In-Depth Features


Simplify XML Data Validation

The second-generation .NET Framework builds on the tools of the first to provide better, more standards-compliant XML data validation.

Mapping Security to Services-Oriented Architecture

What security hurdles can you overcome when using XML to develop against a services layer? A whiteboard diagram of security requirements mappings in an SOA shows you the way.

Create Master Pages in ASP.NET 2.0

ASP.NET 2.0's master pages can help you develop consistent Web apps without the additional overhead of include files, user controls, or third-party add-ins.

Books: Develop Enterprise Solutions With UML

Enterprise Development with Visual Studio .NET, UML, and MSF covers the UML models available in Visio, as well as tools and features for developing and testing enterprise systems.

Books: Secure Your .NET Apps

The .NET Developer''s Guide to Windows Security helps put you on your way to developing secure applications in .NET.

Integrate Java and .Net

Both major platforms push Web services as a means of integrating applications across platforms. Check out another alternative that tightly integrates Microsoft code with Java apps.

Two Big Developments for Tablet PC

Frank Gocinski, Microsoft''s ISV Business Development Evangelist Manager, discusses major developments for Tablet PC.

Make an ESB Secure

Discover the many security services built into the ESB technology.

What's Next for Tablet PC

Peter Loforte discusses Microsoft's vision for Tablet PC and the future of mobile computing.

Increase .NET Performance Using Threads

Increase your users' perceived performance of your .NET application by using multithreading.

Books: Design a Database UI

Rebecca M. Riordan's book, Seeing Data: Designing User Interfaces for Database Systems Using .NET, helps you learn how to design a database UI in order to display information effectively.

Books: Develop Network Programs in .NET

Network Programming in .NET: With C# and Visual Basic .NET shows you how to accomplish network-based programming in .NET using well-known protocols or ones you create yourself.

Choose the Right Preventive Security Technologies

Ensuring maximum asset availability requires multiple layers of security working in concert to protect against intrusions, enforce usage policies, and allow machines to remain resilient to attacks - even when patching is not an option.

Download: Sample Code for ReportViewer

Try out some sample code that shows how to use the new ReportViewer controls to design and embed custom reports in your WinForms and WebForms projects.

Q&A: Protect Users From Phishing Scams

Just because something "appears" to be from a legitimate sender doesn't make it so.

Decentralized Development Strategies

Costs and expectations are well understood in centralized development projects, but the opposite is true with Microsoft Access and similar products. There's no standardization.

Achieve Optimal Performance

Response time and scalability are key to optimal performance of your enterprise's applications. Set expectations and provide analysis tools to help you achieve performance goals.

Windows Server 2003 Maintenance Made Easy

Following a management and maintenance regimen reduces administration, maintenance, and business expenses while increasing reliability, stability, and security.

Share Controls Between WinForms

Pass a user control from Windows Form to Windows Form to rearrange your graphical user interface (GUI) layout without needing to reinitialize the shared user control and more.

The Java Security Landscape

Architects, developers, and IT managers must take collective responsibility for creating secure solutions. Exploit Java's language- and enterprise-level security features to build a secure environment.

Subscribe on YouTube