Introduction

In the previous part of this book, you installed Visual Studio .NET and used it to create a simple, one-page application called the Clock Project. This acquainted you with the look and feel of the Visual Studio environment and provided you practice in the mechanics of building and editing an application. Now it is time to look further under the hood of ASP.NET.

Perhaps the greatest architectural advantage of ASP.NET is the code-behind page that enables you to separate your computer programming from the Web page through which the user interacts with an application. In this part of the book, you will learn how to work with a wizard called the Code Designer. Automatically, the Code Designer will connect your page to the hierarchy of objects in the .NET class libraries. Through a principle of object-oriented programming called inheritance, your page will become heir to thousands of pre-programmed objects, methods, and components that you can use in creating applications. Through the ADO.NET class library, for example, you will be able to connect your page to a database and execute queries that can retrieve, insert, update, and delete records.

The topic of the Web site that you will create is Top Secret. Its purpose is to provide access only to users whom you choose to provide with user names and passwords. Therefore, the Top Secret Project begins in Chapter 24 by stepping you through the process of creating a database that contains the names and passwords of the users who are permitted access to your site.

In stages, you will use structured programming design concepts to create controls that add functionality to your Top Secret Web site. In Chapter 25, for example, you will learn how to drag-and-drop a listbox onto the design surface of a Web page and use ADO.NET commands on a code-behind page to populate the list box with the names of your top secret users. In Chapter 26, you will add to this page controls for adding new users to the database. Chapter 27 will teach you how to modify the records of existing users, and Chapter 28 will step you through the creation of a Delete button you can use to remove users you no longer want accessing your top secret stuff. In Chapters 29 through 31, you will learn how to log users in and out of your site, deny access to unauthorized users, and allow only administrators to modify the database. Then your site will be truly top secret.




This page is part of the Advanced Web Design Web site.

Book Cover

FIND OUT MORE
about Advanced Web Design, the new book by Fred T. Hofstetter
published by Irwin/McGraw-Hill


Copyright © 2003 by the University of Delaware. All rights reserved.
Site design by Pat Sine.
Please send all comments to Pat Sine: sine@udel.edu