Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: COM and .NET
Table 1-1: Methods of the
Marsha
l
class of Interest to COM Programmers
Chapter 3: Using COM Components in .NET Code
Table 3-1: Options Used with the TlbImp.exe Tool
Table 3-2: Members of the
TypeLibConverter
Class
Table 3-3: Members of the
TypeLibImporterFlags
Enumeration
Table 3-4: Conversion Between COM IDL, Visual Basic 6.0, and .NET Types
Table 3-5:
Marshal
Class Methods for Reading and Writing Using
IntPtrs
Chapter 4: Using .NET Components in COM Applications
Table 4-1: COM Interfaces Always Implemented by CCWs
Table 4-2: COM Interfaces Sometimes Implemented by CCWs
Table 4-3: Members of the
ClassInterfaceType
Enumeration
Table 4-4: Flags Supported by TlbExp.exe
Table 4-5: Flags Supported by RegAsm.exe
Table 4-6: Members of the
ComInterfaceType
Enumeration
Table 4-7: Conversion Between .NET Exceptions and COM
HRESULT
s
Table 4-8: Conversion Between .NET, COM IDL, and Visual Basic 6 Types
Chapter 5: An Overview of COM+ Coding for .NET
Table 5-1:
SecurityCallContext
Method Summary
Table 5-2:
SecurityCallContext
Property Summary
Chapter 6: Attributed Programming
Table 6-1: Parameters for the
module
Attribute
Table 6-2: ATL Module Classes
Table 6-3: Attributes Used with Interfaces
Table 6-4: Attributes That Can Be Applied to Interface Methods
Table 6-5: Attributes That Can Be Applied to coclasses
Table 6-6: Stand-Alone Attributes
Table 6-7: Linker Options Used with Attributed Code
Chapter 7: ATL and ATL Server
Table 7-1: Data Collection
Table 7-2: Members of the
CAtlArray
Table 7-3: Members of the
CComSafeArray
Class
Table 7-4: Parameters for the Module
Table 7-5: Members of the
CSimpleStringT
Table 7-6: Predefined
CStringT
Classes
Table 7-7: Members of the
CStringT
Table 7-8: Predefined Types to Work with
CStringT
Table 7-9: Comparison of String Conversion Macros and Classes
Table 7-10: The ATL Security Classes
Table 7-11: The Global ATL Security Functions
Table 7-12: Predefined Replacement Tags for SRFs
Table 7-13: Commonly Used Members of the
CRequestHandlerT
Class
Table 7-14: Parameters Used with the
soap_handler
Attribute
Chapter 8: A Simple COM+ Example
Table 8-1:
RegSvcs
Utility Options
Chapter 12: Interacting with Unmanaged Code
Table 12-1: Parameters for the
DllImport
Attribute
Table 12-2: .NET Equivalents of Windows Data Types
Table 12-3: Type Conversion with Platform Invoke
Chapter 13: Advanced Interaction
Table 13-1: The Members of the UnmanagedType Enumeration
Table 13-2: Values for the
DllImport
CharSet
Parameter
Table 13-3: Values in the
LayoutKind
Enumeration
Table 13-4: The Members of the
GCHandle
Structure
Previous page
Table of content
Next page
COM Programming with Microsoft .NET
ISBN: 0735618755
EAN: 2147483647
Year: 2006
Pages: 140
Authors:
John Paul Mueller
,
Julian Templeman
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
Challenging the Unpredictable: Changeable Order Management Systems
Data Mining for Business Process Reengineering
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Development of Interactive Web Sites to Enhance Police/Community Relations
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.4 How to Generate a Key Using PuTTY
PMP Practice Questions Exam Cram 2
Answers and Explanations
Exam Prep Questions
Answers and Explanations
Project PlanningFacilitating Processes
Appendix A. CD Contents and Installation Instructions
Web Systems Design and Online Consumer Behavior
Chapter IV How Consumers Think About Interactive Aspects of Web Advertising
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter XVII Internet Markets and E-Loyalty
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Starting Diagrams by Using Templates
Finding Shapes for Diagrams
Key Points
Creating Network Diagrams
Glossary
FileMaker 8 Functions and Scripts Desk Reference
Middle()
Pi
Sqrt()
Variance()
Where to Go for More Information
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies