Flylib.com
Real-World .NET Applications
Real-World .NET Applications
ISBN: 1590590821
EAN: 2147483647
Year: 2005
Pages: 82
Authors:
Budi Kurniawan
BUY ON AMAZON
Table of Contents
BackCover
Real World .NET Applications
Introduction
Code Listings
Chapter 1: Creating a Custom Control - StyledTextArea
Overview of the Chapter
Using the Control and UserControl Classes
Drawing the Graphical User Interface
Capturing Key Presses
Creating Events with Delegates and the Observer Design Pattern
Understanding the Model-View-Controller Paradigm
Implementing the Project
Summary
Chapter 2: Building an XML Document Editor
Overview of the Chapter
A Brief Theory of XML
XML Programming in the .NET Framework
Writing Multiple-Document Interface Applications
Understanding the Singleton Design Pattern
Printing in the .NET Framework Windows
Implementing the Project
Summary
Chapter 3: Writing Games
Overview of the Chapter
Working with Threads
Using Timers
Understanding Game Theory
Implementing the Project
Summary
Chapter 4: Creating a UML Class Diagram Editor
Drawing in the .NET Framework
Creating a Simple Drawing Application
Understanding Object Serialization for Persisting the Graphics Objects
Understanding the Memento Design Pattern
Exploring the UML Class Diagram
Implementing the Project
Summary
Chapter 5: Developing an FTP Client Application
Working with Sockets
Understanding FTP
Creating an FTP Application Step by Step
Implementing the Project
Summary
Chapter 6: Building an Online Store
Understanding ADO.NET
Data Binding
Configuring ASP.NET Applications
Securing ASP.NET Applications
Implementing the Project
Summary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y-Z
List of Figures
List of Tables
List of Listings
List of Sidebars
Real-World .NET Applications
ISBN: 1590590821
EAN: 2147483647
Year: 2005
Pages: 82
Authors:
Budi Kurniawan
BUY ON AMAZON
Beginning Cryptography with Java
Object Description in Cryptography Using ASN.1
Key and Certificate Management Using Keystores
CMS and S/MIME
SSL and TLS
Appendix C Using the Bouncy Castle API for Elliptic Curve
Managing Enterprise Systems with the Windows Script Host
File Operations
Data Access
Internet Information Server
Exchange Server
Security
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Overview of the Windows Script Host
VBScript Basics
Processing Collections of Data
Using the Windows Registry to Configure Script Settings
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Six Things Managers Must Do: How to Support Lean Six Sigma
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Properties, Methods, and Events
Conclusion
Outlook Item Events
Advanced Topic: Deploying Network Solutions to Be Cached Locally
Creating an Outlook Add-In in VSTO
Comparing, Designing, and Deploying VPNs
Benefits and Drawbacks of L2TPv3-Based L2VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Summary
Summary
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies