- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Microsoft(r) .Net: Architecting Applications for the Enterpriseby Dino Esposito
Synopses & Reviews
Welcome to the era of software reuse! Microsoft Enterprise Library helps accelerate development by providing reusable components and guidance on proven practices. If you build applications that run on the Microsoft .NET Framework, whether they are enterprise-level business applications or even relatively modest Windows® Forms, Windows Presentation Foundation (WPF), Windows Communication Foundation (WCF), or ASP.NET applications, you can benefit from using Enterprise Library. This guide helps you to quickly grasp what Enterprise Library can do for you, presents examples, and makes it easier for you to start experimenting with Enterprise Library. Enterprise Library is made up of a series of application blocks, each aimed at managing specific cross-cutting concerns.
The guide will walk you through the most common usage scenarios for each of the functional application blocks, including:
“You are holding in your hands a book that will make your life as an enterprise developer a whole lot easier.” Scott Guthrie Corporate Vice-President, Microsoft .NET Developer Platform
Book News Annotation:
This guide covers software design principles and techniques. The first part of the book focuses on the role and responsibilities of the software architect, especially design of the system and communicating that design to the development team. The second part of the book examines the layers that form a typical enterprise system: the presentation layer, the business layer, and the data access layer. This section uses nonacademic language to discuss design patterns for the various layers, and summarizes the new wave of tools that have become a common presence in software projects, such as O/R mappers and dependency injection containers. Patterns, principles, and techniques described are valid in general and are not specific to particular line- of-business applications. The book is primarily targeted at software architects and lead developers, but will be of interest to developers of any type of .NET applications. Strong object-oriented programming skills and knowledge of the .NET platform and data access techniques are assumed. The authors are ASP.NET consultants. Annotation ©2009 Book News, Inc., Portland, OR (booknews.com)
Make the right architectural decisions up front—and improve the quality and reliability of your results. Led by two enterprise programming experts, youll learn how to apply the patterns and techniques that help control project complexity—and make systems easier to build, support, and upgrade—right from the start.
Get pragmatic architectural guidance on how to:
Build testability, maintainability, and security into your system early in the design Expose business logic through a service-oriented interface Choose the best pattern for organizing business logic and behavior Review and apply the patterns for separating the UI and presentation logic Delve deep into the patterns and practices for the data access layer Tackle the impedance mismatch between objects and data Minimize development effort and avoid over-engineering—and deliver more robust results
Get code samples on the Web.
The Microsoft Enterprise Library is a collection of reusable software components (application blocks) designed to assist software developers with common enterprise development cross-cutting concerns (such as logging, validation, data access, exception handling, and many others). This book is designed to help developers on teams that have chosen to adopt Enterprise Library get up to speed quickly.
About the Author
Alex Homer, well known author of many ASP.NET titles for Wrox press and others.
Table of Contents
PrefaceThe Team Who Brought You this GuideChapter 1: Welcome to the LibraryChapter 2: Much ADO about Data AccessChapter 3: Error Management Made Exceptionally EasyChapter 4: As Easy As Falling Off a LogChapter 5: A Cache Advance for Your ApplicationsChapter 6: Banishing Validation ComplicationChapter 7: Relieving Cryptography ComplexityChapter 8: An Authentic Approach to Token IdentityDependency Injection with UnityDependency Injection in Enterprise LibraryPolicy Injection in Enterprise LibraryEnterprise Library Configuration ScenariosEncrypting Configuration Files
What Our Readers Are Saying
Computers and Internet » Computers Reference » General