In-Depth Features


Books: Master C# Database Programming

Database Programming with C# explains the essentials of database programming to those familiar already with C#. Learn to exploit the VS.NET IDE to access data, and more.

Securing Your Handhelds

Deploying handhelds requires understanding the sensitivity of your data, the strengths & weaknesses of your infrastructure, & the needs of your IT team. There are no easy answers.

XML and Web Services: Are We Secure Yet?

From confidentiality, integrity, and availability to authentication, authorization, and audit, find out how you can employ best practices to make Web services secure.

Store Large Lookup Tables in DataSets

When mobile users need to look up and edit data without direct network connections, persist DataSets of lookup information as local XML files to preserve offline updates.

Display and Manage Images in ASP.NET

Develop image-management apps that exploit the .NET Framework and ASP.NET with recursion, the TreeView control, the System.Drawing.Images namespace, the System.IO namespace, and more.

Integration at the Edge

We can learn lessons from trading hubs and apply the data to IT integration. See how the ESB removes the distinction among internal and external networks for supply-chain apps.

Create a DSN-Less Database Connection

Increase your application's flexibility and make the installation simpler by connecting to the database without generating a DSN in the ODBC Data Source Administrator. Instead, use VB code to configure the connection.

Managing User Profiles in ASP.NET 2.0

Learn how to implement user profile management, a hot new feature in ASP.NET 2.0.

Patching Windows Security

Get the scoop on Microsoft's series of releases and updates that will tighten security on both the latest Windows operating systems as well as most other Microsoft products.

Books: SQL Server for Gurus

The Guru's Guide to SQL Server Architecture and Internals helps SQL Server power users manage their complex enterprise systems. This valuable reference manual goes far beyond the product's base documentation.

Create a Quality Testing Program

Testing is a crucial component of the software development lifecycle. Combine testing tools with methodologies such as XP and TDD to boost quality assurance.

Plug Into J2EE-.NET Interoperability

Your J2EE and .NET apps must interact. This overview presents the standards and available technologies that can help you shape interoperable solutions.

Books: Write Customized .NET Add-Ins

Writing Add-Ins for Visual Studio .NET helps you write an add-in customized to your needs. Les Smith walks you through the wizard and shows you how to develop your UI, trap IDE events, manipulate controls, and migrate your VB6 add-ins to the new platform.

Books: Use ADO.NET in Your C# Apps

Learn how to turn ADO.NET classes into tools for constructing software using C# in Mahesh Chand's book, A Programmer's Guide to ADO.NET in C#.

Lock Down Your Handheld Devices

As the capabilities of handheld devices have grown, so have the threats.

Enhance UI Performance in WinForms

You can improve your UI in several ways, using the .NET Framework's built-in multithreading and asynchronous execution mechanisms.

All That JAAS

JAAS is based on the Pluggable Authentication Modules model and provides authentication and authorization services. Check out its many security benefits for Java applications.

Manipulate Text With Regular Expressions

Learn whether a given date is greater than or equal to a predefined date and how to add to the Expression Editor dialog box's list of Standard Expressions.

Automate Exception Logging

You can automate exception logging with one line of client code, control it through an App.config file without recompiling, and use custom publishers to craft cool logging tools.

Defending Against Layer 8

Remember the 8th layer of the OSI networking stack: humans. System administrators must educate themselves and their users about social engineering practices to prevent attacks.