Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: COM and .NET
Table 1-1: Methods of the
Marsha
l
class of Interest to COM Programmers
Chapter 3: Using COM Components in .NET Code
Table 3-1: Options Used with the TlbImp.exe Tool
Table 3-2: Members of the
TypeLibConverter
Class
Table 3-3: Members of the
TypeLibImporterFlags
Enumeration
Table 3-4: Conversion Between COM IDL, Visual Basic 6.0, and .NET Types
Table 3-5:
Marshal
Class Methods for Reading and Writing Using
IntPtrs
Chapter 4: Using .NET Components in COM Applications
Table 4-1: COM Interfaces Always Implemented by CCWs
Table 4-2: COM Interfaces Sometimes Implemented by CCWs
Table 4-3: Members of the
ClassInterfaceType
Enumeration
Table 4-4: Flags Supported by TlbExp.exe
Table 4-5: Flags Supported by RegAsm.exe
Table 4-6: Members of the
ComInterfaceType
Enumeration
Table 4-7: Conversion Between .NET Exceptions and COM
HRESULT
s
Table 4-8: Conversion Between .NET, COM IDL, and Visual Basic 6 Types
Chapter 5: An Overview of COM+ Coding for .NET
Table 5-1:
SecurityCallContext
Method Summary
Table 5-2:
SecurityCallContext
Property Summary
Chapter 6: Attributed Programming
Table 6-1: Parameters for the
module
Attribute
Table 6-2: ATL Module Classes
Table 6-3: Attributes Used with Interfaces
Table 6-4: Attributes That Can Be Applied to Interface Methods
Table 6-5: Attributes That Can Be Applied to coclasses
Table 6-6: Stand-Alone Attributes
Table 6-7: Linker Options Used with Attributed Code
Chapter 7: ATL and ATL Server
Table 7-1: Data Collection
Table 7-2: Members of the
CAtlArray
Table 7-3: Members of the
CComSafeArray
Class
Table 7-4: Parameters for the Module
Table 7-5: Members of the
CSimpleStringT
Table 7-6: Predefined
CStringT
Classes
Table 7-7: Members of the
CStringT
Table 7-8: Predefined Types to Work with
CStringT
Table 7-9: Comparison of String Conversion Macros and Classes
Table 7-10: The ATL Security Classes
Table 7-11: The Global ATL Security Functions
Table 7-12: Predefined Replacement Tags for SRFs
Table 7-13: Commonly Used Members of the
CRequestHandlerT
Class
Table 7-14: Parameters Used with the
soap_handler
Attribute
Chapter 8: A Simple COM+ Example
Table 8-1:
RegSvcs
Utility Options
Chapter 12: Interacting with Unmanaged Code
Table 12-1: Parameters for the
DllImport
Attribute
Table 12-2: .NET Equivalents of Windows Data Types
Table 12-3: Type Conversion with Platform Invoke
Chapter 13: Advanced Interaction
Table 13-1: The Members of the UnmanagedType Enumeration
Table 13-2: Values for the
DllImport
CharSet
Parameter
Table 13-3: Values in the
LayoutKind
Enumeration
Table 13-4: The Members of the
GCHandle
Structure
Previous page
Table of content
Next page
COM Programming with Microsoft .NET
ISBN: 0735618755
EAN: 2147483647
Year: 2006
Pages: 140
Authors:
John Paul Mueller
,
Julian Templeman
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Study Strategies
Wireless LANs
Securing Wireless Networks
IDS, Firewalls, and Honeypots
Cryptography
High-Speed Signal Propagation[c] Advanced Black Magic
Differential and Common-Mode Velocity
Preferred Cable Combinations
The Underlying Simulation Engine
Power and Ground Resonance
Appendix C. Two-Port Analysis
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Managing Project Risk
Monitoring and Controlling Risky Projects
Appendix A Selected Detail From the PERIL Database
The CISSP and CAP Prep Guide: Platinum Edition
Security Architecture and Design
Legal, Regulations, Compliance, and Investigations
Initiation of the System Authorization Process
Appendix D The Information System Security Engineering Professional (ISSEP) Certification
Appendix E The Information System Security Management Professional (ISSMP) Certification
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Dynamic Library with GNU Make
Removing Objects from a Container
Sorting a Range
Writing Your Own Stream Manipulators
Introduction
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
System Maintenance
Configuring Static Routes
SQL*Net
Monitoring QoS
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies