Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: COM and .NET
Table 1-1: Methods of the
Marsha
l
class of Interest to COM Programmers
Chapter 3: Using COM Components in .NET Code
Table 3-1: Options Used with the TlbImp.exe Tool
Table 3-2: Members of the
TypeLibConverter
Class
Table 3-3: Members of the
TypeLibImporterFlags
Enumeration
Table 3-4: Conversion Between COM IDL, Visual Basic 6.0, and .NET Types
Table 3-5:
Marshal
Class Methods for Reading and Writing Using
IntPtrs
Chapter 4: Using .NET Components in COM Applications
Table 4-1: COM Interfaces Always Implemented by CCWs
Table 4-2: COM Interfaces Sometimes Implemented by CCWs
Table 4-3: Members of the
ClassInterfaceType
Enumeration
Table 4-4: Flags Supported by TlbExp.exe
Table 4-5: Flags Supported by RegAsm.exe
Table 4-6: Members of the
ComInterfaceType
Enumeration
Table 4-7: Conversion Between .NET Exceptions and COM
HRESULT
s
Table 4-8: Conversion Between .NET, COM IDL, and Visual Basic 6 Types
Chapter 5: An Overview of COM+ Coding for .NET
Table 5-1:
SecurityCallContext
Method Summary
Table 5-2:
SecurityCallContext
Property Summary
Chapter 6: Attributed Programming
Table 6-1: Parameters for the
module
Attribute
Table 6-2: ATL Module Classes
Table 6-3: Attributes Used with Interfaces
Table 6-4: Attributes That Can Be Applied to Interface Methods
Table 6-5: Attributes That Can Be Applied to coclasses
Table 6-6: Stand-Alone Attributes
Table 6-7: Linker Options Used with Attributed Code
Chapter 7: ATL and ATL Server
Table 7-1: Data Collection
Table 7-2: Members of the
CAtlArray
Table 7-3: Members of the
CComSafeArray
Class
Table 7-4: Parameters for the Module
Table 7-5: Members of the
CSimpleStringT
Table 7-6: Predefined
CStringT
Classes
Table 7-7: Members of the
CStringT
Table 7-8: Predefined Types to Work with
CStringT
Table 7-9: Comparison of String Conversion Macros and Classes
Table 7-10: The ATL Security Classes
Table 7-11: The Global ATL Security Functions
Table 7-12: Predefined Replacement Tags for SRFs
Table 7-13: Commonly Used Members of the
CRequestHandlerT
Class
Table 7-14: Parameters Used with the
soap_handler
Attribute
Chapter 8: A Simple COM+ Example
Table 8-1:
RegSvcs
Utility Options
Chapter 12: Interacting with Unmanaged Code
Table 12-1: Parameters for the
DllImport
Attribute
Table 12-2: .NET Equivalents of Windows Data Types
Table 12-3: Type Conversion with Platform Invoke
Chapter 13: Advanced Interaction
Table 13-1: The Members of the UnmanagedType Enumeration
Table 13-2: Values for the
DllImport
CharSet
Parameter
Table 13-3: Values in the
LayoutKind
Enumeration
Table 13-4: The Members of the
GCHandle
Structure
Previous page
Table of content
Next page
COM Programming with Microsoft .NET
ISBN: 0735618755
EAN: 2147483647
Year: 2006
Pages: 140
Authors:
John Paul Mueller
,
Julian Templeman
BUY ON AMAZON
Snort Cookbook
Installing Snort on Windows
Tapping a Wireless Network
Logging to a Specific File
Prioritizing Alerts
Detecting and Normalizing HTTP Traffic
Managing Enterprise Systems with the Windows Script Host
File Operations
Input/Output Streams
Network Administration/WMI
Messaging Operations
Data Access
MySQL Clustering
Ensuring That MySQL Cluster Works
Common Errors While Importing Tables
The Structure of config.ini
MySQL Cluster Performance
Network Redundancy
The Complete Cisco VPN Configuration Guide
L2TP
SSL Overview
Cisco WebVPN Solution
PPTP and L2TP Remote Access
Cisco VPN Software Client
Java How to Program (6th Edition) (How to Program (Deitel))
Summary
Example: Divide By Zero Without Exception Handling
Searching Algorithms
RowSet Interface
Special Section: Advanced String-Manipulation Exercises
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Fashion Logistics and Quick Response
Logistics in Tesco: Past, Present and Future
Rethinking Efficient Replenishment in the Grocery Sector
Transforming Technologies: Retail Exchanges and RFID
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies