Table of contents
- Welcome to Enterprise Library
- What Is Enterprise Library?
- About This Release of Enterprise Library
-
Developing Applications with Enterprise Library
-
Configuring Enterprise Library
- Using the Configuration Tools
- Advanced Configuration Scenarios
- Using Group Policy with Enterprise Library
- Configuring a Deployment Environment
- Using the Fluent Configuration API
- Using the appSettings Section
- Updating Configuration Settings at Run Time
- Encrypting Configuration Data
- Enabling Instrumentation
- Source Schema for Enterprise Library Core
- Using Enterprise Library in Applications
- Deploying Enterprise Library
- Administering Enterprise Library
- Extending and Modifying Enterprise Library
-
Configuring Enterprise Library
- Design of Enterprise Library
- The Caching Application Block
-
The Cryptography Application Block
- What Does the Cryptography Application Block Do?
- When Should I Use the Cryptography Application Block?
- Developing Applications Using the Cryptography Application Block
- Key Scenarios
- Design of the Cryptography Application Block
- Extending and Modifying the Cryptography Application Block
- Deployment and Operations
-
The Data Access Application Block
- What Does the Data Access Application Block Do?
- When Should I Use the Data Access Application Block?
-
Developing Applications Using the Data Access Application Block
- Entering Configuration Information
- Adding Application Code
- Creating a Database Object
- Creating a DbCommand Object
- Managing Connections
- Using the TransactionScope Class
- Using the Asynchronous Data Access Methods
- Returning Data as Objects for Client Side Querying
- Creating Portable Database Applications
- Handling Exceptions
- Handling Parameters
-
Key Scenarios
- Using a DbDataReader to Retrieve Multiple Rows
- Using a DataSet to Retrieve Multiple Rows
- Executing a Command and Accessing Output Parameters
- Executing a Command and Accessing a Single Item Result
- Performing Multiple Updates Within a Transaction
- Using a DataSet to Update a Database
- Retrieving Multiple Rows as XML
- Retrieving Data as Objects
- Performing Asynchronous Data Access
- Design of the Data Access Application Block
- Extending and Modifying the Data Access Application Block
- Deployment and Operations
-
The Exception Handling Application Block
- What Does the Exception Handling Application Block Do?
- When Should I Use the Exception Handling Application Block?
- Developing Applications Using the Exception Handling Application Block
- Key Scenarios
- Design of the Exception Handling Application Block
- Extending and Modifying the Exception Handling Application Block
- Deployment and Operations
-
The Logging Application Block
- What Does the Logging Block Do?
- When Should I Use the Logging Block?
-
Developing Applications Using the Logging Application Block
- Entering Configuration Information
- Using the Distributor Service
- Adding Application Code
-
Key Scenarios
- Logging to a Database
- Logging to Windows Event Log
- Logging to a Disk File
- Logging to Windows Message Queuing
- Logging to WMI
- Logging as E-mail Messages
- Populating and Raising Events from Code
- Populating a Log Message with Additional Context Information
- Tracing Activities and Propagating Context Information
- Checking Filter Status before Constructing Log Messages
- Design of the Logging Application Block
- Extending and Modifying the Logging Application Block
- Deployment and Operations
- The Policy Injection Application Block
- The Security Application Block
-
The Validation Application Block
- What Does the Validation Application Block Do?
- When Should I Use the Validation Application Block?
-
Developing Applications Using the Validation Application Block
- Entering Configuration Information
- Adding Application Code
-
Using the Validation Block Validators
- And Composite Validator
- Contains Characters Validator
- Date Time Range Validator
- Domain Validator
- Enum Conversion Validator
- Not Null Validator
- Object Collection Validator
- Object Validator
- Or Composite Validator
- Property Comparison Validator
- Range Validator
- Regular Expression Validator
- Relative Date Time Validator
- String Length Validator
- Type Conversion Validator
- Single Member Validators
- Understanding Common Validator Properties
- Understanding Validation Results
- How Validators Are Created
- Validation and Inheritance
- Key Scenarios
- Design of the Validation Application Block
- Extending and Modifying the Validation Application Block
- Deployment and Operations
-
Unity Dependency Injection and Interception
- What Is Unity?
- What Does Unity Do?
- When Should I Use Unity?
- About This Release of Unity
-
Configuring Unity
-
Design Time Configuration
- Using the Configuration Tool
- Using the Unity XSD to Enable Visual Studio IntelliSense
- Using Design-Time Configuration
- Specifying Types in the Configuration File
- The Unity Configuration Schema
- Specifying Values for Injection
- Extending the Unity Configuration Schema
- Configuration Files for Interception
- Run-Time Configuration
-
Design Time Configuration
- Using Unity in Applications
- Dependency Injection with Unity
- Interception with Unity
- Design of Unity
- Extending and Modifying Unity
- Deployment and Operations
- Unity QuickStarts