Flylib.com
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
ISBN: 0321334213
EAN: 2147483647
Year: 2004
Pages: 103
Authors:
Len Fenster
BUY ON AMAZON
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
Table of Contents
Copyright
Figures
Tables
Foreword
Preface
Acknowledgments
About the Author
Chapter 1. The Configuration Application Block Runtime
What Is the Configuration Application Block?
Design of the Configuration Application Block Runtime
Developing with the Configuration Application Block
Summary
Chapter 2. The Configuration Application Block Design-Time
Configuration and the Enterprise Library Configuration Tool
Behind the Configuration Design-Time
Example: Design-Time Configuration
Summary
Chapter 3. The Data Access Application Block
What Is the Data Access Application Block?
Design of the Data Access Application Block
Using the Data Access Application Block s API
Summary
Chapter 4. The Caching Application Block
What Is the Caching Application Block?
The Design of the Caching Application Block
Developing with the Caching Application Block
Summary
Chapter 5. The Exception Handling Application Block
What Is the Exception Handling Application Block?
The Design of the Exception Handling Application Block
Developing with the Exception Handling Application Block
Summary
Chapter 6. The Logging and Instrumentation Application Block
What Is the Logging and Instrumentation Application Block?
Design of the Logging and Instrumentation Application Block
Developing with the Logging and Instrumentation Application Block
Summary
Chapter 7. The Security Application Block
What Is the Security Application Block?
Design of the Security Application Block
Developing with the Security Application Block
Summary
Chapter 8. The Cryptography Application Block
What Is the Cryptography Application Block?
.NET Cryptography
Design of the Cryptography Application Block
Developing with the Cryptography Application Block
Summary
Chapter 9. Building an Application Block
Vision and Design Goals
Core Functionality
Pluggable Providers
Factories
Runtime Configuration
Design-Time Configuration
Unit Tests
Quick Start Application
Summary
Appendix A. The Data Mapping Application Block
Design of the Data Mapping Application Block
Developing with the Data Mapping Application Block
Summary
Appendix B. Creating a .NET Managed Data Provider
The IDataParameter Interface
The IDataParameterCollection Interface
The IDataReader Interface
The IDbCommand Interface
The IDbConnection and ICloneable Interfaces
The IDbDataAdapter Interface
The IDbTransaction Interface
Appendix C. Enterprise Library for the .NET Framework 2.0
The Core
Data Access
Logging
Security
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services
ISBN: 0321334213
EAN: 2147483647
Year: 2004
Pages: 103
Authors:
Len Fenster
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Trends in Project Management
Project Plan Checklist
Why Communicating Can Be Tough
Managing Vendors
First, Lets Clarify a Few Terms
WebLogic: The Definitive Guide
Web Server Plug-ins
The Transaction Service
Monitoring a WebLogic Domain
SOAP Message Handlers
The MBean Architecture
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Adding New Records to a Table
PostgreSQL Naming Rules
Client 2Adding Error Checking
Using PostgreSQL with Tcl and Tcl/Tk
Running PostgreSQL on a Windows Host
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Working with Ideas
Value Stream Mapping and Process Flow Tools
Data Collection
Descriptive Statistics and Data Displays
Java Concurrency in Practice
Guarding State with Locks
Thread Confinement
Documenting Synchronization Policies
Why are GUIs Single-threaded?
Other Liveness Hazards
MPLS Configuration on Cisco IOS Software
Overview of MPLS Forwarding
Command Reference
Outbound Route Filters
Carrier Supporting Carriers Overview
Case Study 5: Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies