Learn how to turn ADO.NET classes into tools for constructing software using C# in Mahesh Chand's book, A Programmer's Guide to ADO.NET in C#.
- By Joel Semeniuk
- 06/01/2004
As the capabilities of handheld devices have grown, so have the threats.
- By Jonathan Gossels and Dick Mackey
- 06/01/2004
You can improve your UI in several ways, using the .NET Framework's built-in multithreading and asynchronous execution mechanisms.
Learn whether a given date is greater than or equal to a predefined date and how to add to the Expression Editor dialog box's list of Standard Expressions.
JAAS is based on the Pluggable Authentication Modules model and provides authentication and authorization services. Check out its many security benefits for Java applications.
You can automate exception logging with one line of client code, control it through an App.config file without recompiling, and use custom publishers to craft cool logging tools.
Remember the 8th layer of the OSI networking stack: humans. System administrators must educate themselves and their users about social engineering practices to prevent attacks.
- By Danielle Ruest and Nelson Ruest
- 05/27/2004
Network security is more important than ever. But network protection must move beyond the firewall. What new tools are on the horizon to help you with your combat strategy?
- By Danielle Ruest and Nelson Ruest
- 05/25/2004
InfoPath SP1 and the new .NET 2003 Toolkit let you implement business logic behind InfoPath forms with managed VB.NET or C# code instead of JScript or VBScript event handlers.
- By Roger Jennings
- 05/01/2004
You can boost performance in server-side apps by using COM+ pooled objects to cache resources. Be sure to enlist the connection manually each time the object pool picks up the object.
- By Enrico Sabbadin
- 05/01/2004
You can build a macro that recalculates and sets assembly dependencies upon request with the VS.NET automation model, even if your solution uses file references.
- By Enrico Sabbadin
- 05/01/2004
The C# Programming Language is a reference book that will benefit both beginners and veterans alike. Topics include exceptions, unsafe code, generics, anonymous methods, iterators, and partial types.
- By Mark Collins-Cope
- 05/01/2004
Activate Windows impersonation selectively, determine the update order of DataTables at run time, guarantee the delivery order of asynchronous delegates, and more.
- By Enrico Sabbadin
- 05/01/2004
How to prepare a small or medium business for disaster without overextending its already tight budget or overwhelming management with the details of an in-depth proposal.
- By Daniel Curry
- 05/01/2004
VB.NET offers an improved palette for creating Web-based software. Programming the Web with Visual Basic .NET is a complete reference book that gives you all the info you need.
- By Joel Semeniuk
- 04/26/2004
How to move the default directories created by IIS from the system drive. Plus, methods to make FTP more secure.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004
Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.
Create a shared database to provide interoperability between .NET and J2EE platforms, then extend it with a notification level between platforms.
Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks
- By Hariharan Krishnan
- 04/01/2004
With the ease of deployment for .NET applications, WinForms are once again a viable solution for large deployment environments. If you're considering WinForm programming, Windows Forms Programming in Visual Basic .NET is a must-have.