WPF in Action with Visual Studio 2008

Total Page:16

File Type:pdf, Size:1020Kb

WPF in Action with Visual Studio 2008 www.it-ebooks.info WPF in Action with Visual Studio 2008 www.it-ebooks.info www.it-ebooks.info WPF in Action with Visual Studio 2008 COVERS VISUAL STUDIO 2008 SP1 AND .NET 3.5 SP1 ARLEN FELDMAN MAXX DAYMON MANNING Greenwich (74° w. long.) www.it-ebooks.info For online information and ordering of this and other Manning books, please visit www.manning.com. The publisher offers discounts on this book when ordered in quantity. For more information, please contact: Special Sales Department Manning Publications Co. Sound View Court 3B Fax: (609) 877-8256 Greenwich, CT 06830 Email: [email protected] ©2009 by Manning Publications Co. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps. Recognizing the importance of preserving what has been written, it is Manning’s policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Recognizing also our responsibility to conserve the resources of our planet, Manning books are printed on paper that is at least 15% recycled and processed elemental chlorine-free Development Editor: Jeff Bleiel Manning Publications Co. Copyeditor: Andrea Kaucher Sound View Court 3B Typesetter: Dennis Dalinnik Greenwich, CT 06830 Cover designer: Leslie Haimes ISBN 1-933988-22-3 Printed in the United States of America 1 2 3 4 5 6 7 8 9 10 – MAL – 12 11 10 09 08 www.it-ebooks.info brief contents PART 1 PAST, PRESENT, AND FUTURE .........................................1 1 ■ The road to Avalon (WPF) 3 2 ■ Getting started with WPF and Visual Studio 2008 22 3 ■ WPF from 723 feet 41 PART 2 THE BASICS .................................................................63 4 ■ Working with layouts 65 5 ■ The Grid panel 94 6 ■ Resources, styles, control templates, and themes 119 7 ■ Events 147 8 ■ Oooh, shiny! 157 PART 3 APPLICATION DEVELOPMENT .....................................177 9 ■ Laying out a more complex application 179 10 ■ Commands 191 11 ■ Data binding with WPF 209 12 ■ Advanced data templates and binding 253 v www.it-ebooks.info vi BRIEF CONTENTS 13 ■ Custom controls 299 14 ■ Drawing 315 15 ■ Drawing in 3D 352 PART 4 THE LAST MILE...................................................................... 371 16 ■ Building a navigation application 373 17 ■ WPF and browsers: XBAP, ClickOnce, and Silverlight 390 18 ■ Printing, documents, and XPS 406 19 ■ Transition effects 427 20 ■ Interoperability 457 21 ■ Threading 474 www.it-ebooks.info contents preface xvii acknowledgments xix about this book xxi about the cover illustration xxv PART 1 PAST, PRESENT, AND FUTURE ...............................1 The road to Avalon (WPF) 3 1 1.1 The past and the present 4 Why Windows drawing is the way it is 5 ■ How we currently create Windows UIs 7 ■ Why the web is the way it is 9 ■ How UI is created on the web 10 1.2 Why Avalon/WPF 11 Taking advantage of modern hardware 12 ■ Using modern software design 13 ■ Separating presentation logic from presentation 14 ■ Making it simpler to code GUIs 15 1.3 Creating UI using WPF 16 Defining WPF UI with XAML 16 ■ Defining WPF UI through code 17 ■ Defining WPF UI with tools 18 ■ Who does the drawing 19 ■ Pixels versus vectors 19 1.4 Summary 20 vii www.it-ebooks.info viii CONTENTS Getting started with WPF and Visual Studio 2008 22 2 2.1 Your grandpa’s Hello, World! 23 Adding a button and button-handler to the window 25 Running Hello, World! 27 ■ The TextBlock control 27 2.2 The application definition 30 Defining application startup in XAML 30 Why define the application in XAML? 31 2.3 A tour of WPF in Visual Studio 2008 34 The XAML designer 35 ■ The Properties grid 38 Selection controls in Visual Studio 39 ■ The Document Outline 39 2.4 Summary 40 WPF from 723 feet 41 3 3.1 Where does WPF fit in Windows? 42 Red bits and green bits 42 ■ Silverlight 43 3.2 Framework services 44 Base services 44 ■ Media services 51 ■ User interface services 55 ■ Document services 56 3.3 Necessary and useful tools 58 Microsoft Expression family 59 ■ Visual Studio 60 Other tools 60 3.4 Summary 61 PART 2 THE BASICS .......................................................63 Working with layouts 65 4 4.1 The idea behind layout panels 66 4.2 The Canvas layout 68 Converting a Grid layout to a Canvas layout by modifying the XAML 69 ■ Adding a Canvas to an existing layout 69 Using attached properties 72 ■ Setting up a Canvas programmatically 73 4.3 The StackPanel layout 76 Adding scrolling support 80 ■ The Expander control 81 www.it-ebooks.info CONTENTS ix 4.4 The DockPanel layout 83 Defining a DockPanel in XAML 84 ■ Setting up a DockPanel programmatically 85 4.5 The WrapPanel layout 86 4.6 Other layout options 88 Specialized layout panels 89 ■ The FlowDocument 89 4.7 Summary 93 The Grid panel 94 5 5.1 Getting started with the Grid layout panel 95 Modifying the Grid 96 ■ Grid specific properties 100 5.2 Using the Grid layout to build a calculator UI 101 Planning the calculator 101 ■ Laying out the calculator 102 Tweaking appearance 104 5.3 The Grid and localization 107 5.4 UniformGrid 109 5.5 Making the calculator work 110 Handling operations 110 ■ Genericizing the handlers 114 5.6 Summary 117 Resources, styles, control templates, and themes 119 6 6.1 Resources 120 Using standalone resource dictionaries 122 ■ Using resources from code 124 ■ Dynamic resources 125 6.2 Styles 131 Styles based on other styles 133 ■ Implicitly applying styles 135 6.3 Control templates 136 Creating a control template 137 ■ ContentPresenters 137 Template binding 138 ■ Triggers 139 6.4 Themes 140 Using a specific theme 142 ■ Changing themes from code 145 6.5 Summary 146 Events 147 7 7.1 Routed events 148 Bubbling events 149 ■ Tunneling events 151 www.it-ebooks.info x CONTENTS 7.2 Events from code 154 handledEventsToo 155 ■ Class events 156 7.3 Summary 156 Oooh, shiny! 157 8 8.1 Glass buttons 158 Styling the text 162 ■ Adding glow when over buttons 162 Handling the button click 164 8.2 Adding some simple animation 165 Animating button glow 165 ■ Animating a color 168 8.3 Reflections 169 8.4 Transforms 173 8.5 Summary 174 PART 3 APPLICATION DEVELOPMENT ...........................177 Laying out a more complex application 179 9 9.1 Creating the Desktop Wiki Project 181 9.2 Nesting layouts 182 Preparing the layout for menus and toolbars 183 Adding menubars, statusbars, and toolbars… 184 9.3 Nested layouts 186 Adding the first Grid 187 ■ Adding the second Grid 188 Using a StackPanel and Expander as navigation aids 189 9.4 Summary 190 Commands 191 10 10.1 A brief history of commands 192 Windows Forms and simple event handlers 192 Son of MFC 193 10.2 The WPF approach 194 The Command pattern 194 ■ WPF commands 195 10.3 Using the built-in system commands 196 ApplicationCommands 197 ■ NavigationCommands 198 EditingCommands 198 ■ Component and media commands 200 www.it-ebooks.info CONTENTS xi 10.4 Handling commands 200 Handling a built-in command 200 ■ Creating a custom command 201 ■ Shortcuts and gestures 202 10.5 Command routing 203 10.6 A cleaner custom command implementation 204 Implementing a RoutedUICommand 204 ■ Adding a CommandBinding 206 10.7 Summary 208 Data binding with WPF 209 11 11.1 WPF data binding 210 11.2 ProcessMonitor: A simple binding example 212 Binding Data with XAML 212 ■ Binding in code 217 Binding notation and options 219 11.3 Binding to XML 223 Creating the CVE Viewer application 225 ■ Binding controls to XML 227 ■ XPath binding notation 228 ■ Path versus XPath 229 ■ Understanding and using DataContexts 230 Master-Detail Binding 233 11.4 Binding to ADO.NET database objects 234 Creating a bookmark utility 236 ■ Creating the simple DAL 236 Laying out the UI and creating data bindings 238 11.5 Binding to business objects 242 Creating a WikiPage business object 242 ObservableCollection 243 ■ Create a model façade 244 Wiring business objects to presentation objects 246 11.6 Binding to LINQ data 250 11.7 Summary 252 Advanced data templates and binding 253 12 12.1 Data converters 254 Formatting bound data with StringFormat 255 ■ A number to formatted string data converter 259 ■ Converter parameters 261 12.2 DataTriggers 263 12.3 CollectionViewSource 266 Sorting with CollectionViewSource 266 ■ Programatically sorting with CollectionViewSource 268 ■ Filtering with CollectionViewSource 270 www.it-ebooks.info xii CONTENTS 12.4 Conditional templates 273 A more involved template 273 ■ Conditionally using a template 275 ■ Templates based on type 277 12.5 Validators 278 The ExceptionValidationRule 278 ■ Custom ErrorTemplates 280 ■ Custom validation rules 282 12.6 Model-View-ViewModel 283 12.7 Advanced binding capabilities 285 Hierarchical binding 285 ■ MultiBinding 289 PriorityBinding 295 12.8 Summary 298 Custom controls 299 13 13.1 Composing new user controls 301 Building a LinkLabel control 301 Testing the LinkLabel UserControl 304 13.2 Building custom controls 306 Building a control library 307 ■ Create the new custom control 308 ■ Create the default template for the control 310 Testing the control 312 ■ Customizing a custom control with a template 313 13.3 Summary 314 Drawing 315 14 14.1 Drawing with Shapes 317 Shapes in XAML 317 ■ Stupid
Recommended publications
  • Crypto Ransomware Analysis and Detection Using
    CRYPTO RANSOMWARE ANALYSIS AND DETECTION USING PROCESS MONITOR by ASHWINI BALKRUSHNA KARDILE Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF TEXAS AT ARLINGTON December 2017 Copyright © by Ashwini Balkrushna Kardile 2017 All Rights Reserved ii Acknowledgements I would like to thank Dr. Ming for his timely guidance and motivation. His insights for this research were valuable. I would also like to thank my committee members Dr. David Levine and Dr. David Kung for taking out time from their schedule and attending my dissertation. I am grateful to John Podolanko; it would not have been possible without his help and support. Thank you, John, for helping me and foster my confidence. I would like to thank my colleagues for supporting me directly or indirectly. Last but not the least; I would like to thank my parents, my family and my friends for encouraging me and supporting me throughout my research. November 16, 2017 iii Abstract CRYPTO RANSOMWARE ANALYSIS AND DETECTION USING PROCESS MONITOR Ashwini Balkrushna Kardile, MS The University of Texas at Arlington, 2017 Supervising Professor: Jiang Ming Ransomware is a faster growing threat that encrypts user’s files and locks the computer and holds the key required to decrypt the files for ransom. Over the past few years, the impact of ransomware has increased exponentially. There have been several reported high profile ransomware attacks, such as CryptoLocker, CryptoWall, WannaCry, Petya and Bad Rabbit which have collectively cost individuals and companies well over a billion dollars according to FBI.
    [Show full text]
  • IJIRT | Volume 2 Issue 6 | ISSN: 2349-6002
    © November 2015 | IJIRT | Volume 2 Issue 6 | ISSN: 2349-6002 .Net Surbhi Bhardwaj Dronacharya College of Engineering Khentawas, Haryana INTRODUCTION as smartphones. Additionally, .NET Micro .NET Framework (pronounced dot net) is Framework is targeted at severely resource- a software framework developed by Microsoft that constrained devices. runs primarily on Microsoft Windows. It includes a large class library known as Framework Class Library (FCL) and provides language WHAT IS THE .NET FRAMEWORK? interoperability(each language can use code written The .NET Framework is a new and revolutionary in other languages) across several programming platform created by Microsoft for languages. Programs written for .NET Framework developingapplications. execute in a software environment (as contrasted to hardware environment), known as Common It is a platform for application developers. Language Runtime (CLR), an application virtual It is a Framework that supports Multiple machine that provides services such as Language and Cross language integration. security, memory management, and exception handling. FCL and CLR together constitute .NET IT has IDE (Integrated Development Framework. Environment). FCL provides user interface, data access, database Framework is a set of utilities or can say connectivity, cryptography, web building blocks of your application system. application development, numeric algorithms, .NET Framework provides GUI in a GUI and network communications. Programmers manner. produce software by combining their own source code with .NET Framework and other libraries. .NET is a platform independent but with .NET Framework is intended to be used by most new help of Mono Compilation System (MCS). applications created for the Windows platform. MCS is a middle level interface. Microsoft also produces an integrated development .NET Framework provides interoperability environment largely for .NET software called Visual between languages i.e.
    [Show full text]
  • Calendrical Calculations: Third Edition
    Notes and Errata for Calendrical Calculations: Third Edition Nachum Dershowitz and Edward M. Reingold Cambridge University Press, 2008 4:00am, July 24, 2013 Do I contradict myself ? Very well then I contradict myself. (I am large, I contain multitudes.) —Walt Whitman: Song of Myself All those complaints that they mutter about. are on account of many places I have corrected. The Creator knows that in most cases I was misled by following. others whom I will spare the embarrassment of mention. But even were I at fault, I do not claim that I reached my ultimate perfection from the outset, nor that I never erred. Just the opposite, I always retract anything the contrary of which becomes clear to me, whether in my writings or my nature. —Maimonides: Letter to his student Joseph ben Yehuda (circa 1190), Iggerot HaRambam, I. Shilat, Maaliyot, Maaleh Adumim, 1987, volume 1, page 295 [in Judeo-Arabic] Cuiusvis hominis est errare; nullius nisi insipientis in errore perseverare. [Any man can make a mistake; only a fool keeps making the same one.] —Attributed to Marcus Tullius Cicero If you find errors not given below or can suggest improvements to the book, please send us the details (email to [email protected] or hard copy to Edward M. Reingold, Department of Computer Science, Illinois Institute of Technology, 10 West 31st Street, Suite 236, Chicago, IL 60616-3729 U.S.A.). If you have occasion to refer to errors below in corresponding with the authors, please refer to the item by page and line numbers in the book, not by item number.
    [Show full text]
  • Code Review Guide
    CODE REVIEW GUIDE 3.0 RELEASE Project leaders: Mr. John Doe and Jane Doe Creative Commons (CC) Attribution Free Version at: https://www.owasp.org 1 2 F I 1 Forward - Eoin Keary Introduction How to use the Code Review Guide 7 8 10 2 Secure Code Review 11 Framework Specific Configuration: Jetty 16 2.1 Why does code have vulnerabilities? 12 Framework Specific Configuration: JBoss AS 17 2.2 What is secure code review? 13 Framework Specific Configuration: Oracle WebLogic 18 2.3 What is the difference between code review and secure code review? 13 Programmatic Configuration: JEE 18 2.4 Determining the scale of a secure source code review? 14 Microsoft IIS 20 2.5 We can’t hack ourselves secure 15 Framework Specific Configuration: Microsoft IIS 40 2.6 Coupling source code review and penetration testing 19 Programmatic Configuration: Microsoft IIS 43 2.7 Implicit advantages of code review to development practices 20 2.8 Technical aspects of secure code review 21 2.9 Code reviews and regulatory compliance 22 5 A1 3 Injection 51 Injection 52 Blind SQL Injection 53 Methodology 25 Parameterized SQL Queries 53 3.1 Factors to Consider when Developing a Code Review Process 25 Safe String Concatenation? 53 3.2 Integrating Code Reviews in the S-SDLC 26 Using Flexible Parameterized Statements 54 3.3 When to Code Review 27 PHP SQL Injection 55 3.4 Security Code Review for Agile and Waterfall Development 28 JAVA SQL Injection 56 3.5 A Risk Based Approach to Code Review 29 .NET Sql Injection 56 3.6 Code Review Preparation 31 Parameter collections 57 3.7 Code Review Discovery and Gathering the Information 32 3.8 Static Code Analysis 35 3.9 Application Threat Modeling 39 4.3.2.
    [Show full text]
  • Development Environment
    BLUESPAWN BLUESPAWN Dev Team Apr 28, 2021 CONTENTS 1 Our Mission 3 2 What is BLUESPAWN 5 3 Get Involved & Contribute to the project7 4 Why we made BLUESPAWN9 4.1 Contact Us................................................9 4.2 Sponsoring................................................9 4.3 Licensing.................................................9 4.4 Project Authors.............................................. 10 4.5 Publications............................................... 11 4.6 Hunts................................................... 11 4.7 Scan Mode................................................ 11 4.8 Mitigations................................................ 11 4.9 Reactions................................................. 11 4.10 Logging and Output........................................... 11 4.11 Agent7 Integration............................................ 11 4.12 Getting Started.............................................. 11 4.13 Examples of BLUESPWAN in Action.................................. 13 4.14 Using Mitigations............................................ 14 4.15 Getting Involved............................................. 18 4.16 Setting up your Development Environment............................... 18 4.17 Software Architecture Info........................................ 19 4.18 Project Roadmap............................................. 21 i ii BLUESPAWN CONTENTS 1 BLUESPAWN 2 CONTENTS CHAPTER ONE OUR MISSION BLUESPAWN helps blue teams monitor systems in real-time against active attackers by detecting
    [Show full text]
  • Portable Microsoft Visual Foxpro 9 SP2 Serial Key Keygen
    Portable Microsoft Visual FoxPro 9 SP2 Serial Key Keygen 1 / 4 Portable Microsoft Visual FoxPro 9 SP2 Serial Key Keygen 2 / 4 3 / 4 License · Commercial proprietary software. Website, msdn.microsoft.com/vfoxpro. Visual FoxPro is a discontinued Microsoft data-centric procedural programming language that ... As of March 2008, all xBase components of the VFP 9 SP2 (including Sedna) were ... CLR Profiler · ILAsm · Native Image Generator · XAMLPad .... Download Microsoft Visual FoxPro 9 SP1 Portable Edition . Download ... Visual FoxPro 9 Serial Number Keygen for All Versions. 9. 0. SP2.. Download Full Cracked Programs, license key, serial key, keygen, activator, ... Free download the full version of the Microsoft Visual FoxPro 9 Windows and Mac. ... 9 Portable, Microsoft Visual FoxPro 9 serial number, Microsoft Visual FoxPro 9 .... Download Microsoft Visual FoxPro 9 SP 2 Full. Here I provide two ... Portable and I include file . 2015 Free ... Visual FoxPro 9.0 SP2 provides the latest updates to Visual FoxPro. ... autodesk autocad 2010 keygens only x force 32bits rh.. ... cs5 extended serial number keygen photo dvd slideshow professional 8.23 serial ... canadian foreign policy adobe acrobat 9 standard updates microsoft money ... microsoft visual studio express 2012 for web publish website microsoft office ... illustrator cs5 portable indowebsteradobe illustrator cs6 portable indowebster .... Download Microsoft Visual FoxPro 9 SP 2 Full Intaller maupun Portable. ... serial number Visual FoxPro 9 SP2 Portable, keygen Visual FoxPro 9 SP2 Portable, .... Microsoft Visual FoxPro 9.0 Service Pack 2.0. Important! Selecting a language below will dynamically change the complete page content to that .... Microsoft Visual FoxPro all versions serial number and keygen, Microsoft Visual FoxPro serial number, Microsoft Visual FoxPro keygen, Microsoft Visual FoxPro crack, Microsoft Visual FoxPro activation key, ..
    [Show full text]
  • Appref-Ms Abuse for Code Execution & C2
    National Cybersecurity Assessment s and Technical Services Appref-ms Abuse for Code Execution & C2 William J. Burke IV Information Security Specialist Advanced Operations Table of Contents Background ..................................................................................................................................... 4 Initial Requirements .................................................................................................................................. 4 Process Summary ...................................................................................................................................... 4 Microsoft Applications Overview.................................................................................................... 5 Application Publishing Overview - Online & Offline Availability ............................................................... 5 Application Deployment Process .............................................................................................................. 7 Application Installation Process .............................................................................................................. 10 Appref-ms abuse for payload delivery .......................................................................................... 12 Pre-Deployment Requirements............................................................................................................... 12 Initial Access - Phishing via OLE Delivery................................................................................................
    [Show full text]
  • 1 Proyecto De Fin De Carrera Entorno De Monitorización De Sistemas
    Proyecto de fin de carrera Entorno de monitorización de sistemas informáticos embarcados mediante pantallas táctiles. Versión: 1.0 Creación: Diciembre 2010 Autor: Vicente García Adánez Tutor: Juan Llorens Morillo 1 Entorno de monitorización de sistemas informáticos embarcados mediante pantallas táctiles García Adánez, V. Esta página ha sido dejada en blanco intencionadamente. 2 Entorno de monitorización de sistemas informáticos embarcados mediante pantallas táctiles García Adánez, V. RESUMEN: Este proyecto ha sido realizado para ser presentado como proyecto de fin de carrera en colaboración con la empresa finlandesa Mobile Net Control (MNC de ahora en adelante) con sede en Mariehamn, capital de las islas Åland, provincia de Finlandia, gracias a la obtención de una beca Erasmus para el año 2010. MNC en una de sus áreas provee a sus clientes de ordenadores para sus barcos creando un sistema de comunicación en ellos. Además de mantenerlos funcionando correctamente se encarga de que la información y configuración en los equipos no se pierda y para ello realiza a través de internet copias de seguridad de sus archivos. Como utilidad para sus barcos ha creído conveniente desarrollar una aplicación software fácil e intuitiva desde la que se pueda monitorizar el estado de los ordenadores que pueda tener su barco. Ésta se encargará de comprobar que funcionan correctamente y en caso de que no lo hagan ayudará a solucionarlo. El objetivo de este proyecto es por tanto la realización de una aplicación para pantalla táctil que permita monitorizar el estado de diferentes componentes en un barco desde el lugar donde esté instalada. Su uso está destinado a la persona responsable de este cometido, que bien puede ser un capitán como cualquier otra persona del barco no relacionada con la informática.
    [Show full text]
  • Solution 6: Drag and Drop 169
    06_0132344815_ch06.qxd 10/16/07 11:41 AM Page 167 SolutionSolution 1: Drag and Drop 167 6 Drag and Drop The ultimate in user interactivity, drag and drop is taken for granted in desktop appli- cations but is a litmus test of sorts for web applications: If you can easily implement drag and drop with your web application framework, then you know you’ve got something special. Until now, drag and drop for web applications has, for the most part, been limited to specialized JavaScript frameworks such as Script.aculo.us and Rico.1 No more. With the advent of GWT, we have drag-and-drop capabilities in a Java-based web applica- tion framework. Although GWT does not explicitly support drag and drop (drag and drop is an anticipated feature in the future), it provides us with all the necessary ingre- dients to make our own drag-and-drop module. In this solution, we explore drag-and-drop implementation with GWT. We implement drag and drop in a module of its own so that you can easily incorporate drag and drop into your applications. Stuff You’re Going to Learn This solution explores the following aspects of GWT: • Implementing composite widgets with the Composite class (page 174) • Removing widgets from panels (page 169) • Changing cursors for widgets with CSS styles (page 200) • Implementing a GWT module (page 182) • Adding multiple listeners to a widget (page 186) • Using the AbsolutePanel class to place widgets by pixel location (page 211) • Capturing and releasing events for a specific widget (page 191) • Using an event preview to inhibit browser reactions to events (page 196) 1 See http://www.script.aculo.us and http://openrico.org for more information about Script.aculo.us and Rico, respectively.
    [Show full text]
  • Yohan J. Rodríguez Viveros
    Yohan J. Rodríguez Viveros Living in: Hermosillo, Sonora. México Email: [email protected] Blog: https://www.hasdid.com Skype: yohan.jasdid Profile 15 Years experience in software development. Use of multiple technologies and tools. Passionate about code and science. Book/Article writer and researcher. Always looking for interesting problems to solve. Full-Stack coder. Always learning technologies to contribute code in desktop/web applications, back-end, front-end, web/local/cloud services, Api’s and scientific computing Employment History Developer IV Tiempo Development Sep 2015 - Present | Hermosillo, Sonora Developer of a security company product. Development and maintenance of the system features, releases, policy deployment, support to customers, documentation and platform infrastructure. Main responsibil- ities include: Development and maintenance of the system features like Database support. Consists in the ability to scan database products of multiple types like Oracle, MS SQL Server, MySQL and DB2 to execute stan- dard security policies against those databases to discover and re-mediate security issues. Platforms support. Consists in the ability to scan multiple operating system like multiple versions of Windows, multiple types of Linux distributions, multiple types of Unix, OSx and embedded OS devices to execute standard policies and discover security issues. Standard security policies includes DISA, CIS and PCI security standards. Devices support. Consists in the ability to scan multiple types of industrial control systems
    [Show full text]
  • Multiband Plasma-Process Monitor C10346-01
    Multiband plasma-process monitor C10346-01 C10346-01 is a multiband plasma process monitor designed for real-time, monitoring of wide spectrum. Monitoring Plasma (Emission Spectrum) in Real-Time C10346-01 is a monitoring system to detect wide spectrum plasma emission during the process of etching, spattering and CVD in semiconductor manufacturing . With the various analysis functions, it can be used for setting up end-point detection conditions and automatic detection of etching and cleaning, estimation of plasma species and monitoring (plasma) contamination and abnormal discharges. Features Simultaneous measurements of wide (plasma) spectrum Easy measurement using optical fibers Captures wide spectrum (emission) from (plasma) radicals or ions. The equipped optical fiber can be easily attached to plasma C10346-01 : 200 nm to 950 nm chambers through a SMA connector widely used. Real-time plasma (emission) measurement Operation with multiple chambers Continuously measures up to 15 000 spectra at an interval of 20 ms A single analysis unit can control up to four C10346-01 (50 ms with concurrent running of detection software) Multiband plasma-process monitor via a USB 2.0 interface. Highly accurate and reliable measurements Data acquisition software A high resolution spectrometer and a ultra-high sensitive photo The data acquisition software stores the spectrum data into detector are firmly locked in position to assure the acquisition of the database during plasma process. This stored data can accurate spectrum and precise spectrum responsivity data then be used for spectrum data calculations. through sharply focused plasma emission spectrum images. Optional software High-sensitivity detection in UV spectrum region High sensitive endpoint detection and real-time monitoring of Detects the UV spectrum region from 200 nm with high process abnormality are achieved by creating ''detection model''.
    [Show full text]
  • Programming with Windows Forms
    A P P E N D I X A ■ ■ ■ Programming with Windows Forms Since the release of the .NET platform (circa 2001), the base class libraries have included a particular API named Windows Forms, represented primarily by the System.Windows.Forms.dll assembly. The Windows Forms toolkit provides the types necessary to build desktop graphical user interfaces (GUIs), create custom controls, manage resources (e.g., string tables and icons), and perform other desktop- centric programming tasks. In addition, a separate API named GDI+ (represented by the System.Drawing.dll assembly) provides additional types that allow programmers to generate 2D graphics, interact with networked printers, and manipulate image data. The Windows Forms (and GDI+) APIs remain alive and well within the .NET 4.0 platform, and they will exist within the base class library for quite some time (arguably forever). However, Microsoft has shipped a brand new GUI toolkit called Windows Presentation Foundation (WPF) since the release of .NET 3.0. As you saw in Chapters 27-31, WPF provides a massive amount of horsepower that you can use to build bleeding-edge user interfaces, and it has become the preferred desktop API for today’s .NET graphical user interfaces. The point of this appendix, however, is to provide a tour of the traditional Windows Forms API. One reason it is helpful to understand the original programming model: you can find many existing Windows Forms applications out there that will need to be maintained for some time to come. Also, many desktop GUIs simply might not require the horsepower offered by WPF.
    [Show full text]