Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effective Use of Microsoft Enterprise Library: Building Blocks for Creating Enterprise Applications and Services

Buy

Writing robust enterprise applications presents a special challenge for developers, but Microsoft has addressed that challenge with the free, downloadable Enterprise Library for the .NET Framework.

Enterprise Library is a collection of application blocks and guidance documents that together provide functionality common to enterprise applications; each application block includes full source code. Lacking in the guidance provided by Microsoft is an overall roadmap to the process of using the application blocks. Effective Use of Microsoft Enterprise Library is that roadmap.

Microsoft application development lead architect Len Fenster explains exactly how to build applications using Enterprise Library application blocks. Fenster covers all seven application blocks as implemented for .NET Framework 1.1, shows how to develop and use a new application block, and explains how Enterprise Library is changing for .NET Framework 2.0.

Readers will learn

  • How the Configuration Application Block is designed and can be used at runtime to easily read and write configuration data
  • How the Configuration Application Block works at design time for all blocks
  • How to use the Data Access Block to create a portable data layer
  • How to use the Exception Handling Application Block to implement a policy-driven, application-wide exception handling system
  • How to use the Logging and Instrumentation Application Block to log and instrument messages independent of the message destination
  • How to add authentication, authorization, role membership, security cache, and profile membership features to an application with the Security Application Block
  • How to use the Cryptography Application Block to add functionality to encrypt and decrypt data and create and compare hashes
  • How to build your own application block and providers that “snap” right into Enterprise Library

Whether you plan to extend Enterprise Library for your organization, or just use the existing application blocks to add functionality to your architecture in a consistent, extensible, integrated way, this book will guide you through the complexities and help you find a clear path to success.

About the Author

Len Fenster is the lead architect for .NET Development for Microsoft Consulting Service’s U.S. East Region. During his last eight years at Microsoft, he has focused on helping many enterprises create robust applications based on Microsoft technology. Most recently, Len has been working with the Microsoft patterns & practices team on the next version of Enterprise Library. Even before his career with Microsoft, Len led a global team of developers and architects that built distributed applications based on Microsoft technologies. Since the advent of .NET, Len has served as an enterprise architect for Microsoft Consulting Services and has leveraged his considerable experience to help many enterprises incorporate .NET into their own technology strategies. Len speaks on a regular basis to companies and at architecture forums about architecting solutions based on .NET and service oriented architecture.

(HTML tags aren't allowed.)

Edith and Florence Stoney, Sisters in Radiology (Springer Biographies)
Edith and Florence Stoney, Sisters in Radiology (Springer Biographies)
This book explores the lives and achievements of two Irish sisters, Edith and Florence Stoney, who pioneered the use of new electromedical technologies, especially X-rays but also ultraviolet radiation and diathermy. In addition, the narrative follows several intertwined themes as experienced by the sisters during their lifetimes. Their...
QuickTime for Java: A Developer's Notebook
QuickTime for Java: A Developer's Notebook
Java developers who need to add audio, video, or interactive media creation and playback to their applications find that QuickTime Java is a powerful toolkit, but one that's not easy to get into. This book offers the first real look at this important software with an informal, code-intensive style that lets impatient early adopters focus on...
Oracle Enterprise Manager Grid Control 11g R1: Business Service Management
Oracle Enterprise Manager Grid Control 11g R1: Business Service Management

Oracle Enterprise Manager Grid Control is a release of Oracle Enterprise Manager that's used to model and manage the entire Oracle Grid and beyond. It has capabilities to manage a number of databases and application servers, and can manage multiple instances of Oracle deployment platforms. Business Service Management (BSM) is a...


Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Managing Information Security Risks: The OCTAVE Approach
Managing Information Security Risks: The OCTAVE Approach

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and...

IMS Application Developer's Handbook: Creating and Deploying Innovative IMS Applications
IMS Application Developer's Handbook: Creating and Deploying Innovative IMS Applications
Many books have been written about IMS, so why do we think another is needed? Most of the existing books are written from the perspective of those who implement the technology, either network vendors or operators. There is no such focus for developers. The standards that form the basis of IMS are complex – as they are...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy