|
Take Razor for a test drive and discover first hand how this scripting syntax simplifies the way you create dynamic, data-driven websites. With this concise guide, you’ll work with Razor syntax by building example websites with Microsoft WebMatrix and ASP.NET MVC. You'll quickly learn how Razor lets you combine code and content in a fluid and expressive manner on Windows-based servers.
Programming Razor also explores components of the Razor API, and shows you how Razor templates are turned into rendered HTML. By the end of this book, you'll be able to create Razor-based websites with custom extensions that meet the specific needs of your projects.
-
Use Razor with Microsoft WebMatrix to build a working blog, complete with data
-
Organize and manage your web application, using Razor features for layouts, sections, and partial views
-
Create clean and effective ASP.NET MVC views with the Razor View Engine
-
Learn how the Razor API interprets Razor templates and turns them into executable .NET code
-
Implement advanced techniques for exposing reusable code and sharing ASP.NET MVC views across projects
|
|
|
VB.NET Language Pocket ReferenceVisual Basic .NET is a radically new version of Microsoft Visual Basic, the world's most widely used rapid application development (RAD) package. Whether you are just beginning application development with Visual Basic .NET or are already deep in code, you will appreciate just how easy and valuable the VB.NET Language Pocket Reference is.... | | SSH, the Secure Shell: The Definitive GuideAre you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every... | | Web Hacking: Attacks and Defense"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems... |
|