Flylib.com
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
ISBN: 0321334213
EAN: 2147483647
Year: 2004
Pages: 103
Authors:
Len Fenster
BUY ON AMAZON
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
Table of Contents
Copyright
Figures
Tables
Foreword
Preface
Acknowledgments
About the Author
Chapter 1. The Configuration Application Block Runtime
What Is the Configuration Application Block?
Design of the Configuration Application Block Runtime
Developing with the Configuration Application Block
Summary
Chapter 2. The Configuration Application Block Design-Time
Configuration and the Enterprise Library Configuration Tool
Behind the Configuration Design-Time
Example: Design-Time Configuration
Summary
Chapter 3. The Data Access Application Block
What Is the Data Access Application Block?
Design of the Data Access Application Block
Using the Data Access Application Block s API
Summary
Chapter 4. The Caching Application Block
What Is the Caching Application Block?
The Design of the Caching Application Block
Developing with the Caching Application Block
Summary
Chapter 5. The Exception Handling Application Block
What Is the Exception Handling Application Block?
The Design of the Exception Handling Application Block
Developing with the Exception Handling Application Block
Summary
Chapter 6. The Logging and Instrumentation Application Block
What Is the Logging and Instrumentation Application Block?
Design of the Logging and Instrumentation Application Block
Developing with the Logging and Instrumentation Application Block
Summary
Chapter 7. The Security Application Block
What Is the Security Application Block?
Design of the Security Application Block
Developing with the Security Application Block
Summary
Chapter 8. The Cryptography Application Block
What Is the Cryptography Application Block?
.NET Cryptography
Design of the Cryptography Application Block
Developing with the Cryptography Application Block
Summary
Chapter 9. Building an Application Block
Vision and Design Goals
Core Functionality
Pluggable Providers
Factories
Runtime Configuration
Design-Time Configuration
Unit Tests
Quick Start Application
Summary
Appendix A. The Data Mapping Application Block
Design of the Data Mapping Application Block
Developing with the Data Mapping Application Block
Summary
Appendix B. Creating a .NET Managed Data Provider
The IDataParameter Interface
The IDataParameterCollection Interface
The IDataReader Interface
The IDbCommand Interface
The IDbConnection and ICloneable Interfaces
The IDbDataAdapter Interface
The IDbTransaction Interface
Appendix C. Enterprise Library for the .NET Framework 2.0
The Core
Data Access
Logging
Security
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
ISBN: 0321334213
EAN: 2147483647
Year: 2004
Pages: 103
Authors:
Len Fenster
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Data Mining for Business Process Reengineering
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
Healthcare Information: From Administrative to Practice Databases
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Development of Interactive Web Sites to Enhance Police/Community Relations
Beginning Cryptography with Java
The JCA and the JCE
Asymmetric Key Cryptography
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Developing Tablet PC Applications (Charles River Media Programming)
Your First Windows Forms Application
Tablet PC Full Screen Utility
Form Effects
Advanced Microsoft Agent
Speech Input with SAPI
Microsoft WSH and VBScript Programming for the Absolute Beginner
Conditional Logic
Processing Collections of Data
Using the Windows Registry to Configure Script Settings
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Six Things Managers Must Do: How to Support Lean Six Sigma
.NET System Management Services
Querying WMI
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies