The Wayback Machine - https://web.archive.org/web/20140630113544/http://www.codeguru.com/csharp/.net/jscript/essamahmedonjscriptnet/

Latest Essam Ahmed on JScript .NET Articles

Planning for the Unexpected - JScript .NET and Exceptions

The .NET Class Library uses exceptions throughout to report errors or unexpected conditions; however, a lot of code isn't exception aware. This article explains what exceptions are, how to respond to exceptions, and several ways of creating your own exceptions.

Building JScript .NET Web Service and Clients

Walk through the creation of a Web Service and three types of client applications that use it: a Windows Forms based client, and Internet Explorer-based client, and an ASP.NET client application.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Services Made Easy

Discover how to easily create and add WIN32 Services in .NET. You’ll also discover the Topshelf toolkit.

Top White Papers and Webcasts

  • Gartner Research Vice President Ramon Krikken discusses some of the key trends and issues in mobile application security as well as recommendations for what you can do to protect your organization. Key issues he reviews include: What are the key trends in mobile application security? What is different about security in mobile applications vs. traditional enterprise web applications? Why do you think mobile application security is still an afterthought? What are the top mobile application security …

  • The continued high frequency of successful cyberattacks against today's enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. With a Zero Trust security model, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of location. This white paper discusses the need for a Zero Trust approach …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds