|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn688485832 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
101201s2010 enka o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d B24X7
|d C6I
|d OCLCQ
|d UKMGB
|d OCLCF
|d OCLCA
|d OCLCQ
|d NLGGC
|d OCLCO
|d YDXCP
|d OCL
|d OCLCQ
|d COO
|d OCLCQ
|d AGLDB
|d LIV
|d OCLCA
|d JBG
|d OCL
|d OCLCQ
|d VTS
|d WYU
|d STF
|d M8D
|d UKAHL
|d OCLCO
|d INARC
|d OCLCQ
|
016 |
7 |
|
|a 015727554
|2 Uk
|
019 |
|
|
|a 765144071
|
020 |
|
|
|a 9781849680912
|q (electronic bk.)
|
020 |
|
|
|a 1849680914
|q (electronic bk.)
|
020 |
|
|
|a 1849680906
|
020 |
|
|
|a 9781849680905
|
020 |
|
|
|z 9781849680905
|
029 |
1 |
|
|a AU@
|b 000051395142
|
029 |
1 |
|
|a DEBBG
|b BV043076590
|
029 |
1 |
|
|a DEBSZ
|b 421660910
|
029 |
1 |
|
|a GBVCP
|b 803438680
|
035 |
|
|
|a (OCoLC)688485832
|z (OCoLC)765144071
|
037 |
|
|
|b 01201872
|
050 |
|
4 |
|a QA76.76.A65
|b J67 2010eb
|
072 |
|
7 |
|a COM
|x 084000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.365
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Joshi, Sachin.
|
245 |
1 |
0 |
|a Microsoft enterprise library 5.0 :
|b develop enterprise applications using reusable software components of Microsoft enterprise library 5.0 /
|c Sachin Joshi.
|
260 |
|
|
|a Birmingham, UK :
|b Packt Pub.,
|c 2010.
|
300 |
|
|
|a 1 online resource (259 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
8 |
|
|a Annotation
|b Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application Block is designed to address.<br /><br />This book covers the fundamental elements of each Application Block so that you get a good understanding of its concepts. This is followed by referencing the required and optional assemblies and the initial configuration of that block using the configuration editor. Finally, leverage Application Block features to achieve goals of the enterprise application development.<br /><br />You will first get an overview of the different Application Blocks in Enterprise Library and their inter-dependencies. Then you will learn to install the Enterprise library and optionally the source code. Then you will learn about the individual functional Application Blocks: the Data Access Application Block, Logging Application Block, Exception Handling Application Block, Caching Application Block, Validation Application Block, Security Application Block, and Cryptography Application Block.<br /><br />In the Caching Application Block chapter you will learn to reference the required assemblies, configure the initial settings, cache, retrieve, remove, and flush cached data. You will also learn to configure and leverage encryption providers to encrypt cached data.<br /><br />In the Validation Application Block chapter you will be introduced to concepts such as Validators, ValidatorFactory, ValidationResults, and so on. You will learn to reference the required assemblies, set up the initial configuration, validate objects using attributes, validate values programmatically, validate using configuration, and also learn to integrate the Application block with Windows Forms and ASP.NET. Finally you will learn to implement a custom validator.<br /><br />In the Security Application Block chapter you will be introduced to Authorization Providers and the Security Cache Provider. You will then learn about referencing required assemblies, configure security settings, and learn to set up and validate based on the authorization rules. You will also learn to leverage the Security cache provider to cache user Identity, Principal, and Profile. Finally you will learn to implement a custom Authorization Provider.<br /><br />In the Cryptography Application Block chapter you will be introduced to Hashing and Cryptography providers; you will learn to reference required assemblies, set up the initial configuration, generate/compare hash values, and implement a custom hash provider. You will also learn to encrypt/decrypt data and also implement a custom symmetric cryptography provider.<br /><br />A step by step tutorial that guides you through the process of building Enterprise applications using the Application Blocks in Microsoft Enterprise Library 5.0.<br /><br /><br />What you will learn from this book :<br />Implement a custom trace listener, log formatter, and log filter<br />Configure the Exception Handling block and wrap or replace exceptions using a Wrap Handler or a Replace Handler<br />Log exception information using the Logging Handler<br />Integrate the Validation Application Block with Windows Forms-based applications<br />Integrate the Validation Application Block with ASP.NET web applications<br />Configure the Security block and authorization rules to validate based on the configured rules<br />Save user Identity/Principal/Profile in cache and obtain a temporary token<br />Retrieve cached user Identity/Principal/Profile using a token<br />Terminate a user session by expiring the cached identity<br />Configure the Cryptography block, generate a hash value for a given string, and compare a hash value with a string<br />Implement a custom Hash Provider and Symmetric Cryptography Provider<br />Perform database operations more efficiently by leveraging the rich features of Data Access Application Block<br />Retrieve records as objects using Parameter, Row and Result Set Mappers<br />Log messages to Event Log, flat file and learn to configure categories, trace listeners and logging filters<br /><br />Approach<br />This is a step-by-step tutorial in which a chapter is dedicated to each Application Block of the Microsoft Enterprise Library 5.0. We will develop small applications to implement the functions in each Application Block all through the book.<br /><br /><br />Who this book is written for<br />If you are a Programmer, Consultant, or an Associate Architect, who is interested in developing Enterprise applications, this book is for you. We assume that you already have a good knowledge of Microsoft .NET framework and the C♯ programming language.<br />
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Microsoft .NET Framework.
|
630 |
0 |
7 |
|a Microsoft .NET Framework.
|2 fast
|0 (OCoLC)fst01020083
|
650 |
|
0 |
|a Enterprise application integration (Computer systems)
|
650 |
|
6 |
|a Intégration d'applications d'entreprise (Systèmes informatiques)
|
650 |
|
7 |
|a COMPUTERS
|x Desktop Applications
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Enterprise application integration (Computer systems)
|2 fast
|0 (OCoLC)fst01200938
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=346289
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n microsoftenterpr0000josh
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26943952
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00041200
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 346289
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3551285
|
994 |
|
|
|a 92
|b IZTAP
|