Catálogo de publicaciones - libros
.NET 2.0 Interoperability Recipes: A Problem-Solution Approach
Bruce Bukovics
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Software Engineering/Programming and Operating Systems
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-1-59059-669-2
ISBN electrónico
978-1-4302-0145-8
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Apress 2006
Cobertura temática
Tabla de contenidos
Using C-Style APIs
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 1-86
C-Style APIs: Structures, Classes, and Arrays
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 87-140
Win32 API
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 141-189
Using C++ Interop
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 191-233
Using COM
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 235-326
Exposing Managed Code to COM
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 327-378
Marshaling to COM Clients
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 379-440
COM+ Enterprise Services
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 441-502
COM+ Enterprise Services Transactions
Bruce Bukovics
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Pp. 503-582