ASP.NET 3.5 for Dummies
First, you’ll get an introduction to all the tools and terminology you need to understand ASP.NET. If you’ve used earlier versions of ASP.NET and Visual Web Developer, you can probably skip that part and jump right into what’s new in 3.5. You'll make friends with LINQ and SQL, create sites in Visual Web Developer 2008 Express, and much more. Before you know it, you’ll discover how to:
- Integrate data, track shopping cart contents, and whisk away bugs
- Create user interfaces with easy navigation
- Use the ListView control for sophisticated formatting
- Write LINQ queries
- Add a table to a database
- Create an event handler
- Take advantage of the drag 'n' drop feature that lets you write less code
- Put all the features to work to develop dynamic Web applications
The softball team is going to love that Web site, and your customers might enjoy shopping on your site so much that you’ll have to expand your business to fill all the orders! We can’t promise that, of course, but we’re pretty sure that ASP.NET 3.5 For Dummies will make creating Web sites easier and a lot more fun.
Table of Contents
Part I: Getting to Know ASP.NET and Visual Web Developer.
Chapter 1: Understanding Microsoft’s Web Technologies.
Chapter 2: Getting Up and Running.
Chapter 3: Creating a Useful ASP.NET Site.
Chapter 4: Managing Data and Other CRUD.
Chapter 5: Handling User Input and Events.
Part II: Immersing Yourself in Data.
Chapter 6: Fetching and Presenting Data with SqlDataSource.
Chapter 7: LINQ as a Data Language.
Chapter 8: Using LINQ to SQL and the LinqDataSource.
Chapter 9: Creating and Consuming Diverse Data.
Part III: Enhancing the Interface and User Experience.
Chapter 10: Common Elements: Style Sheets, Master Pages, and Skins.
Chapter 11: Adding Navigation with TreeView, Menu, Breadcrumb, and SiteMap.
Chapter 12: Web Standards, Page Layout, and Usability.
Chapter 13: Designing the ListView and Other Templated Controls.
Chapter 14: Dynamic Effects, Images, and Rollovers.
Chapter 15: Enhancing Pages with the AJAX Control Toolkit.
Chapter 16: Creating and Displaying Rich Content.
Part IV: Tracking Users, Controlling Access, and Implementing Security.
Chapter 17: Site Security Using Authentication and Membership.
Chapter 18: Creating a Shopping Cart with Profiles.
Chapter 19: Validation in Depth.
Part V: Getting the Bugs Out and Handling Runtime Errors.
Chapter 20: Debugging and Tracing Pages.
Chapter 21: Avoiding Crashes by Handling Exceptions.
Chapter 22: Ten Tips on Deploying Your Web Application.
Chapter 23: Ten Tips to Success with ASP.NET.
Sign up now »
- FTR&D EngineerSA
- FTTechnical Business AnalystNSW
- FTSenior Python DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTOS Web Applications DeveloperNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTQuality ManagerSA
- FTLead Software EngineerSA
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Malware roundup: Tiffany's, Tibetans, iOs are targeted
- Schnucks wants federal court to handle data breach lawsuit
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- CITRIX SYNERGY ’13: Qureshi addresses the trend of ‘mojility’
- CITRIX SYNERGY ’13: IT needs to be empowered, says Sallam
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia