E-Book, Englisch, 492 Seiten
Newton The Definitive Guide to the Microsoft Enterprise Library
1. ed
ISBN: 978-1-4302-0315-5
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 492 Seiten
ISBN: 978-1-4302-0315-5
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book introduces one of the most exciting and popular .NET-oriented initiatives; the Enterprise Application Library, which offers nine classes of reusable code used to solve a variety of common problem spaces. It is the first book to introduce all ten of the enterprise application blocks, which have been recently updated for .NET 2.0. It covers a number of topics, including configuration, data access, exception management, caching, application updates, UI separation, asynchronous invocation, logging, security, and XML-based information aggregation. With this book readers will be able to build .NET applications faster and more efficiently.
Keenan Newton has over 10 years of experience designing, architecting, and developing N-tier applications for both Windows and web environments, with an emphasis on Web Services, ADO.NET, and service-oriented architecture (SOA). He is a speaker at local .NET user groups, and has been published in CoDe Magazine. Keenan is employed as a senior consultant for Microsoft Consulting Services.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents at a Glance;4
2;Contents;5
3;About the Author;14
4;About the Technical Reviewer;15
5;Acknowledgments;16
6;Introduction;17
7;Enterprise Applications;18
7.1;The Needs of a Software Application;18
7.2;Common Framework Types;20
7.3;Core Components of an Enterprise Framework;23
7.4;Summary;37
8;Introducing the Enterprise Library Application Blocks;38
8.1;Microsoft Patterns and Practices;39
8.2;The Original Application Blocks;44
8.3;Enterprise Library for . NET Framework 1.1 Overview;48
8.4;Enterprise Library for . NET Framework 2.0 Overview;50
8.5;Enterprise Library 3.0 Overview;53
8.6;Application Blocks That Are Not Core;54
8.7;Using Enterprise Library;55
8.8;Summary;57
9;The Design of the Enterprise Library Application Blocks;58
9.1;Overall Design of the Enterprise Library;58
9.2;How Dependency Injection Works;64
9.3;Patterns, Extensibility, and the Enterprise Library;73
9.4;Application Block Conceptual Architecture;76
9.5;Unit Testing;77
9.6;Migrating from Earlier Enterprise Library Versions;78
9.7;Setting Up the ACME POS Application;80
9.8;Summary;83
10;The Common Assembly and ObjectBuilder Components;84
10.1;Common Assembly Configuration Support;84
10.2;Common Assembly Instrumentation Support;101
10.3;ObjectBuilder;104
10.4;Adding Custom Configuration Settings for the ACME POS Application;114
10.5;Summary;117
11;The Enterprise Library Configuration Console;118
11.1;The Configuration Dilemma;118
11.2;How the Configuration Console and Configuration Editor Work;119
11.3;Using the Configuration Console;135
11.4;Using the Configuration Editor within Visual Studio 2005;141
11.5;Creating the ACME POS Configuration Design- Time Components;143
11.6;Summary;155
12;The Data Access Application Block;156
12.1;Evolution of the Data Access Application Block;156
12.2;Data Access in an Application;157
12.3;New Features in ADO. NET 2.0;158
12.4;Features of the Data Access Application Block;165
12.5;Configuring the Data Access Application Block;175
12.6;ACME POS Application Data Access;184
12.7;Summary;192
13;The Caching Application Block;193
13.1;Deciding When to Use Caching;193
13.2;Getting Underneath the Hood;198
13.3;Using the Caching Application Block;207
13.4;Caching Static Data for the ACME POS Application;221
13.5;Summary;235
14;The Exception Handling Application Block;236
14.1;Introducing Exception Handling;236
14.2;Introducing the Exception Handling Application Block;241
14.3;Using the Exception Handling Application Block;249
14.4;Handling Exceptions in the ACME POS Application;265
14.5;Summary;272
15;The Logging Application Block;273
15.1;Types of Logging;273
15.2;Understanding the Design of the Logging Application Block;274
15.3;Using the Logging Application Block;280
15.4;Adding the Logging Application Block to the ACME POS Application;315
15.5;Summary;318
16;The Cryptography Application Block;319
16.1;Types of Encryption;319
16.2;Understanding the Design of the Cryptography Application Block;320
16.3;Using the Cryptography Application Block;324
16.4;Encrypting Customer Data in the ACME POS Application;343
16.5;Summary;349
17;The Security Application Block;350
17.1;Understanding the Design of the Security Application Block;350
17.2;Using the Security Application Block;352
17.3;Summary;374
18;The Validation Application Block;375
18.1;Looking Inside the Validation Application Block;375
18.2;Using the Built- In Validators;382
18.3;Creating a Custom Validator for the ACME POS Application;397
18.4;Summary;401
19;The Policy Injection Application Block;402
19.1;Introducing Aspect- Oriented Programming;402
19.2;Understanding the Design of the Policy Injection Application Block;404
19.3;Configuring and Using Policies;414
19.4;Adding the Policy Injection Application Block to the ACME POS Application;421
19.5;Summary;426
20;The Application Block Software Factory;427
20.1;Introducing the Guidance Navigator;427
20.2;Creating an Application Block;430
20.3;Using the Sample Application Block;447
20.4;Summary;448
21;Other Application Blocks and Advanced Configuration Features;449
21.1;Composite UI Application Block;449
21.2;Connection Monitor Application Block;460
21.3;Endpoint Catalog Application Block;461
21.4;Disconnected Service Agent Application Block;462
21.5;Composite Web Application Block;463
21.6;Page Flow Application Block;466
21.7;Updater Application Block;467
21.8;Application Blocks for Mobile Applications;468
21.9;Advanced Configuration Features;472
21.10;Summary;478
22;Index;479




