Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Telerik WPF Controls Tutorial

Buy
Telerik WPF Controls Tutorial, 9781782176527 (1782176527), Packt Publishing, 2014

Telerik controls and Windows Presentation Foundation (WPF) are a winning combination, and this tutorial will give you the skills you need to create powerful applications. You'll need to know C#, SQL, and object-oriented design.

Overview

  • Display database information in the Telerik WPF controls
  • Get useful tips on creating engaging, interactive user experiences for Windows desktop applications
  • Build powerful, responsive, and scalable line-of-business and enterprise applications using Telerik WPF controls

In Detail

Telerik Reporting is a lightweight reporting solution for all .NET cloud, web, and desktop platforms (Azure, Silverlight, WPF, ASP.NET, and Windows Forms) which targets developers and end users alike. Rich interactive and reusable reports can be created by developers in Visual Studio and by end users in the desktop-based Report Designer.

This book will guide you through working with specific Telerik WPF controls as well as working with the database and other methods to load the controls. It will focus on four key technologies: the DataContext property of WPF, Telerik RadControls for WPF, XML serialization, and application security.

Starting with the basics, Telerik WPF Controls Tutorial will take you from the simple usage of a DataTable to serializing XML files into objects, covering a discussion of different types of security and validation for WPF windows along the way.

This book will start out by showing you the simple methods of populating Telerik RadControls using a DataTable. You will then move on to look at populating a generic list of objects from a database as well as serializing XML files into class objects. You will cover how to secure a WPF application using a simple database example as well as Active Directory to determine navigation control loading. You will then review using the Telerik API interface classes to load Gantt information. With this book, you will be guided through building an application with the addition of all the important controls along with provisions for data entry, layouts, editors, navigation, and scheduling.

This book will teach you the different aspects of the Telerik controls, from using the DataContext property to loading the controls using the Telerik API references. The book will also cover other WPF subjects such as security and WPF validation of the DataContext property.

What you will learn from this book

  • Load Telerik controls using a DataTable and generic object lists
  • Work with SQL Server and XML serialization to read and manipulate data
  • Discuss and review different modes of securing an application
  • Use the new model for using DataContext to validate a WPF window
  • Employ the Telerik interface classes to load controls
  • Understand object-oriented concepts such as inheritance and interfaces
  • Secure an application with Active Directory
  • Set up a WPF application to verify and deploy information

Approach

This book follows a hands-on, example-based approach to demonstrate how to efficiently integrate Telerik RadControls within a WPF application.

Who this book is written for

This book is for anyone who plans to use Telerik controls within a WPF application. The reader should have an existing knowledge of C#, SQL, and object-oriented design. The book will focus on the use of objects to populate the controls, so knowledge of object-oriented design is very important.

(HTML tags aren't allowed.)

Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)
Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware...

Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
Visual Studio 2010 All-in-One For Dummies
Visual Studio 2010 All-in-One For Dummies

A comprehensive, easy-to-understand guide to Visual Studio 2010

Visual Studio is Microsoft's comprehensive development environment that encompasses the .NET Framework, various programming languages, and ASP.NET. Programmers love it for developing applications for mobile devices and the Web.

Because Visual...


Microsoft  Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant

Delivering immediate answers for the day-to-day administration of ISA Server 2004, this guide offers the focused, straightforward information you need to solve problems and get the job done.

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of ISA...

Unity 5 for Android Essentials
Unity 5 for Android Essentials

Learn the Unity 5 engine to master designing and building awesome real-world games and applications for Android devices. Design beautiful effects, animations, physical behaviors, and other different real-world features and techniques for your Android games and applications. Optimize your project and any other real-world projects for Android...

Cytokines in Human Health: Immunotoxicology, Pathology, and Therapeutic Applications (Methods in Pharmacology and Toxicology)
Cytokines in Human Health: Immunotoxicology, Pathology, and Therapeutic Applications (Methods in Pharmacology and Toxicology)
Over the past three decades the field of immunotoxicology, the study of the effects of exposure to drugs, chemicals, or physical/environmental agents on the structure and function of the immune system has benefited from an increasingly detailed understanding of the cellular and molecular basis of innate and acquired immunity....
©2021 LearnIT (support@pdfchm.net) - Privacy Policy