Flylib.com
Building Web Solutions with ASP.Net and ADO.NET
Building Web Solutions with ASP.Net and ADO.NET
ISBN: 0735615780
EAN: 2147483647
Year: 2002
Pages: 75
Authors:
Dino Esposito
BUY ON AMAZON
Cover
Cover
LOC Page
Dedication
Acknowledgments
Introduction
What Is This Book About?
What Does This Book Cover?
Data Bound .NET Controls
ASP.NET Data Binding
The DropDownList Web Control
The CheckBoxList Web Control
The RadioButtonList Web Control
The ListBox Web Control
The Repeater Control
The DataList Control
The DataGrid Control
Conclusion
Pageable Data Grids
Constituent Items of DataGrid
Column Types
Binding Columns
Data Pagination
Sorting Columns
DataGrid Controls and Data Persistence
Conclusion
Templated DataGrid Controls
Binding Templated Columns
Templated Columns in Action
Creating Templates Dynamically
Adapting Columns to Data
Conclusion
Editing DataGrid Controls
The In-Place Editing Feature
Editing In Place Using Templates
Adding New Rows
Conclusion
Code Reusability in ASP.NET
Layers of ASP.NET Pages
The Code-Behind Approach
Embeddable Web Forms
Writing Custom Controls
Conclusion
Advanced Data Reporting
Item Selection
Allowing the Selection of Multiple Items
Selecting by Condition
Aggregates and Summary Rows
Conclusion
Disconnected Web Applications
What Is the DataSet Object Really For?
Transparent Data Sources
Batch Updates
An Offline Buffer for Data
Submitting Changes
Conclusion
Interoperable Web Applications
The COM Interop Services
Using ADO in .NET Applications
Adapting Recordset Objects to DataSet Objects
From DataSet Objects to ADO Recordset Objects
XML Object Serialization
Conclusion
Web Services
Dynamic Link Web Libraries
.NET Web Services
Web Service Implementation
Web Service Optimization
Conclusion
Exposing Data to .NET Applications
Exposing Proprietary Data
Inside .NET Data Providers
Writing a Simple Data Provider
Conclusion
Building Web Solutions with ASP.Net and ADO.NET
ISBN: 0735615780
EAN: 2147483647
Year: 2002
Pages: 75
Authors:
Dino Esposito
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Certificate Revocation and Path Validation
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Time-of-Day Routing Usage Scenario
Performance Counters
Review Questions
CAR Overview
Network Security Architectures
Site-to-Site Deployment Examples
Threat Mitigation
Design Evaluations
Conclusions
C & Data Structures (Charles River Media Computer Engineering)
Data Types
Control Structures
Linked Lists
Problems in Strings
Problems in Trees
.NET System Management Services
Querying WMI
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Oracle and PL/SQL
Attacking Oracle PL/SQL Web Applications
Running Operating System Commands
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies