Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
101 Microsoft Visual Basic .NET Applications

Buy

Explore 101 of the most useful Visual Basic .NET applications in action—and jumpstart your own Microsoft .NET Framework-based development projects. This guide provides expert, behind-the-code commentary on 101 fully executable code samples—distilling more than 700 hours of programming time into best practices for Microsoft Windows Forms development. Each code sample demonstrates core features and functions of Visual Basic .NET and the .NET Framework, explains the underlying programming concepts, and provides a complete code walkthrough. From creating basic data entry forms to drilling deep into the .NET Framework, you’ll learn the techniques that Microsoft’s own developers use to write real-world applications with Visual Basic .NET.

Get code, comments, and instruction to help you:

  • Build smart client applications using Windows Forms
  • Use Microsoft ADO.NET to build data-centric applications
  • Master advanced .NET-based techniques: threading, remoting, and serialization
  • Use GDI+ to manipulate images and animate your solutions
  • Use performance counters and the Event Log to monitor the OS and instrument your applications
  • Exploit COM+ features such as transactions and role-based security
  • Implement application security features such as encryption and authentication
  • Automate Microsoft Office and Microsoft Internet Explorer using COM Interop
  • Create and deploy add-ins for Microsoft Visual Studio
  • Enable application messaging via MSMQ
  • Create and consume Web services

Plus:

  • See how to use what’s new in Visual Studio .NET 2003 and .NET Framework 1.1
  • Learn how Microsoft Windows Server 2003 impacts application development and support
  • Get guidelines for applying the coding conventions described in the book
(HTML tags aren't allowed.)

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Beginning Windows 8
Beginning Windows 8

Windows 8 has been described by Microsoft as its ‘boldest’ Windows release ever. Beginning Windows 8 takes you through the new features and helps you get more out of the familiar to reveal the possibilities for this amazing new operating system.

You will learn, with non-technical
...

Performance Management: A New Approach for Driving Business Results
Performance Management: A New Approach for Driving Business Results
Performance Management presents an end-to-end practical model of effective performance management that shows how to develop and implement performance management systems that drive results. It goes beyond prescribing typical best practices – instead focusing on what it really takes to implement performance management effectively....

Selective Sentinel Lymphadenectomy for Human Solid Cancer (Cancer Treatment and Research)
Selective Sentinel Lymphadenectomy for Human Solid Cancer (Cancer Treatment and Research)
Lymph node (LN) status is the most important prognostic indicator for the clinical outcome of patients in human solid cancer. Recent developments in sentinel lymph node (SLN) concept and technology have resulted in the application of this revolutionary approach to determine if cancer has metastasized to the regional nodal basin....
Euthanasia, Abortion, Death Penalty and Religion - The Right to Life and its Limitations: International Empirical Research (Religion and Human Rights, 4)
Euthanasia, Abortion, Death Penalty and Religion - The Right to Life and its Limitations: International Empirical Research (Religion and Human Rights, 4)

This book considers how the termination of life might be accepted in the view of a general obligation to protect life. It features more than 10 papers written by scholars from 14 countries that offer international comparative empirical research. Inside, readers will find case studies from such areas as: India, Chile, Germany, Italy,...

Content Distribution Networks: An Engineering Approach
Content Distribution Networks: An Engineering Approach
Content distribution networks (CDNs) are the most promising new techniques for coping with the huge and swiftly growing volume of Internet traffic. In essence, CDNs are groups of proxy-servers located at strategic points around the Internet and arranged so as to ensure that a download request can always be handled from the nearest server. In this,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy