Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: COM and .NET
Table 1-1: Methods of the
Marsha
l
class of Interest to COM Programmers
Chapter 3: Using COM Components in .NET Code
Table 3-1: Options Used with the TlbImp.exe Tool
Table 3-2: Members of the
TypeLibConverter
Class
Table 3-3: Members of the
TypeLibImporterFlags
Enumeration
Table 3-4: Conversion Between COM IDL, Visual Basic 6.0, and .NET Types
Table 3-5:
Marshal
Class Methods for Reading and Writing Using
IntPtrs
Chapter 4: Using .NET Components in COM Applications
Table 4-1: COM Interfaces Always Implemented by CCWs
Table 4-2: COM Interfaces Sometimes Implemented by CCWs
Table 4-3: Members of the
ClassInterfaceType
Enumeration
Table 4-4: Flags Supported by TlbExp.exe
Table 4-5: Flags Supported by RegAsm.exe
Table 4-6: Members of the
ComInterfaceType
Enumeration
Table 4-7: Conversion Between .NET Exceptions and COM
HRESULT
s
Table 4-8: Conversion Between .NET, COM IDL, and Visual Basic 6 Types
Chapter 5: An Overview of COM+ Coding for .NET
Table 5-1:
SecurityCallContext
Method Summary
Table 5-2:
SecurityCallContext
Property Summary
Chapter 6: Attributed Programming
Table 6-1: Parameters for the
module
Attribute
Table 6-2: ATL Module Classes
Table 6-3: Attributes Used with Interfaces
Table 6-4: Attributes That Can Be Applied to Interface Methods
Table 6-5: Attributes That Can Be Applied to coclasses
Table 6-6: Stand-Alone Attributes
Table 6-7: Linker Options Used with Attributed Code
Chapter 7: ATL and ATL Server
Table 7-1: Data Collection
Table 7-2: Members of the
CAtlArray
Table 7-3: Members of the
CComSafeArray
Class
Table 7-4: Parameters for the Module
Table 7-5: Members of the
CSimpleStringT
Table 7-6: Predefined
CStringT
Classes
Table 7-7: Members of the
CStringT
Table 7-8: Predefined Types to Work with
CStringT
Table 7-9: Comparison of String Conversion Macros and Classes
Table 7-10: The ATL Security Classes
Table 7-11: The Global ATL Security Functions
Table 7-12: Predefined Replacement Tags for SRFs
Table 7-13: Commonly Used Members of the
CRequestHandlerT
Class
Table 7-14: Parameters Used with the
soap_handler
Attribute
Chapter 8: A Simple COM+ Example
Table 8-1:
RegSvcs
Utility Options
Chapter 12: Interacting with Unmanaged Code
Table 12-1: Parameters for the
DllImport
Attribute
Table 12-2: .NET Equivalents of Windows Data Types
Table 12-3: Type Conversion with Platform Invoke
Chapter 13: Advanced Interaction
Table 13-1: The Members of the UnmanagedType Enumeration
Table 13-2: Values for the
DllImport
CharSet
Parameter
Table 13-3: Values in the
LayoutKind
Enumeration
Table 13-4: The Members of the
GCHandle
Structure
Previous page
Table of content
Next page
COM Programming with Microsoft .NET
ISBN: 0735618755
EAN: 2147483647
Year: 2006
Pages: 140
Authors:
John Paul Mueller
,
Julian Templeman
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Covert Communications
Study Strategies
Apply Your Knowledge
Appendix A. Using the ExamGear Special Edition Software
Appendix B. Preparing Your System for Knoppix-std
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Conclusion
Appendix B Kanban Supermarkets
Appendix G Intra-Cell Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Appendix J Abbreviations and Acronyms
Snort Cookbook
Building a Distributed IDS (Encrypted)
Basic Rules You Shouldnt Leave Home Without
Managing Snort Sensors
Obfuscating IP Addresses
Snort as Legal Evidence in the U.S.
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Internet Security Systems RealSecure
NFR Security
Policy and Procedures
Laws, Standards, and Organizations
The Future of Intrusion Detection and Prevention
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
Market Orientation and Supply Chain Management in the Fashion Industry
Logistics in Tesco: Past, Present and Future
Transforming Technologies: Retail Exchanges and RFID
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Ruby Cookbook (Cookbooks (OReilly))
Remapping the Keys and Values of a Hash
Checking Your Access to a File
Handling File Uploads via CGI
Terminating a Thread
Limiting Multithreading with a Thread Pool
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies