Flylib.com
Programming Microsoft Outlook and Microsoft Exchange, Second Edition (DV-MPS Programming)
Programming Microsoft Outlook and Microsoft Exchange, Second Edition (DV-MPS Programming)
ISBN: 0735610193
EAN: 2147483647
Year: 1999
Pages: 101
Authors:
Microsoft Press
,
Thomas Rizzo
BUY ON AMAZON
Cover
LOC Page
Acknowledgments
Dedication
Chapter 1 -- A Broader Definition Of Collaboration
Tools for Building Collaborative Systems
Examples of Collaborative Solutions
Chapter 2 -- Collaborative Features of Microsoft Outlook
E-mail
Information Management
Chapter 3 -- Exchange Server as a Platform for Collaboration
Robust Messaging Infrastructure
Industrial-Strength Object Database
Exchange Server Directory
Public Folders
Integrated, Internet Standards-Based Security
Multitiered, Replicated, Secure Forms Library
Built-In Information Management Tools
Connectivity and Migration Tools
Client Options
Choosing a Client
Chapter 4 -- Folders, Fields, and Views
Folders
Fields
Views
Chapter 5 -- Forms
Outlook Form Types
How Forms Work
Designing Forms
Using Controls
Form Properties
Testing Forms
Publishing Forms
Enhancing Forms
Chapter 6 -- Programming Outlook with VBScript
The Outlook Script Editor
VBScript Fundamentals
The Script Debugger
Working with Outlook Objects
Outlook Events
Other Common Tasks in Outlook Development
Chapter 7 -- Putting It All Together: The Account Tracking Application
Overview of the Account Tracking Application
Setting Up the Application
Techniques Employed by the Account Tracking Application
Outlook Today and the Account Tracking Application
Chapter 8 -- Outlook and the Web
Outlook Today
Active Server Pages
Outlook Web Access
The Outlook HTML Form Converter
Chapter 9 -- Outlook 2000 Development Features
Office 2000 COM Add-Ins
Outlook 2000 Object Model
VBA Support in Outlook 2000
Chapter 10 -- Outlook 2000 in Action: Enhancements to the Account Tracking Application
Folder Home Pages
The Outlook View Control
The Account Tracking COM Add-In
Chapter 11 -- Collaboration Data Objects
What Is CDO?
Overview of the CDO Library
Background for Four Sample Applications That Use CDO
Helpdesk Application
Calendar of Events Application
Intranet News Application
CDO Visual Basic Application
CDO Tips and Pitfalls
Chapter 12 -- The Event Scripting Agent
Architecture of the Exchange Event Service
Event Service Cautions
Setting Up the Event Service
Registry Settings for Script Authors
Writing Agents by Using Scripts
Error Trapping and Logging
Expense Report Application
Programmatically Binding Agents
Agent Install Application
Exchange Event Scripting Agent Servers
Running the Script Engine in MTS
Chapter 13 -- Exchange Server Routing Objects
Exchange Server Routing
Expense Routing Application
Routing Object Library
Updated Agent Install Application
Chapter 14 -- Programming Exchange Server Using ADSI
What Is ADSI?
Accessing the Directory: CDO or ADSI?
Design Goals of the ADSI Object Library
ADSI Object Library Architecture
Exchange Server Schema
Creating Paths to Exchange Server Objects and Attributes
ADSI Application
Getting Help with ADSI
Chapter 15 -- Enhancing Your Exchange Server Applications with COM Components
AcctCrt Component
Rules Component
ACL Component
Project Application
About the Author
Programming Microsoft Outlook and Microsoft Exchange, Second Edition (DV-MPS Programming)
ISBN: 0735610193
EAN: 2147483647
Year: 1999
Pages: 101
Authors:
Microsoft Press
,
Thomas Rizzo
BUY ON AMAZON
Java I/O
The read( ) Method
Resolving Classes
Sealed Objects
Buffered Readers and Writers
Files
Inside Network Security Assessment: Guarding Your IT Infrastructure
Understanding the IT Security Process
Who Are the Attackers?
Security Incident Response Team (SIRT)
Recommendations
Appendix E. SIRT Team Report Format Template
Java How to Program (6th Edition) (How to Program (Deitel))
for Repetition Statement
Arrays
Constructors in Subclasses
Multiple-Selection Lists
JTabbedPane
InDesign Type: Professional Typography with Adobe InDesign CS2
Text Flow
Discretionary Hyphens and Nonbreaking Hyphens
Up Next
Text Wraps: The Good, the Bad, and the Ugly
Sheared Type
Comparing, Designing, and Deploying VPNs
Configuring and Verifying L2TPv3 Pseudowires
Deploying AToM Pseudowires
Summary
Benefits and Drawbacks of L2TP Remote Access VPNs
Integrating L2TP Remote Access VPNs with MPLS VPNs
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Oracle and PL/SQL
Triggers
Defeating Virtual Private Databases
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies