COM+ Programming with Visual Basic

COM+ Programming with Visual Basic pdf epub mobi txt 电子书 下载 2025

出版者:Oreilly & Associates Inc
作者:Mojica, Jose
出品人:
页数:348
译者:
出版时间:2001-6
价格:$ 39.49
装帧:Pap
isbn号码:9781565928404
丛书系列:
图书标签:
  •  
想要找书就要到 图书目录大全
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

The Visual Basic programming environment is designed to hide as many low-level system details as possible. While this approach can speed development time by allowing the developer to focus on the task at hand, it actually hinders the process when it obscures details the developer needs to understand or control. Such is often the case for programmers who are developing components that take advantage of COM+ services. "COM+ Programming with Visual Basic" addresses the information needs of these developers. For instance, despite the marketing hype about COM+ as the new and improved version of COM, classic COM is very much the foundation on which COM+ is built: COM+ components are a particular kind of COM component. Visual Basic hides almost all COM implementation details; yet it is precisely in the area of COM+ programming that these hidden details are most important. Therefore, the text devotes significant content to exploring COM internals: interface-based programming; how COM interfaces work internally; how COM components are activated; and how versioning COM components works in Visual Basic. The second section focuses on incorporating individual COM+ services, like transaction support, security, and asynchronous operations, into applications. The author concludes by discussing what developers need to learn to transition to Microsoft's coming .NET framework. Regardless of what lies ahead for .NET, many distributed systems are being built today with COM+. COM+ Programming with Visual Basic focuses on topics relevant to distributed applications that are here to stay: how to use interfaces; passing objects by reference or by value; what it means to have multithreaded applications; how declarative programming works; how to program within a distributed transaction; and how to add role-based security to applications.

具体描述

读后感

评分

评分

评分

评分

评分

用户评价

评分

评分

评分

评分

评分

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有