Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy. See our Privacy Policy and User Agreement for details.

Author:Akinojind Yozshurisar
Language:English (Spanish)
Published (Last):19 May 2010
PDF File Size:3.94 Mb
ePub File Size:20.88 Mb
Price:Free* [*Free Regsitration Required]

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy. See our Privacy Policy and User Agreement for details. Published on Oct 12, SlideShare Explore Search You.

Submit Search. Successfully reported this slideshow. We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime. Upcoming SlideShare. Like this document? Why not share! Embed Size px. Start on. Show related SlideShares at end. WordPress Shortcode. Full Name Comment goes here. Are you sure you want to Yes No. No Downloads. Views Total views. Actions Shares. Embeds 0 No embeds. No notes for slide.

His programming books have sold more than 3. Although interested in all facets of computing, his primary focus is computer languages, including compilers, interpreters, and robotic control languages. He also has an active interest in the standardization of languages. Schildt holds both graduate and undergraduate degrees from the University of Illinois.

He can be reached at his consulting office at His web site is www. Howard speaks regularly on the topic of securing code for Microsoft and at conferences worldwide. All rights reserved. Except as permitted under the United States Copyright Act of , no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher.

All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark.

Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please visit the Contact Us page at www.

Information has been obtained by McGraw-Hill from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw-Hill, or others, McGraw-Hill does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information.

Use of this work is subject to these terms. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms.

McGraw-Hill and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom.

McGraw-Hill has no responsibility for the content of any information accessed through the work. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise.

This page intentionally left blank 7. Contents Special Thanks. NET Framework. NET Framework? Unmanaged Code. NET Standard Interfaces. Exception Class. C o n t e n t s xiii Random Access Files. Static Methods as Event Handlers. NET Event Guidelines. Named Parameters. Query Methods. Immediate Query Execution. C o n t e n t s xvii The IConvertible Interface. Format and ToString to Format Data. Format to Format Values.

Net Members. C o n t e n t s xix Internet Access Fundamentals. This page intentionally left blank Special Thanks Special thanks go to Michael Howard for his excellent technical edit of this book. His expertise, insights, suggestions, and advice were of great value. Preface We programmers are a demanding bunch, always looking for ways to improve the performance, efficiency, and portability of our programs.

We also demand much from the tools we use, especially when it comes to programming languages. There are many programming languages, but only a few are great. A great programming language must be powerful, yet flexible. Its syntax must be terse, but clear. It must facilitate the creation of correct code while not getting in our way. It must support state-of-the-art features, but not trendy dead ends. Finally, a great programming language must have one more, almost intangible quality: It must feel right when we use it.

C is such a language. Created by Microsoft to support its. NET Framework, C builds on a rich programming heritage. Its chief architect was long-time programming guru Anders Hejlsberg. From C, it derives its syntax, many of its keywords, and its operators. C is also closely related to another very successful language: Java. Sharing a common ancestry, but differing in many important ways, C and Java are more like cousins.

Both support distributed programming and both use intermediate code to achieve safety and portability, but the details differ. They both also provide a significant amount of runtime error checking, security, and managed execution, but again, the details differ. Furthermore, the trade-offs between power and safety are carefully balanced and are nearly transparent. Throughout the history of computing, programming languages have evolved to accommodate changes in the computing environment, advances in computer language theory, and new ways of thinking about and approaching the job of programming.

C is no exception. In the ongoing process of refinement, adaptation, and innovation, C has demonstrated its ability to respond rapidly to the changing needs of the programmer. This fact is testified to by the many new features added to C since its initial 1. Consider the first major revision, C 2.

It added several features that made it easier for programmers to write more resilient, reliable, and nimble code. Without question, the most important 2. Through the use of generics, it became possible to create type-safe, reusable code in C. Thus, the addition of generics fundamentally expanded the power and scope of the language.

Now consider the second major revision, C 3. This is the latest version of C and is the version described in this book. It is not an exaggeration to say that C 3.

Of its many innovative features, two stand out: LINQ and lambda expressions.


C# 3.0 the Complete Reference 3/E

Connect C. My Bookshelf C. Forgot your password? Don't have an account? Create an account now. Instructors: choose ebook for fast access or receive a print copy. Still Have Questions?



Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions. Enlarge cover. Error rating book.



Related Articles