Latest XML Articles

Linq-To-XML Style of Node Creation for C++

This article discusses the new C++ Elmax XML Library feature to implement Linq-To-XML node creation to write XML files. Linq-To-XML node creation is the natural way to create nodes with code that is structurally identical to resultant XML.

Code: XML Serializer

Serialize and deserialize XML files and XML buffer with this set of macros and classes. The serializer uses ATL String and ATL collections. Get the object representations of XML files and a means to store and load objects to and from XML.

Libxml2: Everything You Need in an XML Library

Got XML files? Look no further than libxml2, which gives you both DOM and SAX model XML parsing in a single freeware library that works with most common languages in all popular platforms including Linux and Win32/Win64.

Creating Custom WPF Controls

Custom controls assist developers in maximizing code reuse and minimizing headaches. Learn the process of creating custom controls within Microsoft's latest UI model, the Windows Presentation Foundation (WPF).

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • It's time high-level executives and IT compliance officers recognize and acknowledge the danger of malicious insiders, an increased attack surface and the potential for breaches caused by employee error or negligence. See why there is extra emphasis on insider threats.

  • Given today's threat environment and the increasing connectivity of digital infrastructures, security teams now realize that they must assume their IT environments are subject to periodic compromise. Gone are the days when preventive measures to secure the perimeter or trying to detect malware problems using signature-match technologies were enough. New practices based on an understanding of the phases of an attack, continuous threat monitoring, and rapid attack detection and remediation are necessary. This …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds