Flylib.com
Microsoft Visual J# .NET (Core Reference) (Pro-Developer)
Microsoft Visual J# .NET (Core Reference) (Pro-Developer)
ISBN: 0735615500
EAN: 2147483647
Year: 2002
Pages: 128
Authors:
John Longshaw
,
Andy Sharp
BUY ON AMAZON
Main Page
Table of content
Copyright
Acknowledgments
Introduction
How This Book Is Organized
System Requirements
Installing the Sample Files
Part I: The Architecture of .NET
Chapter 1. The Challenge of N -Tier Development
ClientServer and N -Tier Architectures
Connectivity and Data Formats
Data Access
Nonfunctional Requirements
.NET Enterprise Servers
Java and .NET
Summary
Chapter 2. Microsoft .NET
Compilers and Language Support
Assemblies and Deployment
The .NET Framework Class Library
.NET Remoting and the Web
.NET Security
Summary
Chapter 3. Java and the Common Language Runtime
Components and Java
Java, J, and the .NET Framework
Metadata and Attributes
Enterprise Java
Summary
Chapter 4. Graphical User Interfaces
Desktop GUIs
Porting Existing Java Applications
Writing a GUI Application Using the .NET Classes
Summary
Part II: Managing and Manipulating Data
Chapter 5. Processing XML
Using XML in a .NET Application
Single-Pass Processing of XML Documents
Validation and Entity Resolution
Processing XML Documents in Memory
Writing and Manipulating In-Memory XML Documents
XML and Data
Summary
Chapter 6. Transforming XML
Transforming XML in .NET Applications
Applying Stylesheets to XML Documents
Optimization and Partial Transformation
Parameterization and External Functionality
Summary
Chapter 7. ADO.NET
The ADO.NET Architecture
Connecting to a Data Store
Executing Commands Against a Data Store
Using DataSet Objects for Data Access
Transaction Management
Working with XML and ADO.NET
Summary
Part III: Developing for the Enterprise
Chapter 8. Multithreading with .NET
Threads and .NET
Synchronization
Interthread Communication
Thread Pooling
Summary
Chapter 9. Basic Network Programming
Sockets Essentials
Using Sockets Asynchronously
Web Network Programming
Security over the Internet
Summary
Chapter 10. Serializing Objects
Serializing and Deserializing Data
Advanced Serialization
XML Serialization
Summary
Chapter 11. .NET Remoting
The Common Language Runtime Remoting Architecture
Programming with TCP Remoting
HTTP Remoting
Customizing Remoting
Summary
Chapter 12. Using Message Queues
The Architecture of Message Queuing 3.0
Programming Message Queues
Asynchronous Operations
Messaging in the Real World
Summary
Part IV: Integrating with Windows
Chapter 13. Integrating with Unmanaged Components
Managed and Unmanaged Code
Invoking Methods in Unmanaged DLLs
Calling COM Components
Integrating .NET Components into COM
Interoperability with Other Technologies
Summary
Chapter 14. Serviced Components and COM
Using an Existing COM Component
Building a Serviced Component
Features of Serviced Components
.NET and COM Security
Asynchronous Components
Summary
Chapter 15. Implementing Windows Services
Controlling a Windows Service
Writing a Windows Service
Summary
Part V: Building Applications for the Web
Chapter 16. ASP.NET: A Better ASP
Introducing ASP.NET
HTML Forms and ASP Forms
ASP.NET Web Forms
Migrating from ASP Pages
Pages, Controls, and Data
Building ASP.NET Web Applications
Summary
Chapter 17. Building a Web Service
An Overview of Web Services
Creating a Web Service
Web Service Description and Data Types
Creating an XML Web Service Application
Summary
Chapter 18. Creating a Web Service Client
Web Service Clients
Dynamic Discovery of Web Services
Summary
About the Author
Microsoft Visual J# .NET (Core Reference) (Pro-Developer)
ISBN: 0735615500
EAN: 2147483647
Year: 2002
Pages: 128
Authors:
John Longshaw
,
Andy Sharp
BUY ON AMAZON
C++ How to Program (5th Edition)
Declaring Arrays
Default Memberwise Assignment
static Class Members
Container Adapters
E.7. The volatile Type Qualifier
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity I
Data Correlation
Policy and Procedures
The Future of Intrusion Detection and Prevention
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
PMP Practice Questions Exam Cram 2
Answers and Explanations
Answers and Explanations
Project PlanningCore Processes
Project PlanningFacilitating Processes
Exam Prep Questions
Programming .Net Windows Applications
DialogResult
Termination Buttons
Class Hierarchy
Class Hierarchy
Specializing an Existing Control
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the Authentication Process
Triggers
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies