExpression for Use by the Lexical Analyzer 428 Table 7.3: Authorization Manager Terminology 432 Table 7.4: UserRoleManager Methods 462 Table 8.1: Cryptography Algorithms in the .NET System.Security.Cryptography Namespace 489 Table 8.2: The Cryptographer Class' Methods 493 Table 8.3: Public Methods and Properties for the HashAlgorithmProvider Class 504 Table A.1: DatabaseWrapper's Methods and Properties 582 Table A.2: DataMapper's Methods and Properties 589 |