Organizations everywhere are discovering that Microsoft Excel is a powerful development tool--and now features important Intranet and Internet capabilities. That's why the third edition of this classic is the one-volume reference for application programmers who want fast, easy ways to produce custom business information solutions.
WRITE BULLETPROOF VBA CODE FOR ANY SITUATION This book is the essential resource for developers working withany of the more than 300 products that employ the Visual Basic forApplications programming language. Written by recognized VBAexperts, it provides detailed coverage of a wide range of specificVBA programming challenges. Its careful, step-by-step instructionsand thousands of lines of code offer answers, while teaching you todevise new and creative solutions. The instruction applies equallyto all VBA environments, whether you are building standaloneapplications or customizing commercial products using theirbuilt-in VBA programmability. Coverage Includes Manipulating text, numbers, and dates Using automation to control other applications Creating objects using VBA class modules Using standard search and sort algorithms from within VBA Creating standard dynamic data structures, including linkedlists, binary trees, stacks, and queues Working with Windows system information, including memorystatus, screen info, mouse, keyboard, and power status Working with Windows Registry data Retrieving and setting Windows networking information Working with the Windows file system, iterating throughfolders, creating and deleting files Adding sound and movies to VBA apps using Windows multimediaextensions Tapping the system capabilities provided by the WindowsScripting Runtime library Writing add-ins for the Visual Basic environment Note: CD-ROM/DVD and other supplementary materials arenot included as part of eBook file.
This guide covers the upgraded features of Access 97, including Internet connections, Visual Basic for Applications (VBA) imnprovements, object linking and embedding (OLE) secrets, and error and debugging tools. The CD contains all examples from the book, including databases; reusable code; and subroutines and user-interface objects. Also included are freeware and shareware utilities, as well as demonstration versions of third-party utilities.
Exploit powerfully enhanced programmability in Office XP with authoritative information -- straight from the Microsoft Office development team. This hardcore programming reference comes packed with practical, roll-up-your-sleeves resources to help you maximize your productivity with development tools for Microsoft Office, including the Microsoft Visual Basic "RM" 6.0 and Microsoft Visual C++ "RM" development systems. This guide includes coverage of Workflow Solutions for Microsoft SQL Server "TM" and Microsoft Exchange, offering both design and coding examples, plus API-level coding examples. It also covers enhanced support in Microsoft Office XP for Web-enabled information sharing and XML. Use this incisive coverage to build on what you know and to accomplish everything from automating individual tasks to creating complex vertical-market applications. Each chapter presents dozens of code examples that illustrate the discussion. And the companion CD-ROM contains hundreds of procedures you can use right now -- helping you to focus your creativity on designing solutions, rather than on building rudimentary code. It's everything you need to create better business solutions, faster!
PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.
Learn how to create elegant user interfaces and develop fast, user-friendly applications for your stand-alone version of Access while reaping the benefits of new capabilities. The CD-ROM contains the book's sample databases, reusable forms, and freeware and shareware utilities.
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. - The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 - Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more
Aimed at knowledgeable professionals, this guide is geared toward developers whose job is to maintain a business' fundamental applications using Office 2000. The CD-ROM contains third-party controls and development tools, along with the full source code of the many applications featured in the book.
nced consultant Christine Solomon shows users how to automate and reengineer a wide assortment of businesses on the powerful Microsoft Office 97 platform. The CD-ROM contains source code and files for creating sample applications.
The foundation of a successful information systems strategic plan is the recognition that business direction and requirements must drive the IS strategy and computing architecture. A Practical Guide to Information Systems Strategic Planning, Second Edition outlines a systematic approach to guide you through the development of an effective IS plan t