Articles Written by Anand Narayanaswamy

Manipulate XML File Data Using C#

Learn how to display, add, edit, and delete data from a single XML file by using C# console applications. With a little effort, you can implement these techniques in Windows-based applications.

ASP.NET 2.0 Moves User Authentication One Step Forward

ASP.NET 2.0 provides new classes, methods, and controls that make implementing authentication easy. Learn how to apply the authentication functionalities of the Membership class and its methods into ASP.NET applications.

Longhorn Coming Attractions - Part 2

Explore some interesting features in the Longhorn operating system and learn some of the facts that you have to know when working with the current build.

Longhorn Coming Attractions - Part 1

Get a sneak peek at some of the cool and interesting features in the latest Longhorn build from Microsoft.

Two Quick Ways to Perform ASP.NET Authentication

By applying ASP.NET programming logic, you can store user data in either XML files or a Web configuration file and then validate users by using those files. Learn how to apply both of these simple methods of authentication.

Top White Papers and Webcasts

  • Featuring Art Schoeller, VP and Principal Analyst, at Forrester Research Live Event Date: November 9, 2016 @ 10 AM PT / 1 PM ET Being "proactive" with your customers is not enough to survive in the market today. The truth is, organizations that understand how to engage customers on their preferred channels will create contextual, and relevant experiences for customers. Plus, they will see the financial impact of nurturing long-term customer loyalty. Join our guest speaker Art Schoeller, VP and Principal …

  • Protect Your Business against Today's Rapidly Growing Threats Your business, employees, partners, and customers are depending more and more on network connectivity, and protecting data and infrastructure has moved to the top of the IT agenda. You can't arm yourself against today's rapidly increasing threats unless you understand how they work. Read this ebook to learn more about the top 10 DNS attacks that can target your external and internal DNS infrastructure, the impact they can have on the DNS server …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date