Results (1 - 1) of 1

Show results for

Product Type

  • All Product Types
  • Books (1)
  • Magazines & Periodicals
  • Comics
  • Sheet Music
  • Art, Prints & Posters
  • Photographs
  • Maps
  • Manuscripts &
    Paper Collectibles

Refine by

Condition

Binding

Collectible Attributes

  • First Edition
  • Signed
  • Dust Jacket
  • Seller-Supplied Images
  • Not Printed On Demand

Seller Location

  • All Locations

Seller Rating

Alex Homer,Bob Brumfield,Erik Renaud,Fernando Simonazzi,Grigori Melnik,Nicolas Botto,Olaf Conjin

Published by Dreamtech Press/Wiley India Pvt. Ltd (2011)

ISBN 10: 9350041871 ISBN 13: 9789350041871

Softcover
New

Quantity Available: > 20

From: BookVistas (New Delhi, DELHI, India)

Seller Rating: 3-star rating

Add to Basket
Price: US$ 9.97
Convert Currency
Shipping: US$ 9.62
From India to U.S.A.

Destination, Rates & Speeds

About this Item: Dreamtech Press/Wiley India Pvt. Ltd, 2011. Softcover. Condition: New. Welcome to the Library Section 1.1. Meet the Librarian Section 1.2. What You Get with Enterprise Library Section 1.3. Things You Can Do with Enterprise Library Section 1.4. Why You Should Use Enterprise Library Section 1.5. Some Fundamentals of Enterprise Library Section 1.6. Configuring Enterprise Library Section 1.7. The Example Applications Section 1.8. Summary Much ADO about Data Access Section 2.1. Introduction Section 2.2. What Does the Data Access Application Block Do? Section 2.3. How Do I Use the Data Access Block? Section 2.4. Extending the Block to Use Other Databases Section 2.5. Summary Error Management Made Exceptionally Easy Section 3.1. Introduction Section 3.2. When Should I Use the Exception Handling Block? Section 3.3. How Do I Use the Exception Handling Block? Section 3.4. What Exception Policies Do I Need? Section 3.5. Diving in with a Simple Example Section 3.6. Wrapping an Exception Section 3.7. Replacing an Exception Section 3.8. Logging an Exception Section 3.9. Shielding Exceptions at WCF Service Boundaries Section 3.10. Handling Specific Exception Types Section 3.11. Executing Code around Exception Handling Section 3.12. Assisting Administrators Section 3.13. Extending Your Exception Handling Section 3.14. Summary As Easy As Falling Off a Log Section 4.1. Introduction Section 4.2. What Does the Logging Block Do? Section 4.3. How Do I Use the Logging Block? Section 4.4. Non-Formatted Trace Listeners Section 4.5. Creating Custom Trace Listeners, Filters, and Formatters Section 4.6. Summary A Cache Advance for your Applications Section 5.1. Introduction Section 5.2. What Does the Caching Block Do? Section 5.3. How Do I Configure the Caching Block? Section 5.4. How Do I Use the Caching Block? Section 5.5. Extending Your Cache Advance Section 5.6. Summary Banishing Validation Complication Section 6.1. Introduction Section 6.2. Techniques for Validation Section 6.3. What Does the Validation Block Do? Section 6.4. How Do I Use The Validation Block? Section 6.5. Diving in With Some Simple Examples Section 6.6. Creating Custom Validators Section 6.7. Summary Relieving Cryptography Complexity Section 7.1. Introduction Section 7.2. What Does the Cryptography Block Do? Section 7.3. How Do I Use the Cryptography Block? Section 7.4. Diving in with an Example Section 7.5. Creating Custom Cryptography Providers Section 7.6. Summary An Authentic Approach to Token Identity Section 8.1. Introduction Section 8.2. What Does the Security Block Do? Section 8.3. How Do I Configure the Security Block? Section 8.4. How Do I Use the Security Block? Section 8.5. Diving in With an Example Section 8.6. Creating Custom Authorization Providers Section 8.7. Summary Appendix A. Dependency Injection with Unity Section A.1. What is Dependency Injection? Section A.2. The Unity Dependency Injection and Interception Mechanism Section A.3. Defining Dependencies with Unity Section A.4. Resolving Populated Instances of Your Classes Appendix B. Dependency Injection in Enterprise Library Section B.1. Loading Configuration Information into a Unity Container Section B.2. Viewing Registrations in the Container Section B.3. Populating Entire Object Graphs at Application Startup Section B.4. Maintaining a Container Reference in Request-Based Applications Section B.5. Using an Alternative Service Locator or Container Appendix C. Policy Injection in Enterprise Library Appendix D. Enterprise Library Configuration Scenarios Section D.1. About Enterprise Library Configuration Section D.2. Scenarios for Advanced Configuration Appendix E. Encrypting Configuration Files Printed Pages: 272. Seller Inventory # 61936

More information about this seller | Contact this seller 1.

Results (1 - 1) of 1