A guide to Microsoft Enterprise Library covers such topics as data access, error management, logging block, caching block, validation, cryptography, and token identity.
Author(s): Alex Homer; Bob Brumfield; Nicolas Botto; Grigori Melnik; Erik Renaud; Fernando Simonazzi
Year: 2010
Language: English
Pages: 250
Copyright
Contents
Foreword
Preface
The Team Who Brought You This Guide
Welcome to the Library
Meet the Librarian
What You Get with Enterprise Library
Things You Can Do with Enterprise Library
Why You Should Use Enterprise Library
Some Fundamentals of Enterprise Library
Configuring Enterprise Library
Instantiating and Using Enterprise Library Objects
The Example Applications
Summary
Much ADO about Data Access
Introduction
What Does the Data Access Application Block Do?
How Do I Use the Data Access Block?
Extending the Block to Use Other Databases
Summary
Error Management Made Exceptionally Easy
Introduction
When Should I Use the Exception Handling Block?
How Do I Use the Exception Handling Block?
What Exception Policies Do I Need?
Diving in with a Simple Example
Wrapping an Exception
Replacing an Exception
Logging an Exception
Shielding Exceptions at WCF Service Boundaries
Handling Specific Exception Types
Executing Code around Exception Handling
Assisting Administrators
Extending Your Exception Handling
Summary
As Easy As Falling Off a Log
Introduction
What Does the Logging Block Do?
How Do I Use the Logging Block?
Non-Formatted Trace Listeners
Creating Custom Trace Listeners, Filters, and Formatters
Summary
A Cache Advance for your Applications
Introduction
What Does the Caching Block Do?
How Do I Configure the Caching Block?
How Do I Use the Caching Block?
Extending Your Cache Advance
Summary
Banishing Validation Complication
Introduction
Techniques for Validation
What Does the Validation Block Do?
How Do I Use The Validation Block?
Diving in With Some Simple Examples
Creating Custom Validators
Summary
Relieving Cryptography Complexity
Introduction
What Does the Cryptography Block Do?
How Do I Use the Cryptography Block?
Diving in with an Example
Creating Custom Cryptography Providers
Summary
An Authentic Approach to Token Identity
Introduction
What Does the Security Block Do?
How Do I Configure the Security Block?
How Do I Use the Security Block?
Diving in With an Example
Creating Custom Authorization Providers
Summary
Appendix A: Dependency Injection with Unity
What is Dependency Injection?
The Unity Dependency Injection and Interception Mechanism
Defining Dependencies with Unity
Resolving Populated Instances of Your Classes
Appendix B: Dependency Injection in Enterprise Library
Loading Configuration Information into a Unity Container
Viewing Registrations in the Container
Populating Entire Object Graphs at Application Startup
Maintaining a Container Reference in Request-Based Applications
Using an Alternative Service Locator or Container
Appendix C: Policy Injection in Enterprise Library
Appendix D: Enterprise Library Configuration Scenarios
About Enterprise Library Configuration
Scenarios for Advanced Configuration
Appendix E: Encrypting Configuration Files
Index