[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Please explain: Aspect Oriented Programming

Posted on 2016-11-13
2
Medium Priority
?
128 Views
Last Modified: 2016-11-14
I will be using:
NetSqlAzMan - .NET SQL Authorization Manager

and have learned it supports:
Aspect Oriented Programming

Please explain
1) AOP
2) its relationship .NET SQL Authorization Manager

Please answer #1 then only answer #2 if you can
0
Comment
Question by:newbieweb
2 Comments
 
LVL 37

Accepted Solution

by:
Pawan Kumar earned 2000 total points
ID: 41885796
Can you explain what you are trying to achieve? If you could some code ?

AOP handles aspects as component frameworks. It uses aspect wrapper to insert our aspect methods into our classes at compile time.
C# come with an aspect wrapper. C# applies AOP by using a combination of classes, namespaces, and interfaces.

For more details please refer Microsoft URL below-

https://msdn.microsoft.com/en-us/library/aa288717(v=vs.71).aspx
https://msdn.microsoft.com/en-us/magazine/dn574804.aspx

NetSqlAzMan is an open Source project by the SourceForge.net community. NetSqlAzMan is .NET Sql Authorization Manager. Authorization Manager enables us to define
individual operations, which can be grouped together to form tasks. You can then authorize roles to perform specific tasks and/or individual operations.

For more details please refer Microsoft URL below-
https://msdn.microsoft.com/en-us/library/ff649313.aspx

Hope it helps!!
0
 

Author Closing Comment

by:newbieweb
ID: 41886760
thanks
0

Featured Post

Restore individual SQL databases with ease

Veeam Explorer for Microsoft SQL Server delivers an easy-to-use, wizard-driven interface for restoring your databases from a backup. No expert SQL background required. Web interface provides a complete view of all available SQL databases to simplify the recovery of lost database

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
This shares a stored procedure to retrieve permissions for a given user on the current database or across all databases on a server.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question