
Programming Microsft Windows 2000 Unleashed
by Williams, MickeyRent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
Introduction | p. 1 |
Windows 2000 Core Technologies | p. 5 |
Windows DNA Overview | p. 7 |
History of Windows and Windows NT | p. 8 |
Windows DNA in Detail | p. 9 |
The Architecture of Windows DNA | p. 11 |
Summary | p. 24 |
Virtual Memory and Memory Management | p. 25 |
Using Virtual Memory | p. 26 |
Deciding When to Use Virtual Memory | p. 29 |
Looking at an Example That Uses Virtual Memory | p. 36 |
Using Windows 2000 Heap Functions | p. 45 |
Summary | p. 54 |
Threads and Processes | p. 55 |
Processes and Threads | p. 56 |
Managing Processes | p. 58 |
Managing Threads | p. 62 |
Synchronization | p. 77 |
Semaphores | p. 93 |
Using Semaphores and Critical Sections in an Application | p. 97 |
Using Job Objects | p. 103 |
Summary | p. 110 |
Files | p. 111 |
Using Windows 2000 Files Systems | p. 112 |
Performing General File Operations | p. 112 |
Searching for Files | p. 124 |
Performing Other File Operations | p. 131 |
Using Asynchronous Input and Output | p. 134 |
Taking Advantage of the Encrypted File System | p. 148 |
Using File-Notification Functions | p. 152 |
Summary | p. 157 |
Structured Exception Handling | p. 159 |
Looking at the Exception-handling Basics | p. 160 |
Understanding How SEH Works | p. 161 |
Using Termination Handlers | p. 162 |
Using Exception Handlers | p. 166 |
C++ Exception Handling | p. 172 |
Integrating Win32 SEH with C++ Exception Handling | p. 179 |
Summary | p. 181 |
Dynamic Link Libraries | p. 183 |
Understanding Libraries | p. 184 |
Creating and Using Dynamic Link Libraries | p. 187 |
Using Generic Thunks | p. 214 |
Summary | p. 227 |
Distributed Security | p. 229 |
Windows 2000 Security Overview | p. 230 |
Fundamental Security Data Structures | p. 231 |
Trustee-based Access Control | p. 249 |
Impersonating a Client | p. 261 |
Summary | p. 262 |
Windows 2000 Debugging | p. 263 |
Windows Debugging Strategies | p. 264 |
Making Your Code More Easily Debuggable | p. 265 |
Windows 2000 Debugging Overview | p. 266 |
Using the Visual C++ Integrated Debugger | p. 270 |
Using WINDBG, the Windows Debugger | p. 277 |
Using SoftIce to Debug Programs | p. 278 |
Using Dr. Watson to Find the Cause of Crashes | p. 279 |
Using BugTrapper to Find the Cause of Crashes | p. 282 |
Sources for Third-party Tools | p. 282 |
Summary | p. 283 |
Writing Windows 2000 Services | p. 285 |
Understanding Services | p. 286 |
Programming a Windows 2000 Service | p. 290 |
An Example of a Windows 2000 Service | p. 304 |
Summary | p. 316 |
Controlling Windows 2000 Services | p. 317 |
Writing Service Control Programs | p. 318 |
Writing Control Panel Applets | p. 327 |
Summary | p. 339 |
User Interaction/Desktop | p. 341 |
Advanced Graphical Device Interface Programming | p. 343 |
GDI Basics | p. 344 |
Device Contexts | p. 345 |
Bitmaps | p. 348 |
The DIB Example | p. 356 |
Paths | p. 370 |
Metafiles | p. 373 |
A Metafile Example | p. 374 |
Summary | p. 379 |
Owner Draw and Custom Draw | p. 381 |
Using Owner-drawn Controls | p. 382 |
Implementing an Owner-drawn Control | p. 383 |
OwnDraw: An Owner Draw Example | p. 387 |
Using Custom Draw | p. 392 |
Summary | p. 405 |
COM and ActiveX | p. 407 |
COM and OLE Concepts | p. 409 |
Looking at an Overview of COM and OLE | p. 410 |
Examining Commonly Used COM and OLE Technologies | p. 410 |
Programming with COM and OLE | p. 415 |
Looking at an Example of a COM Component | p. 427 |
Summary | p. 443 |
Automation | p. 445 |
Creating Programmable Applications Using Automation | p. 446 |
The IDispatch Interface | p. 447 |
Creating an Automation Server Using MFC | p. 456 |
Using Visual Basic to Create an Automation Controller | p. 466 |
Using Automation in VBScript | p. 469 |
Summary | p. 471 |
OLE Drag and Drop | p. 473 |
Understanding the OLE Clipboard | p. 474 |
Using OLE Drag and Drop | p. 481 |
Looking at a Drag-and-Drop Example | p. 483 |
Summary | p. 493 |
COM Threading Models | p. 495 |
COM Threading Alternatives | p. 496 |
Choosing Between the STA and MTA | p. 503 |
Marshalling Between COM Apartments | p. 512 |
Summary | p. 520 |
Custom COM Objects | p. 521 |
Using IDL | p. 522 |
Creating Custom Components Using ATL | p. 531 |
Using Monikers | p. 549 |
Connection Points | p. 554 |
Custom Marshaling | p. 557 |
Summary | p. 570 |
Developing ActiveX Controls | p. 571 |
What Is an ActiveX Control? | p. 572 |
ActiveX Control Interfaces | p. 573 |
ActiveX Control Properties, Events, and Methods | p. 574 |
An ActiveX Control Example | p. 575 |
Testing an ActiveX Control | p. 582 |
Creating ActiveX Controls with ATL | p. 585 |
An ActiveX Control Built with ATL | p. 594 |
Summary | p. 617 |
Asynchronous COM | p. 619 |
Synchronous and Asynchronous Methods in COM | p. 620 |
Asynchronous Method Support in Windows 2000 | p. 621 |
An Asynchronous COM Example | p. 631 |
Summary | p. 641 |
DCOM | p. 643 |
Location Transparency | p. 644 |
Security in DCOM | p. 651 |
Using the DCOM Configuration Utility | p. 676 |
Summary | p. 678 |
COM+ | p. 679 |
An Introduction to COM+ Services | p. 681 |
Introducing Transactions | p. 682 |
Understanding Transactions Within COM+ | p. 688 |
Building a Transactionable COM+ Component | p. 692 |
Summary | p. 725 |
Building Components for COM+ Services | p. 727 |
A Good Component Service Component | p. 728 |
Writing Transactional Components | p. 734 |
Using COM Compiler Support | p. 749 |
Working with Multiple COM+ Objects | p. 757 |
Summary | p. 764 |
Using COM+ with the IIS | p. 765 |
Basis of a Web Application | p. 766 |
Building a Web Application | p. 774 |
Implementing the Theory | p. 778 |
Component Development | p. 809 |
Transacted ASP Pages | p. 817 |
Summary | p. 819 |
Using the COM+ In-Memory Database | p. 821 |
In-Memory Database (IMDB) | p. 822 |
A Simple Example | p. 827 |
Some Details on IMDB | p. 830 |
Summary | p. 840 |
Advanced COM+ Services | p. 841 |
Scalability Through Object Pooling and Load Balancing | p. 842 |
Some Advanced Transaction Concepts | p. 846 |
Queued Components | p. 854 |
Distributing Information Asynchronously | p. 859 |
Summary | p. 878 |
Distributed Windows 2000 Services | p. 879 |
Pipes | p. 881 |
Examining Pipe Types | p. 882 |
Using Anonymous Pipes | p. 882 |
Using Named Pipes | p. 890 |
Summary | p. 903 |
Active Directory | p. 905 |
An Overview of Active Directory | p. 906 |
Using ADSI to Manage Active Directory | p. 909 |
Additional Resources | p. 927 |
Summary | p. 927 |
Using MSMQ | p. 929 |
An Introduction to the Microsoft Message Queue Server | p. 930 |
MSMQ Object Properties | p. 933 |
Using a Message Queue with the Win32 API | p. 939 |
A Message Queue Client Written in Visual Basic | p. 958 |
Summary | p. 962 |
Cluster Server | p. 963 |
Microsoft Cluster Server Architecture | p. 964 |
Using Clustering APIs | p. 969 |
A Cluster-aware Example | p. 983 |
Summary | p. 988 |
Index | p. 989 |
Table of Contents provided by Syndetics. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.