Tables


Table 1.1: Implementation Requirements to Support the IStorageProviderReader Interface 14

Table 1.2: Methods Needed by a Derived Transformer to Support the ITransformer Interface 36

Table 1.3: Configuration Settings Properties 47

Table 1.4: Configuration Context Methods and Properties 51

Table 1.5: ConfigurationManager Public Methods and Events 53

Table 2.1: Possible RegistryRoot Values for the RegistryStorageProvider 71

Table 2.2: Required Properties for the SqlStorageProvider 72

Table 2.3: Services Initialized and Added by the ConfigurationDesignHost 94

Table 2.4: IConfigurationDesignManager Interface Methods 98

Table 3.1: The Methods for the Database Class 116

Table 3.2: SqlDatabase's Methods and Properties 118

Table 3.3: OracleDatabase's Methods and Properties 121

Table 3.4: DB2Database's Methods and Properties 123

Table 3.5: Methods and Properties of the DbCommandWrapper Class 126

Table 4.1: CacheManager Class 188

Table 4.2: BaseBackingStore Methods and Properties 202

Table 5.1: PostHandlingAction Values 253

Table 5.2: ExceptionFormatter's Methods and Properties 264

Table 5.3: TextExceptionFormatter's Methods and Properties 268

Table 5.4: Logging Handler Properties 295

Table 6.1: Fields Expected for the LogEntry Constructor 314

Table 6.2: Keys and Values for the ComPlusInformationProvider 317

Table 6.3: Keys and Values for the ManagedSecurityContextInformationProvider 319

Table 6.4: Keys and Values for the UnmanagedSecurityContextInformationProvider 319

Table 6.5: LogEntry's Intrinsic Properties 324

Table 6.6: The LogSink's Protected Methods 348

Table 6.7: Constructs Needed by a TokenFunction 359

Table 6.8: Configuration Properties for the Logging Sinks 385

Table 6.9: LoggerWrite Overloads and Examples 391

Table 6.10: Tracer Constructors 393

Table 7.1: ISecurityCacheProvider's Interface Methods 415

Table 7.2: Classes Derived from BooleanExpression for Use by the Lexical Analyzer 428

Table 7.3: Authorization Manager Terminology 432

Table 7.4: UserRoleManager Methods 462

Table 8.1: Cryptography Algorithms in the .NET System.Security.Cryptography Namespace 489

Table 8.2: The Cryptographer Class' Methods 493

Table 8.3: Public Methods and Properties for the HashAlgorithmProvider Class 504

Table A.1: DatabaseWrapper's Methods and Properties 582

Table A.2: DataMapper's Methods and Properties 589




Fenster Effective Use of Microsoft Enterprise Library(c) Building Blocks for Creating Enterprise Applications and Services 2006
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
ISBN: 0321334213
EAN: 2147483647
Year: 2004
Pages: 103
Authors: Len Fenster

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net