In-Depth Features


Manipulate Text With Regular Expressions

Learn whether a given date is greater than or equal to a predefined date and how to add to the Expression Editor dialog box's list of Standard Expressions.

All That JAAS

JAAS is based on the Pluggable Authentication Modules model and provides authentication and authorization services. Check out its many security benefits for Java applications.

Automate Exception Logging

You can automate exception logging with one line of client code, control it through an App.config file without recompiling, and use custom publishers to craft cool logging tools.

Defending Against Layer 8

Remember the 8th layer of the OSI networking stack: humans. System administrators must educate themselves and their users about social engineering practices to prevent attacks.

Beyond the Firewall

Network security is more important than ever. But network protection must move beyond the firewall. What new tools are on the horizon to help you with your combat strategy?

Use InfoPath With VS.NET 2003

InfoPath SP1 and the new .NET 2003 Toolkit let you implement business logic behind InfoPath forms with managed VB.NET or C# code instead of JScript or VBScript event handlers.

Enlist ADO.NET Connections in Pooled Objects Manually

You can boost performance in server-side apps by using COM+ pooled objects to cache resources. Be sure to enlist the connection manually each time the object pool picks up the object.

Recalculate VS.NET Project Dependencies Automatically

You can build a macro that recalculates and sets assembly dependencies upon request with the VS.NET automation model, even if your solution uses file references.

Book Review: Delve Inside C#

The C# Programming Language is a reference book that will benefit both beginners and veterans alike. Topics include exceptions, unsafe code, generics, anonymous methods, iterators, and partial types.

Activate Windows Impersonation Selectively

Activate Windows impersonation selectively, determine the update order of DataTables at run time, guarantee the delivery order of asynchronous delegates, and more.

Implementing a Low-Budget Disaster Recovery Plan

How to prepare a small or medium business for disaster without overextending its already tight budget or overwhelming management with the details of an in-depth proposal.

Books: Develop Web Solutions With VB.NET

VB.NET offers an improved palette for creating Web-based software. Programming the Web with Visual Basic .NET is a complete reference book that gives you all the info you need.

Securing IIS

How to move the default directories created by IIS from the system drive. Plus, methods to make FTP more secure.

Getting Started With PKI

Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.

Create a .NET-J2EE Shared Database

Create a shared database to provide interoperability between .NET and J2EE platforms, then extend it with a notification level between platforms.

Finding a Home for Application Security

Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks

Books: Master WinForms Programming

With the ease of deployment for .NET applications, WinForms are once again a viable solution for large deployment environments. If you're considering WinForm programming, Windows Forms Programming in Visual Basic .NET is a must-have.

Transfer Files Over the Internet

Use FTP or HTTP POST to transfer files over the Internet with .NET. Also learn how to secure a database Connection string.

Speed Up Your ASP.NET Pages

Users will notice how much faster your Web pages and sites run when you apply these seven ASP.NET tips to your coding.

Five Layers of Defense

You can adapt the logical perimeter network design to suit your own access requirements, but most common requirements are met with this design.

Subscribe on YouTube