Introduction
In the previous
part of this book, you installed Visual Studio .NET and used it to create
a simple, one-page application called the Clock Project. This acquainted
you with the look and feel of the Visual Studio environment and provided
you practice in the mechanics of building and editing an application.
Now it is time to look further under the hood of ASP.NET.
Perhaps the greatest architectural advantage of ASP.NET
is the code-behind page that enables you to separate your computer programming
from the Web page through which the user interacts with an application.
In this part of the book, you will learn how to work with a wizard called
the Code Designer. Automatically, the Code Designer will connect your
page to the hierarchy of objects in the .NET class libraries. Through
a principle of object-oriented programming called inheritance, your page
will become heir to thousands of pre-programmed objects, methods, and
components that you can use in creating applications. Through the ADO.NET
class library, for example, you will be able to connect your page to a
database and execute queries that can retrieve, insert, update, and delete
records.
The topic of the Web site that you will create is Top
Secret. Its purpose is to provide access only to users whom you choose
to provide with user names and passwords. Therefore, the Top Secret Project
begins in Chapter 24 by stepping you through the process of creating a
database that contains the names and passwords of the users who are permitted
access to your site.
In stages,
you will use structured programming design concepts to create controls
that add functionality to your Top Secret Web site. In Chapter 25, for
example, you will learn how to drag-and-drop a listbox onto the design
surface of a Web page and use ADO.NET commands on a code-behind page to
populate the list box with the names of your top secret users. In Chapter
26, you will add to this page controls for adding new users to the database.
Chapter 27 will teach you how to modify the records of existing users,
and Chapter 28 will step you through the creation of a Delete button you
can use to remove users you no longer want accessing your top secret stuff.
In Chapters 29 through 31, you will learn how to log users in and out
of your site, deny access to unauthorized users, and allow only administrators
to modify the database. Then your site will be truly top secret.
|