I



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

IAuthenticationProvider interface 2nd
IAuthorizationProvider interface
IBackingStore interface 2nd
IBM DB2Database
ICacheItemExpiration interface 2nd
ICacheItemExpirationPolicies interface
ICacheItemRefreshAction interface 2nd
ICacheStorage interface
ICloneable interface
IComponent interface
IConfigurationChangeWatcher-Factory interface
IConfigurationDesignManager interface 2nd
IConfigurationProvider interface 2nd
IContainer interface
IDataMappingProvider interface 2nd 3rd
IDataParameter interface 2nd
IDataParameterCollection interface
IDataReader interface 2nd
IDbCommand interface
IDbConnection interface
IDbDataAdapter interface
IDbTransaction interface 2nd 3rd
Identity objects, in authentication
IDictionary interface [See ExtraInformationProvider.]
IExtraInformationProvider interface
IFormatter interface
IHashProvider interface
ILogDistributionStrategy interface 2nd
ILogFormatter interface
ILogSink interface
Imperative security checks
IncludeType element, custom StorageProvider
Inheritance, and Typed DataSets
Initialize method
     custom BackingStores
     custom exception handlers
     custom Sinks 2nd
     custom StorageProviders
     IConfigurationProvider interface and
     provider configuration and
     WrapHandler
InnerException
     ContextualWrapHandler 2nd
     WrapHandler 2nd
InProcLogDistributionStrategy interface
     configuring
     distributing LogEntries to Destinations
     LogDistributor function
Insert command, DataTableMapping
InsertUpdate, runtime
Instrumentation, Enterprise Library
IntelliSense, and Typed DataSets
Interoperability
     custom business entities
     DataSets
IProfileProvider interface
IRolesProvider interface
ISecurityCacheProvider interface 2nd 3rd
IServiceContainer interface
IServiceProvider interface
ISite interface
Isolated storage
IsolatedStorageBackingStore
     cache storage and
     Caching Application Block and
     configuring
     permitting encrypted cache data
IsolationLevel
IStorageProvider interface
IStorageProviderReader interface 2nd
IStorageProviderWriter interface 2nd
ISymmetricProvider interface 2nd
IToken interface
ITransfomer interface
ITransformer interface
IUIHierarchy interface 2nd




Fenster Effective Use of Microsoft Enterprise Library(c) Building Blocks for Creating Enterprise Applications and Services 2006
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
ISBN: 0321334213
EAN: 2147483647
Year: 2004
Pages: 103
Authors: Len Fenster

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net