Home Page Icon
Home Page
Table of Contents for
Part III: Securing and Deploying Applications
Close
Part III: Securing and Deploying Applications
by Alessandro Del Sole
Microsoft® Visual Studio® LightSwitch® Unleashed
Title Page
Copyright Page
Contents at a Glance
Table of Contents
About the Author
Dedication
Acknowledgments
We Want to Hear from You!
Reader Services
Foreword
Part I: Building Applications with LightSwitch
Chapter 1. Introducing Visual Studio LightSwitch
Chapter 2. Exploring the IDE
Chapter 3. Building Data-Centric Applications
Chapter 4. Building More-Complex Applications with Relationships and Details Screens
Part II: Manipulating Data
Chapter 5. Customizing Data Validation
Chapter 6. Querying, Filtering, and Sorting Data
Chapter 7. Customizing Applications with Buttons, COM Automation, and Extensions
Chapter 8. Aggregating Data from Different Data Sources
Part III: Securing and Deploying Applications
Chapter 9. Implementing Authentication and Authorization
Chapter 10. Deploying LightSwitch Applications
Part IV: Advanced LightSwitch
Chapter 11. Handling Events in Code
Chapter 12. Dissecting a LightSwitch Application
Chapter 13. Advanced LightSwitch with Visual Studio 2010
Chapter 14. Debugging LightSwitch Applications
Part V: Extensibility
Chapter 15. Customizing the IDE
Chapter 16. Customizing Applications with Custom Controls
Chapter 17. Implementing Printing and Reporting
Chapter 18. LightSwitch Extensibility: Themes, Shells, Controls, and Screens
Chapter 19. LightSwitch Extensibility: Data and Extension Deployment
Appendixes
Appendixe A. Installing and Configuring Visual Studio LightSwitch
Appendixe B. Useful Resources
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Chapter 8. Aggregating Data from Different Data Sources
Next
Next Chapter
Chapter 9. Implementing Authentication and Authorization
Part III: Securing and Deploying Applications
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset