SlideShare a Scribd company logo
Developer s Guide to Microsoft Enterprise
Library C Edition Alex Homer download
https://ebookultra.com/download/developer-s-guide-to-microsoft-
enterprise-library-c-edition-alex-homer/
Explore and download more ebooks or textbooks
at ebookultra.com
We believe these products will be a great fit for you. Click
the link to download now, or visit ebookultra.com
to discover even more!
C net Web Developer s Guide 1st Edition Saurabh Nandu
https://ebookultra.com/download/c-net-web-developer-s-guide-1st-
edition-saurabh-nandu/
The Little Book on CoffeeScript The JavaScript Developer s
Guide to Building Better Web Apps 1st Edition Alex Maccaw
https://ebookultra.com/download/the-little-book-on-coffeescript-the-
javascript-developer-s-guide-to-building-better-web-apps-1st-edition-
alex-maccaw/
Applications Code Markup A Guide to the Microsoft Windows
Presentation Foundation Pro Developer 1st Edition Charles
Petzold
https://ebookultra.com/download/applications-code-markup-a-guide-to-
the-microsoft-windows-presentation-foundation-pro-developer-1st-
edition-charles-petzold/
Developer s Guide to Web Application Security 1st Edition
Michael Cross
https://ebookultra.com/download/developer-s-guide-to-web-application-
security-1st-edition-michael-cross/
The NET Developer s Guide to Windows Security 1st Edition
Keith Brown
https://ebookultra.com/download/the-net-developer-s-guide-to-windows-
security-1st-edition-keith-brown/
The Ruby Developer s Guide 1st Edition Syngress
https://ebookultra.com/download/the-ruby-developer-s-guide-1st-
edition-syngress/
Professional Microsoft Robotics Developer Studio Wrox
Programmer to Programmer 1st Edition Kyle Johns
https://ebookultra.com/download/professional-microsoft-robotics-
developer-studio-wrox-programmer-to-programmer-1st-edition-kyle-johns/
Sun Certification Training Guide 310 080 Java 2 Enterprise
Edition J2EE Web Component Developer Alain Trottier
https://ebookultra.com/download/sun-certification-training-
guide-310-080-java-2-enterprise-edition-j2ee-web-component-developer-
alain-trottier/
Microsoft SharePoint 2010 Developer Reference 1st Edition
Paolo Pialorsi
https://ebookultra.com/download/microsoft-sharepoint-2010-developer-
reference-1st-edition-paolo-pialorsi/
Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer
Developer s Guide to Microsoft Enterprise Library C
Edition Alex Homer Digital Instant Download
Author(s): Alex Homer, Nicolas Botto
ISBN(s): 9780735645233, 073564523X
Edition: Kindle
File Details: PDF, 3.35 MB
Year: 2010
Language: english
D E V E LO P E R S ’ S GU I D E TO
M I C R O S O F T
®
EN T E R P R I S E
LI B R A RY
Alex Homer
with
Nicolas Botto
Bob Brumfield
Grigori Melnik
Erik Renaud
Fernando Simonazzi
Chris Tavares
Solutions for
Enterprise Development
C# Edition
developer’s guide to microsoft®
enterprise library
Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer
developer’s guide to
Microsoft®
Enterprise
Library
Solutions for Enterprise Development
Alex Homer
with
Nicolas Botto
Bob Brumfield
Grigori Melnik
Erik Renaud
Fernando Simonazzi
Chris Tavares
Copyright and Terms of Use
ISBN: 9780735645233
This document is provided “as-is.” Information and views expressed in
this document, including URL and other Internet Web site references,
may change without notice. You bear the risk of using it.
Some examples depicted herein are provided for illustration only and
are fictitious. No real association or connection is intended or should
be inferred.
This document does not provide you with any legal rights to any
intellectual property in any Microsoft product. You may copy and
use this document for your internal, reference purposes.
© 2010 Microsoft. All rights reserved.
Microsoft, Windows, Windows Server, Windows Vista, Visual C#,
SQL Server, Active Directory, IntelliSense, Silverlight, MSDN, Internet
Explorer, and Visual Studio are trademarks of the Microsoft group of
companies. All other trademarks are property of their respective owners.
Contents
preface xv
About This Guide xv
What Does This Guide Cover? xv
What This Guide Does Not Cover xvi
How Will This Guide Help You? xvii
What Do You Need to Get Started? xvii
the team who brought you this guide xix
The Enterprise Library 5.0 Development Team xix
1 Welcome to the Library 1
Meet the Librarian 1
What You Get with Enterprise Library 1
Things You Can Do with Enterprise Library 3
Why You Should Use Enterprise Library 4
Some Fundamentals of Enterprise Library 6
Choosing Which Blocks To Install 6
Installing Enterprise Library 7
Assemblies And References 7
GAC or Bin, Signed or Unsigned? 8
Importing Namespaces 9
Configuring Enterprise Library 10
The Configuration Tools 10
Using The Configuration Tools 11
Encrypting Configuration Sections 14
Instantiating and Using Enterprise Library Objects 14
Enterprise Library Objects, Facades, and Factories 15
foreword
Scott Guthrie ix
Creating Instances of Enterprise Library Types 15
The Simple Approach
— Using The Enterprise Library Service Locator 16
The Sophisticated Approach
— Accessing The Container Directly 16
Pros and Cons of Object Instantiation 18
More Reasons to be Sophisticated 19
Getting Objects From Previous Versions
Of Enterprise Library 21
The Example Applications 22
Summary 23
2 Much ADO about Data Access 25
Introduction 25
What Does the Data Access Application Block Do? 26
Data Operations Supported by the Data Access Block 26
How Do I Use the Data Access Block? 28
Configuring the Block and Referencing the Required Assemblies 28
Creating Database Instances 29
The Example Application 30
Reading Multiple Data Rows 31
Reading Rows Using a Query with No Parameters 31
Reading Rows Using an Array of Parameter Values 32
Reading Rows Using Queries with Named Parameters 33
Retrieving Data as Objects 35
About Accessors 35
Creating and Executing an Accessor 37
Creating and Using Mappers 38
Retrieving Xml Data 39
Retrieving Single Scalar Values 40
Retrieving Data Asynchronously 41
Preparing for Asynchronous Data Access 42
Retrieving Row Set Data Asynchronously 43
Retrieving Data as Objects Asynchronously 45
Updating Data 45
Executing an Update Query 46
Working with DataSets 47
Updating the Database from a DataSet 48
Managing Connections 52
Working with Connection-Based Transactions 53
Working with Distributed Transactions 55
Extending the Block to Use Other Databases 58
Summary 58
3 Error Management Made Exceptionally Easy 61
Introduction 61
When Should I Use the Exception Handling Block? 62
How Do I Use the Exception Handling Block? 62
What Exception Policies Do I Need? 63
Allowing Exceptions to Propagate 63
About Exception Handling Policies 63
Choosing an Exception Handling Strategy 65
Process or Handle Exception? 66
Using the Process Method 67
Diving in with a Simple Example 68
Applying Exception Shielding 69
Wrapping an Exception 70
Configuring the Wrap Handler Policy 70
Initializing the Exception Handling Block 71
Editing the Application Code to Use the New Policy 71
Replacing an Exception 74
Logging an Exception 75
Shielding Exceptions at WCF Service Boundaries 78
Creating a Fault Contract 78
Configuring the Exception Handling Policy 78
Editing the Service Code to Use the New Policy 79
The Fault Contract Exception Handler 80
Handling Specific Exception Types 81
Executing Code around Exception Handling 82
Assisting Administrators 84
Extending Your Exception Handling 87
Summary 87
4 As Easy as Falling Off a Log 89
Introduction 89
What Does the Logging Block Do? 90
Logging Categories 92
Logging Overhead and Additional Context Information 93
How Do I Use the Logging Block? 93
Configuring the Logging Block 93
Initializing the Logging Block 94
Diving In with an Example 95
Creating and Writing Log Entries with a Logwriter 95
About Logging Categories 98
Filtering by Category 100
Writing Log Entries to Multiple Categories 100
Controlling Output Formatting 101
Non-Formatted Trace Listeners 102
Filtering by Severity in a Trace Listener 103
Filtering All Log Entries by Priority 103
Creating and Using Logentry Objects 104
Capturing Unprocessed Events and Logging Errors 105
About Special Sources 105
An Example of Using Special Sources 106
Logging to a Database 108
Using the Database Trace Listener 109
Testing Logging Filter Status 110
Obtaining Information about Trace Sources
and Trace Listeners 111
Checking if Filters Will Block a Log Entry 112
Adding Additional Context Information 114
Tracing and Correlating Activities 115
An Example of Tracing Activities 116
Creating Custom Trace Listeners, Filters, and Formatters 119
Summary 119
5 A Cache Advance for Your Applications 121
Introduction 121
What Does the Caching Block Do? 123
Flushed or Expired? 123
Which Expiration Policy? 124
How Do I Configure the Caching Block? 124
Persistent Caching 125
Encrypting Cached Items 126
Initializing the Caching Block 126
How Do I Use the Caching Block? 127
About the Example Application 127
Adding Items to and Retrieving Items from the Cache 127
What’s In My Cache? 130
Using the Isolated Storage Backing Store 131
Encrypting the Cached Data 133
Using the Database Backing Store 134
Removing Items From and Flushing the Cache 135
Using a File Dependency and Extended Time Expiration 136
Adding the Items to the Cache 137
Refreshing the Cache 139
Loading the Cache 141
Proactive Cache Loading 141
Reactive Cache Loading 142
Extending Your Cache Advance 143
Summary 144
6 Banishing Validation Complication 145
Introduction 145
Techniques for Validation 146
Where Should I Validate? 146
What Should I Validate? 146
How Should I Validate? 147
What Does the Validation Block Do? 147
The Range of Validators 149
Validating with Attributes 151
DataAnnotations Attributes 151
Self-Validation 152
Validation Rule Sets 154
Assigning Validation Rules to Rule Sets 154
Configuring Validation Block Rule Sets 154
Specifying Rule Sets When Validating 155
How Do I Use The Validation Block? 156
Preparing Your Application 156
Choosing a Validation Approach 157
Options for Creating Validators Programmatically 158
Performing Validation and Displaying Validation Errors 159
Understanding Message Template Tokens 160
Diving in With Some Simple Examples 161
Validating Objects and Collections of Objects 162
Creating a Type Validator using the ValidatorFactory 162
Delving Deeper into ValidationResults 163
Using the Object Validator 164
Differences Between the Object Validator
and the Factory-Created Type Validators 165
Validating Collections of Objects 165
Using Validation Attributes 166
Using the Validation Block Attributes 166
Using Data Annotation Attributes 169
Defining Attributes in Metadata Classes 171
Specifying the Location of Validation Rules 172
Creating and Using Individual Validators 173
Validating Strings for Contained Characters 173
Validating Integers within a Domain 173
Validating with a Composite Validator 174
Validating Single Members of an Object 175
WCF Service Validation Integration 176
Defining Validation in the Service Contract 176
Editing the Service Configuration 177
Using the Product Service and Detecting Validation Errors 178
User Interface Validation Integration 180
ASP.NET User Interface Validation 180
Windows Forms User Interface Validation 181
WPF User Interface Validation 181
Creating Custom Validators 182
Summary 182
7 Relieving Cryptography Complexity 183
Introduction 183
What Does the Cryptography Block Do? 183
A Secret Shared 184
Making a Hash of It 184
How Does the Cryptography Block Manage
Encryption Keys? 184
How Does the Cryptography Block Integrate
With Other Blocks? 185
How Do I Use the Cryptography Block? 185
Configuring Cryptographic Providers 186
Adding the Required References 187
Diving in with an Example 187
Encrypting and Decrypting Data Using
A Symmetric Provider 188
Encrypting and Decrypting a Text String 188
Encrypting and Decrypting an Object Instance 189
Obtaining and Comparing Hash Values 191
Creating and Comparing Hash Values for Text Strings 191
Creating and Comparing Hash Values for Object Instances 193
Creating Custom Cryptography Providers 195
Summary 196
8 An Authentic Approach to Token Identity 197
Introduction 197
What Does the Security Block Do? 198
What are Authorization Rule Providers? 198
About Authorization Manager (AzMan) 198
Why Do I Need a Security Cache? 199
How Do I Configure the Security Block? 200
Configuring Authorization Rules 202
How Do I Use the Security Block? 202
Diving in With an Example 203
Caching a User Identity and Obtaining
A Temporary Token 204
Displaying User Identity Details 205
Displaying Generic Principal Details 205
Authenticating a User Using a Token 206
Terminating a User Session and Expiring the Token 207
Checking If a User is Authorized to Perform a Task 208
Using Security Block Configured Rules 208
Using AzMan Provider Rules 210
Creating Custom Authorization Providers 212
Summary 212
appendices
a dependency injection with unity 213
What is Dependency Injection? 213
The Unity Dependency Injection and Interception Mechanism 214
Summary of Unity Features 215
Defining Dependencies with Unity 216
Constructor Injection 217
Automatic Constructor Injection 217
Design-Time Configuration 218
Run-Time Configuration 219
Configuration with Attributes 219
Property (Setter) Injection 220
Design-Time Configuration 220
Run-Time Configuration 221
Configuration with Attributes 221
Method Call Injection 222
Design-Time Configuration 222
Run-Time Configuration 223
Configuration with Attributes 223
More Dependency Injection Opportunities 224
Resolving Populated Instances of Your Classes 224
b dependency injection in enterprise library 225
Loading Configuration Information into a Unity Container 225
Viewing Registrations in the Container 226
Populating Entire Object Graphs at Application Startup 227
Maintaining a Container Reference in Request-Based
Applications 228
Using an Alternative Service Locator or Container 229
c policy injection in enterprise library 231
d enterprise library configuration scenarios 233
About Enterprise Library Configuration 233
External Configuration 234
Programmatic Support 234
Using the Fluent Interfaces 234
Scenarios for Advanced Configuration 235
scenario 1: Using The Default Application
Configuration File 235
scenario 2: Using A Non-Default Configuration Store 235
scenario 3: Sharing The Same Configuration
Between Multiple Applications 236
scenario 4: Managing And Enforcing Configuration
For Multiple Applications 236
scenario 5: Sharing Configuration Sections
Across Multiple Applications 237
scenario 6: Applying a Common Configuration
Structure for Applications 238
Deployment Environments 239
e encrypting configuration files 241
index 243
xiii
Foreword
You are holding in your hands a book that will make your life as an enterprise developer a
whole lot easier.
It’s a guide on Microsoft Enterprise Library and it’s meant to guide you through how
to apply .NET for enterprise development. Enterprise Library, developed by the patterns
& practices group, is a collection of reusable components, each addressing a specific cross
cutting concern—be it system logging, or data validation, or exception management.
Many of these can be taken advantage of easily. These components are architecture
agnostic and can be applied in a multitude of different contexts.
The book walks you through functional blocks of the Enterprise Library, which
include data access, caching, cryptography, exception handling, logging, security, and
validation. It contains a large collection of exercises, tricks and tips.
Developing robust, reusable, and maintainable application requires knowledge of
design patterns, software architectures and solid coding skills. We can help you develop
those skills with Enterprise Library since it encapsulates proven and recommended prac-
tices of developing enterprise applications on the .NET platform. Though this guide does
not go into the depth of discussions of architecture and patterns, it provides a solid basis
for you to discover and implement these patterns from a reusable set of components.
That’s why I also encourage you to check out the Enterprise Library source code and
read it.
This guide is not meant to be a complete reference on Enterprise Library. For that,
you should go to MSDN. Instead, the guide covers most commonly used scenarios and
illustrates how Enterprise Library can be applied in implementing those. The powerful
message manifesting from the guide is the importance of code reuse. In today’s world of
complex large software systems, high-quality pluggable components are a must. After all,
who can afford to write and then maintain dozens of different frameworks in a system—
all to accomplish the same thing? Enterprise Library allows you to take advantage of the
proven code complements to manage a wide range of task and leaves you free to concen-
trate on the core business logic and other “working parts” of your application.
Another important emphasis that the guide makes is on software designs, which are
easy to configure, testable and maintainable. Enterprise Library has a flexible configura-
tion subsystem driven from either external config files, or programmatically, or both.
Leading by example, Enterprise Library itself is designed in a loosely-coupled manner. It
promotes key design principles of the separation of concerns, single responsibility prin-
ciple, principle of least knowledge and the DRY principle (Don’t Repeat Yourself). Having
said this, don’t expect this particular guide to be a comprehensive reference on design
patterns. It is not. It provides just enough to demonstrate how key patterns are used with
Enterprise Library. Once you see and understand them, try to extrapolate them to other
problems, contexts, scenarios.
The authors succeeded in writing a book that is targeted at both those who are sea-
soned Enterprise Library developers and who would like to learn about the improvements
in version 5.0, and those, who are brand new to Enterprise Library. Hopefully, for the
first group, it will help orientate you and also get a quick refresher of some of the key
concepts. For the second group, the book may lower your learning curve and get you
going with Enterprise Library quickly.
Lastly, don’t just read this book. It is meant to be a practical tutorial. And learning
comes only through practice. Experience Enterprise Library. Build something with it.
Apply the concepts learnt in practice. And don’t forget to share your experience.
In conclusion, I am excited about both the release of Enterprise Library 5.0 and this
book. Especially, since they ship and support some of our great new releases—Visual
Studio 2010, .NET Framework 4.0 and Silverlight 4, which together will make you, the
developer, ever more productive.
Scott Guthrie
Corporate Vice-President
Microsoft .NET Developer Platform
Redmond, Washington
Random documents with unrelated
content Scribd suggests to you:
Piamontese, Francesco, courier, 415, 420, 432, 433.
Pleine, Gerard de, 5.
Pole, Henry, Viscount Montague, eldest son of Margaret, Countess of
Salisbury, his arrest and attainder, 166.
is beheaded on Tower Hill, 167, 168.
—— Katharine, the Princess Mary’s nurse, 6.
—— Reginald, afterwards Cardinal, Archbishop of Canterbury,
younger son of the Countess of Salisbury, 50, 51, 165, 166, 167,
235, 252, 254, 266, 267, 334, 335, 336, 337, 338, 339, 340, 344,
365, 380, 387, 397, 399, 402, 406, 409, 410, 420, 422, 424, 427,
429, 431, 433, 435, 437, 438, 444, 446, 452, 455, 456, 457, 458,
461, 462, 463, 468, 469, 470, 481.
declines the Archbishopric of York, 50.
leaves England, 51.
his book on The Unity of the Church, 166.
letter to Cardinal Contarini, 167.
is made a Cardinal by Paul III., 335.
urges Mary to reconcile the kingdom with Rome and to restore
Church property, 235.
not yet being pledged to the ecclesiastical state, is proposed as a
husband for Queen Mary, 254.
is appointed legate a latere et pro pace, 266.
only just misses being elected Pope, 372 note,
his letter to King Philip, 334.
his attainder reversed, 338.
returns to England, 339.
reconciles the representatives of the nation to the Pope, 340.
is appointed to conduct Cranmer’s trial for heresy, 387.
is to take Philip’s place in the Government during the King’s
absence, 399.
consecrated Archbishop of Canterbury, 409, 410.
is somewhat embarrassed by Philip’s return, 437.
his death, 468.
Pope, Sir Thomas, 291, 418.
Portugal, King of, 11, 151, 315.
—— the Princess of, afterwards the Empress Isabella, 11, 21 note,
19, 136, 165.
—— the Infant of, 255.
Poynet, John, Bishop of Winchester, 244, 354.
Poyns, Sir Nicholas, 291.
Priuli, Monsignor, 433, 468.
Privy Council—
of Edward VI., 187, 189, 194, 196, 197, 198, 200-212, 218-221,
223, 234, 237, 373, 385.
of Queen Mary, 231, 234, 244, 245, 254, 261, 272, 276, 282, 283,
287, 295, 309, 310, 311, 319, 330, 332, 333, 334, 354, 357,
363, 364, 377, 390, 402, 405, 415, 437, 439, 440, 443, 466,
470, 474.
urges Mary in vain to secure Elizabeth’s person, 276.
panic-stricken on Wyatt’s rebellion, 283.
for treating the rebels as heretics, 309, 357.
some of the members incline to a secret understanding with
Elizabeth, 402.
and refuse to crown Philip, 405.
R.
Rauffe, John, gunner, 24.
Renard, Simon, Imperial ambassador to Queen Mary, 215, 237, 246,
247, 251, 253, 254, 263, 264, 267, 270, 273, 277, 283, 295, 299,
308, 309, 310, 313, 329, 338, 357.
entreats the Queen to take measures against Elizabeth’s
disloyalty, 237.
regards Elizabeth as the champion of the disaffected, 247.
declares that she and Courtenay are in collusion, 253.
introduces the subject of a marriage between Mary and Philip,
254.
his dislike of Gardiner, 310.
advises Philip to come with as little state as possible, 313.
his letter to the Emperor after the royal marriage, 329.
is sent to Brussels to negotiate the return of Cardinal Pole, 338.
Ricardes, Dr., one of the Princess Mary’s chaplains, 203.
Rich, Richard, first Baron, Lord Chancellor in Edward’s reign, 207,
208, 223.
Richmond, Duke of, natural son of Henry VIII., 65, 105, 136, 153.
Ridley, Nicholas, Bishop of London, 196, 212, 223, 224, 238, 268,
375, 377, 378.
visits the Princess Mary at Hunsdon, 212.
preaches against Mary’s accession, 223.
is arrested at Ipswich and sent to the Tower, 224.
Rochefoucauld, Count de la, 454.
Rochester, Sir Robert, Comptroller of the Household, 203, 206, 209,
211, 212, 234, 261, 295, 432.
Rochford, George Viscount. See Boleyn.
Rœulx, Baron de, 102.
Rogers, John, Prebendary of St. Paul’s, 372, 374.
Ross, ——, a reformed preacher, 363.
Rota, Court of the, 41, 57.
Rowte, Sir Henry, chaplain to the Princess Mary, 6.
Rudston, Master, 280, 287.
Russell, Sir John, first Earl of Bedford, 44, 223, 278, 313, 326, 341.
—— Francis, Viscount, son of the above, succeeded him as second
Earl, 296.
Rutland, Henry Manners, Earl of, 403.
Ruy Gomez, Prince of Eboli, 313.
S.
Sagudino, Venetian envoy, 5.
Sainte Croix, Prosper de, 253.
St. Asaph, Bishop of, Thomas Goldwell, 469.
Saint Thomas of Aquin, 361.
Salinas, Martin de, 18.
Salisbury, Margaret Plantagenet, Countess of, 2, 25, 26, 64, 81, 166,
167, 168, 181.
accompanies the Princess Mary into Wales, 25.
is removed from Mary’s household, 64.
her arrest and attainder, 166.
her execution, 168, 181.
Saluce, Marquis de, 67.
Sampson, Dr., 59.
Sanguino, Signor Carlo da, gentleman of the mouth to Philip II., 396.
San Saluto, Abbot of, 406.
Saunders, Laurence, Rector of All Hallows, 372, 374.
Savage, Mistress Anne, 98 note.
Savagnano, Mario, his report of a visit to the English court, 45.
Savoy, Duke of. See Emmanuel Philibert.
Scory, Dr. John, successively Bishop of Rochester, Chichester and
Hereford, 243.
Seamer, Master John, 291.
Selve, Monsieur de, French ambassador to the Venetian Republic,
275.
Seymour, Edward, Earl of Hertford, afterwards Duke of Somerset,
and Lord Protector, 189, 193, 194, 196, 211.
—— Jane, third wife of Henry VIII., sister of the above, 99, 103,
105, 107, 112, 125, 137, 149, 150, 153, 154.
her affection for the Princess Mary, 125, 150.
her death, 153.
—— Sir Thomas, Lord Seymour of Sudley, Lord High Admiral, 189,
190, 193.
Sforza, Francesco, Duke of Milan, 49.
Shelton, Sir John, 218.
—— Lady (also called Mistress), governess to the Princess Mary, 69,
70, 75, 81, 99, 124.
Shrewsbury, Earl of, 142, 223, 225.
Skeffington, Sir William, 24.
Smith, Sir Thomas, Secretary of State in Edward’s reign, 196, 374.
Sorranzo, Giacomo, Venetian ambassador to England, 261, 302, 518.
to France, 411, 412.
his description of Queen Mary, 318.
Soto Pedro, 254, 377, 380.
Southwell, Sir Richard, Master of the Ordnance, 295.
Spaniards in England, 323, 329, 343, 344, 356, 436.
Speke, Sir George, 167.
Spinelli, Gasparo, 28, 29, 30.
Stafford, Thomas, grandson of the Duke of Buckingham, 441, 442,
452.
Strelley, Sir Anthony, 403.
—— Mrs. Frideswide, 351.
Strozzi, Prince, 454.
Stuart, Mary, Queen of Scots, 215, 245, 274, 306 note, 315, 359.
Suffolk, Duke of. See Brandon, Charles, and Grey, Henry.
—— Frances, Duchess of, daughter of Charles Brandon, Duke of
Suffolk, and Mary Tudor, Queen Dowager of France, sister of
Henry VIII., 214, 219, 232, 279.
Surian, Michiel, replaces Giovanni Michiel as Venetian ambassador to
England, 436, 437, 439, 443, 444, 451, 453, 462, 465, 468.
Sussex, Earl of, 58, 59, 124, 218, 304, 305, 328.
Sweden, Gustavus Vasa, King of, 464.
Sydney, Elizabeth, 220 note.
—— Mabel, ibid.
T.
Tarbes, Bishop of. See Grammont.
Taylor, John, alias Cardmaker, Rector of Hadley, 372, 374.
Thirlby, Thomas, Bishop of Ely in the reign of Mary, 326, 387, 388,
400, 424.
Thomas, William, plots the murder of Queen Mary, 355.
Throckmorton, Sir Nicholas, 198, 410, 486.
Trivulci, Cardinal, 452.
Tunstal, Cuthbert, successively Bishop of London and of Durham, 9,
20, 21, 22, 231, 326.
ambassador-extraordinary to Spain, 20.
his opinion of the Princess Mary, 22.
released from the Tower on Mary’s accession, 231.
Turenne, Vicomte de, 30, 31.
U.
Udal, Nicholas, Headmaster of Eton College, and Vicar of Braintree,
183, 410.
Underhill, Edward, Gospeller, 227, 288, 327, 469 note.
V.
Vagrancy, 248.
Venier, Marc Antonio, 47.
Vives, Ludovicus, 26, 39, 40.
W.
Waldegrave, Sir Edward, a member of the Princess Mary’s
household, afterwards Master of the Wardrobe, 203, 205, 211,
234.
Wallop, Sir John, English ambassador to Francis I., 47, 154.
Warham, William, Archbishop of Canterbury, 36, 37, 52, 381.
Warre, Lord de la, 416, 421.
Warwick, Earl of. See Northumberland, Duke of.
—— —— eldest son of the above, 231.
Wassilegevich, Ivan, Czar of Russia, 488.
Wentworth, Lord, Deputy-governor of Calais, 448, 450.
Westmorland, Earl of, 442.
Weston, Dr., 302, 311, 386.
Westweek, Father, 514 App.
White, Dr., Bishop of Winchester, preaches Queen Mary’s funeral
sermon, and suffers for his praise of her, 472-474.
Williams, Sir John, 225.
—— Lord, of Thame, 312.
Willoughby, Sir Hugh, 488.
Wiltshire, Earl of. See Boleyn, Sir Thomas.
Winchester, Marquis of, Lord High Treasurer, 223, 234, 304, 305,
326.
Windsor, Sir Andrew, 24.
—— Lord, 225.
Wingfield, Sir Anthony, Comptroller of the Household to Edward VI.,
207.
—— Sir Richard, ambassador-extraordinary to Spain, 23 note, 20,
21.
Wolsey, Cardinal of York and Lord Chancellor, 2, 4, 6, 7, 8, 9, 12, 13,
14, 18, 19, 24, 28, 32, 33, 36, 37, 38, 40, 41, 50, 55, 136.
sponsor at the baptism of the Princess Mary, 2.
his ascendency over the King, 4, 6.
his foreign policy, 12, 13, 18.
his ambition and dreams of the Papacy, 28, 32.
schemes to marry the Princess Mary to Francis I., 33.
opens a legatine Court, in conjunction with Campeggio, 40.
his disgrace, 41, 50, 55.
Wood, Anthony à, 367.
—— Avis, laundress to the Princess Mary, 6.
Worcester, Earl of, 289, 308.
Worth, John, his letter to Lord Lisle, 167.
Wotton, Dr., Dean of the Chapel to the Princess Mary, and
ambassador to Charles V. and Henry II., 25, 201, 202, 266, 406,
442.
Wriothesley, Sir Thomas, Keeper of the Wardrobe, and Secretary to
Thomas Cromwell, 162, 170, 172.
Wyatt, Sir Thomas, son of the poet, special envoy from Henry VIII.
to Charles V., and author of the second rebellion under Mary,
145, 151, 275, 277, 280, 282, 287, 289, 290, 291, 292, 296, 299,
303, 308, 311.
sets up the standard of revolt in Kent, 280.
arrives at Hyde Park Corner, 289.
gives himself up at Temple Bar, 290.
his conflicting statements concerning Elizabeth and Courtenay,
296, 299, 311.
his execution, 311.
Z.
Zapolski, John, King of Hungary, 49.
Zwingli Ulrich, Swiss reformer, 372.
THE ABERDEEN UNIVERSITY PRESS LIMITED.
Transcriber’s Note:
The original spelling, hyphenation, and
punctuation have been retained, with the
exception of apparent typographical errors
which have been corrected without note.
Ambiguous hyphens at the ends of lines
were retained.
Punctuation and spelling were made
consistent when a predominant form was
found in this book; otherwise they were not
changed.
Mid-paragraph illustrations have been
moved between paragraphs and some
illustrations have been moved closer to the
text that references them. The List of
Illustrations paginations were changed
accordingly.
Footnotes were moved to the end of
chapters and numbered in one continuous
sequence.
These variants of Boleyn were unchanged:
Boleyne (p. 85), Boleine (p. 149).
p. 243: “with mine own seal joined
thereto.”[1] Footnote anchor removed by
the transcriber as it lacks a corresponding
footnote.
*** END OF THE PROJECT GUTENBERG EBOOK THE HISTORY OF
MARY I, QUEEN OF ENGLAND ***
Updated editions will replace the previous one—the old editions
will be renamed.
Creating the works from print editions not protected by U.S.
copyright law means that no one owns a United States
copyright in these works, so the Foundation (and you!) can copy
and distribute it in the United States without permission and
without paying copyright royalties. Special rules, set forth in the
General Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.
START: FULL LICENSE
THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg™ mission of promoting the
free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.
Section 1. General Terms of Use and
Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.
1.B. “Project Gutenberg” is a registered trademark. It may only
be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E. Unless you have removed all references to Project
Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is
derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is
posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or
providing access to or distributing Project Gutenberg™
electronic works provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project
Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except
for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.
1.F.4. Except for the limited right of replacement or refund set
forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.
The Foundation’s business office is located at 809 North 1500
West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com

More Related Content

Similar to Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer (20)

PDF
Infrastructure as code managing servers in the cloud Morris
sahfthr3687
 
PDF
Programming Entity Framework Building Data Centric Apps with the ADO NET Enti...
waradegha
 
PDF
Azure Storage Streaming and Batch Analytics A Guide for Data Engineers 1st Ed...
zoccourin
 
PDF
Security as Code: DevSecOps Patterns with AWS Bk Sarthak Das
bauenhegbom
 
PDF
Moving Applications to the Cloud on Windows Azure 3rd Edition Dominic Betts
withamfousek
 
PDF
Security As Code Devsecops Patterns With Aws 1st Bk Sarthak Das
moyoyavilek
 
PDF
Moving Applications to the Cloud on Windows Azure 3rd Edition Dominic Betts
ridhaboggs77
 
PDF
Developing Backbonejs Applications Early Release Addy Osmani
littelenkali
 
PDF
Learning Serverless Design Develop and Deploy with Confidence 1st Edition Jas...
hilsttrettpl
 
PDF
Special Edition Using Javascript Mcfedries
ontiwykt5351
 
PPTX
Accelerate Sitecore DevOps on Microsoft Azure
Perficient, Inc.
 
PDF
Using Google App Engine 1st Edition Charles Severance
rikamemurice
 
PDF
Special Edition Using Javascript Mcfedries
ddsinanku
 
PDF
Programming Windows Azure Programming the Microsoft Cloud 1st Edition Sriram ...
gjuzjatshuba
 
PDF
Moving Applications to the Cloud on Windows Azure 3rd Edition Dominic Betts
rouktelu
 
PDF
Download full ebook of Angularjs Brad Green Shyam Seshadri instant download pdf
mehiicniode
 
DOCX
Pg. 03Question Three Assignment 3Deadline Sunda.docx
JUST36
 
DOCX
Pg. 03Question Three Assignment 3Deadline Sunda.docx
karlhennesey
 
PDF
Full download Special Edition Using SOAP Special Edition Using John Paul Muel...
gbodogianpi
 
PDF
Learning Web App Development 1st Edition Semmy Purewal
molaxmeizu
 
Infrastructure as code managing servers in the cloud Morris
sahfthr3687
 
Programming Entity Framework Building Data Centric Apps with the ADO NET Enti...
waradegha
 
Azure Storage Streaming and Batch Analytics A Guide for Data Engineers 1st Ed...
zoccourin
 
Security as Code: DevSecOps Patterns with AWS Bk Sarthak Das
bauenhegbom
 
Moving Applications to the Cloud on Windows Azure 3rd Edition Dominic Betts
withamfousek
 
Security As Code Devsecops Patterns With Aws 1st Bk Sarthak Das
moyoyavilek
 
Moving Applications to the Cloud on Windows Azure 3rd Edition Dominic Betts
ridhaboggs77
 
Developing Backbonejs Applications Early Release Addy Osmani
littelenkali
 
Learning Serverless Design Develop and Deploy with Confidence 1st Edition Jas...
hilsttrettpl
 
Special Edition Using Javascript Mcfedries
ontiwykt5351
 
Accelerate Sitecore DevOps on Microsoft Azure
Perficient, Inc.
 
Using Google App Engine 1st Edition Charles Severance
rikamemurice
 
Special Edition Using Javascript Mcfedries
ddsinanku
 
Programming Windows Azure Programming the Microsoft Cloud 1st Edition Sriram ...
gjuzjatshuba
 
Moving Applications to the Cloud on Windows Azure 3rd Edition Dominic Betts
rouktelu
 
Download full ebook of Angularjs Brad Green Shyam Seshadri instant download pdf
mehiicniode
 
Pg. 03Question Three Assignment 3Deadline Sunda.docx
JUST36
 
Pg. 03Question Three Assignment 3Deadline Sunda.docx
karlhennesey
 
Full download Special Edition Using SOAP Special Edition Using John Paul Muel...
gbodogianpi
 
Learning Web App Development 1st Edition Semmy Purewal
molaxmeizu
 

Recently uploaded (20)

PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
John Keats introduction and list of his important works
vatsalacpr
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Rules and Regulations of Madhya Pradesh Library Part-I
SantoshKumarKori2
 
PDF
EXCRETION-STRUCTURE OF NEPHRON,URINE FORMATION
raviralanaresh2
 
PPTX
YSPH VMOC Special Report - Measles Outbreak Southwest US 7-20-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
PPTX
Digital Professionalism and Interpersonal Competence
rutvikgediya1
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
Introduction to Probability(basic) .pptx
purohitanuj034
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PPT
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock
Rajshri Ghogare
 
PPTX
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
John Keats introduction and list of his important works
vatsalacpr
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Rules and Regulations of Madhya Pradesh Library Part-I
SantoshKumarKori2
 
EXCRETION-STRUCTURE OF NEPHRON,URINE FORMATION
raviralanaresh2
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 7-20-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Digital Professionalism and Interpersonal Competence
rutvikgediya1
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Introduction to Probability(basic) .pptx
purohitanuj034
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
Virus sequence retrieval from NCBI database
yamunaK13
 
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock
Rajshri Ghogare
 
Cybersecurity: How to Protect your Digital World from Hackers
vaidikpanda4
 
Ad

Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer

  • 1. Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer download https://ebookultra.com/download/developer-s-guide-to-microsoft- enterprise-library-c-edition-alex-homer/ Explore and download more ebooks or textbooks at ebookultra.com
  • 2. We believe these products will be a great fit for you. Click the link to download now, or visit ebookultra.com to discover even more! C net Web Developer s Guide 1st Edition Saurabh Nandu https://ebookultra.com/download/c-net-web-developer-s-guide-1st- edition-saurabh-nandu/ The Little Book on CoffeeScript The JavaScript Developer s Guide to Building Better Web Apps 1st Edition Alex Maccaw https://ebookultra.com/download/the-little-book-on-coffeescript-the- javascript-developer-s-guide-to-building-better-web-apps-1st-edition- alex-maccaw/ Applications Code Markup A Guide to the Microsoft Windows Presentation Foundation Pro Developer 1st Edition Charles Petzold https://ebookultra.com/download/applications-code-markup-a-guide-to- the-microsoft-windows-presentation-foundation-pro-developer-1st- edition-charles-petzold/ Developer s Guide to Web Application Security 1st Edition Michael Cross https://ebookultra.com/download/developer-s-guide-to-web-application- security-1st-edition-michael-cross/
  • 3. The NET Developer s Guide to Windows Security 1st Edition Keith Brown https://ebookultra.com/download/the-net-developer-s-guide-to-windows- security-1st-edition-keith-brown/ The Ruby Developer s Guide 1st Edition Syngress https://ebookultra.com/download/the-ruby-developer-s-guide-1st- edition-syngress/ Professional Microsoft Robotics Developer Studio Wrox Programmer to Programmer 1st Edition Kyle Johns https://ebookultra.com/download/professional-microsoft-robotics- developer-studio-wrox-programmer-to-programmer-1st-edition-kyle-johns/ Sun Certification Training Guide 310 080 Java 2 Enterprise Edition J2EE Web Component Developer Alain Trottier https://ebookultra.com/download/sun-certification-training- guide-310-080-java-2-enterprise-edition-j2ee-web-component-developer- alain-trottier/ Microsoft SharePoint 2010 Developer Reference 1st Edition Paolo Pialorsi https://ebookultra.com/download/microsoft-sharepoint-2010-developer- reference-1st-edition-paolo-pialorsi/
  • 5. Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer Digital Instant Download Author(s): Alex Homer, Nicolas Botto ISBN(s): 9780735645233, 073564523X Edition: Kindle File Details: PDF, 3.35 MB Year: 2010 Language: english
  • 6. D E V E LO P E R S ’ S GU I D E TO M I C R O S O F T ® EN T E R P R I S E LI B R A RY Alex Homer with Nicolas Botto Bob Brumfield Grigori Melnik Erik Renaud Fernando Simonazzi Chris Tavares Solutions for Enterprise Development C# Edition
  • 7. developer’s guide to microsoft® enterprise library
  • 9. developer’s guide to Microsoft® Enterprise Library Solutions for Enterprise Development Alex Homer with Nicolas Botto Bob Brumfield Grigori Melnik Erik Renaud Fernando Simonazzi Chris Tavares
  • 10. Copyright and Terms of Use ISBN: 9780735645233 This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. © 2010 Microsoft. All rights reserved. Microsoft, Windows, Windows Server, Windows Vista, Visual C#, SQL Server, Active Directory, IntelliSense, Silverlight, MSDN, Internet Explorer, and Visual Studio are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners.
  • 11. Contents preface xv About This Guide xv What Does This Guide Cover? xv What This Guide Does Not Cover xvi How Will This Guide Help You? xvii What Do You Need to Get Started? xvii the team who brought you this guide xix The Enterprise Library 5.0 Development Team xix 1 Welcome to the Library 1 Meet the Librarian 1 What You Get with Enterprise Library 1 Things You Can Do with Enterprise Library 3 Why You Should Use Enterprise Library 4 Some Fundamentals of Enterprise Library 6 Choosing Which Blocks To Install 6 Installing Enterprise Library 7 Assemblies And References 7 GAC or Bin, Signed or Unsigned? 8 Importing Namespaces 9 Configuring Enterprise Library 10 The Configuration Tools 10 Using The Configuration Tools 11 Encrypting Configuration Sections 14 Instantiating and Using Enterprise Library Objects 14 Enterprise Library Objects, Facades, and Factories 15 foreword Scott Guthrie ix
  • 12. Creating Instances of Enterprise Library Types 15 The Simple Approach — Using The Enterprise Library Service Locator 16 The Sophisticated Approach — Accessing The Container Directly 16 Pros and Cons of Object Instantiation 18 More Reasons to be Sophisticated 19 Getting Objects From Previous Versions Of Enterprise Library 21 The Example Applications 22 Summary 23 2 Much ADO about Data Access 25 Introduction 25 What Does the Data Access Application Block Do? 26 Data Operations Supported by the Data Access Block 26 How Do I Use the Data Access Block? 28 Configuring the Block and Referencing the Required Assemblies 28 Creating Database Instances 29 The Example Application 30 Reading Multiple Data Rows 31 Reading Rows Using a Query with No Parameters 31 Reading Rows Using an Array of Parameter Values 32 Reading Rows Using Queries with Named Parameters 33 Retrieving Data as Objects 35 About Accessors 35 Creating and Executing an Accessor 37 Creating and Using Mappers 38 Retrieving Xml Data 39 Retrieving Single Scalar Values 40 Retrieving Data Asynchronously 41 Preparing for Asynchronous Data Access 42 Retrieving Row Set Data Asynchronously 43 Retrieving Data as Objects Asynchronously 45 Updating Data 45 Executing an Update Query 46 Working with DataSets 47 Updating the Database from a DataSet 48 Managing Connections 52 Working with Connection-Based Transactions 53 Working with Distributed Transactions 55 Extending the Block to Use Other Databases 58 Summary 58
  • 13. 3 Error Management Made Exceptionally Easy 61 Introduction 61 When Should I Use the Exception Handling Block? 62 How Do I Use the Exception Handling Block? 62 What Exception Policies Do I Need? 63 Allowing Exceptions to Propagate 63 About Exception Handling Policies 63 Choosing an Exception Handling Strategy 65 Process or Handle Exception? 66 Using the Process Method 67 Diving in with a Simple Example 68 Applying Exception Shielding 69 Wrapping an Exception 70 Configuring the Wrap Handler Policy 70 Initializing the Exception Handling Block 71 Editing the Application Code to Use the New Policy 71 Replacing an Exception 74 Logging an Exception 75 Shielding Exceptions at WCF Service Boundaries 78 Creating a Fault Contract 78 Configuring the Exception Handling Policy 78 Editing the Service Code to Use the New Policy 79 The Fault Contract Exception Handler 80 Handling Specific Exception Types 81 Executing Code around Exception Handling 82 Assisting Administrators 84 Extending Your Exception Handling 87 Summary 87 4 As Easy as Falling Off a Log 89 Introduction 89 What Does the Logging Block Do? 90 Logging Categories 92 Logging Overhead and Additional Context Information 93 How Do I Use the Logging Block? 93 Configuring the Logging Block 93 Initializing the Logging Block 94 Diving In with an Example 95 Creating and Writing Log Entries with a Logwriter 95 About Logging Categories 98 Filtering by Category 100 Writing Log Entries to Multiple Categories 100 Controlling Output Formatting 101
  • 14. Non-Formatted Trace Listeners 102 Filtering by Severity in a Trace Listener 103 Filtering All Log Entries by Priority 103 Creating and Using Logentry Objects 104 Capturing Unprocessed Events and Logging Errors 105 About Special Sources 105 An Example of Using Special Sources 106 Logging to a Database 108 Using the Database Trace Listener 109 Testing Logging Filter Status 110 Obtaining Information about Trace Sources and Trace Listeners 111 Checking if Filters Will Block a Log Entry 112 Adding Additional Context Information 114 Tracing and Correlating Activities 115 An Example of Tracing Activities 116 Creating Custom Trace Listeners, Filters, and Formatters 119 Summary 119 5 A Cache Advance for Your Applications 121 Introduction 121 What Does the Caching Block Do? 123 Flushed or Expired? 123 Which Expiration Policy? 124 How Do I Configure the Caching Block? 124 Persistent Caching 125 Encrypting Cached Items 126 Initializing the Caching Block 126 How Do I Use the Caching Block? 127 About the Example Application 127 Adding Items to and Retrieving Items from the Cache 127 What’s In My Cache? 130 Using the Isolated Storage Backing Store 131 Encrypting the Cached Data 133 Using the Database Backing Store 134 Removing Items From and Flushing the Cache 135 Using a File Dependency and Extended Time Expiration 136 Adding the Items to the Cache 137 Refreshing the Cache 139 Loading the Cache 141 Proactive Cache Loading 141 Reactive Cache Loading 142 Extending Your Cache Advance 143 Summary 144
  • 15. 6 Banishing Validation Complication 145 Introduction 145 Techniques for Validation 146 Where Should I Validate? 146 What Should I Validate? 146 How Should I Validate? 147 What Does the Validation Block Do? 147 The Range of Validators 149 Validating with Attributes 151 DataAnnotations Attributes 151 Self-Validation 152 Validation Rule Sets 154 Assigning Validation Rules to Rule Sets 154 Configuring Validation Block Rule Sets 154 Specifying Rule Sets When Validating 155 How Do I Use The Validation Block? 156 Preparing Your Application 156 Choosing a Validation Approach 157 Options for Creating Validators Programmatically 158 Performing Validation and Displaying Validation Errors 159 Understanding Message Template Tokens 160 Diving in With Some Simple Examples 161 Validating Objects and Collections of Objects 162 Creating a Type Validator using the ValidatorFactory 162 Delving Deeper into ValidationResults 163 Using the Object Validator 164 Differences Between the Object Validator and the Factory-Created Type Validators 165 Validating Collections of Objects 165 Using Validation Attributes 166 Using the Validation Block Attributes 166 Using Data Annotation Attributes 169 Defining Attributes in Metadata Classes 171 Specifying the Location of Validation Rules 172 Creating and Using Individual Validators 173 Validating Strings for Contained Characters 173 Validating Integers within a Domain 173 Validating with a Composite Validator 174 Validating Single Members of an Object 175 WCF Service Validation Integration 176 Defining Validation in the Service Contract 176 Editing the Service Configuration 177 Using the Product Service and Detecting Validation Errors 178 User Interface Validation Integration 180 ASP.NET User Interface Validation 180
  • 16. Windows Forms User Interface Validation 181 WPF User Interface Validation 181 Creating Custom Validators 182 Summary 182 7 Relieving Cryptography Complexity 183 Introduction 183 What Does the Cryptography Block Do? 183 A Secret Shared 184 Making a Hash of It 184 How Does the Cryptography Block Manage Encryption Keys? 184 How Does the Cryptography Block Integrate With Other Blocks? 185 How Do I Use the Cryptography Block? 185 Configuring Cryptographic Providers 186 Adding the Required References 187 Diving in with an Example 187 Encrypting and Decrypting Data Using A Symmetric Provider 188 Encrypting and Decrypting a Text String 188 Encrypting and Decrypting an Object Instance 189 Obtaining and Comparing Hash Values 191 Creating and Comparing Hash Values for Text Strings 191 Creating and Comparing Hash Values for Object Instances 193 Creating Custom Cryptography Providers 195 Summary 196 8 An Authentic Approach to Token Identity 197 Introduction 197 What Does the Security Block Do? 198 What are Authorization Rule Providers? 198 About Authorization Manager (AzMan) 198 Why Do I Need a Security Cache? 199 How Do I Configure the Security Block? 200 Configuring Authorization Rules 202 How Do I Use the Security Block? 202 Diving in With an Example 203 Caching a User Identity and Obtaining A Temporary Token 204 Displaying User Identity Details 205 Displaying Generic Principal Details 205 Authenticating a User Using a Token 206
  • 17. Terminating a User Session and Expiring the Token 207 Checking If a User is Authorized to Perform a Task 208 Using Security Block Configured Rules 208 Using AzMan Provider Rules 210 Creating Custom Authorization Providers 212 Summary 212 appendices a dependency injection with unity 213 What is Dependency Injection? 213 The Unity Dependency Injection and Interception Mechanism 214 Summary of Unity Features 215 Defining Dependencies with Unity 216 Constructor Injection 217 Automatic Constructor Injection 217 Design-Time Configuration 218 Run-Time Configuration 219 Configuration with Attributes 219 Property (Setter) Injection 220 Design-Time Configuration 220 Run-Time Configuration 221 Configuration with Attributes 221 Method Call Injection 222 Design-Time Configuration 222 Run-Time Configuration 223 Configuration with Attributes 223 More Dependency Injection Opportunities 224 Resolving Populated Instances of Your Classes 224 b dependency injection in enterprise library 225 Loading Configuration Information into a Unity Container 225 Viewing Registrations in the Container 226 Populating Entire Object Graphs at Application Startup 227 Maintaining a Container Reference in Request-Based Applications 228 Using an Alternative Service Locator or Container 229 c policy injection in enterprise library 231 d enterprise library configuration scenarios 233 About Enterprise Library Configuration 233 External Configuration 234 Programmatic Support 234 Using the Fluent Interfaces 234
  • 18. Scenarios for Advanced Configuration 235 scenario 1: Using The Default Application Configuration File 235 scenario 2: Using A Non-Default Configuration Store 235 scenario 3: Sharing The Same Configuration Between Multiple Applications 236 scenario 4: Managing And Enforcing Configuration For Multiple Applications 236 scenario 5: Sharing Configuration Sections Across Multiple Applications 237 scenario 6: Applying a Common Configuration Structure for Applications 238 Deployment Environments 239 e encrypting configuration files 241 index 243
  • 19. xiii Foreword You are holding in your hands a book that will make your life as an enterprise developer a whole lot easier. It’s a guide on Microsoft Enterprise Library and it’s meant to guide you through how to apply .NET for enterprise development. Enterprise Library, developed by the patterns & practices group, is a collection of reusable components, each addressing a specific cross cutting concern—be it system logging, or data validation, or exception management. Many of these can be taken advantage of easily. These components are architecture agnostic and can be applied in a multitude of different contexts. The book walks you through functional blocks of the Enterprise Library, which include data access, caching, cryptography, exception handling, logging, security, and validation. It contains a large collection of exercises, tricks and tips. Developing robust, reusable, and maintainable application requires knowledge of design patterns, software architectures and solid coding skills. We can help you develop those skills with Enterprise Library since it encapsulates proven and recommended prac- tices of developing enterprise applications on the .NET platform. Though this guide does not go into the depth of discussions of architecture and patterns, it provides a solid basis for you to discover and implement these patterns from a reusable set of components. That’s why I also encourage you to check out the Enterprise Library source code and read it. This guide is not meant to be a complete reference on Enterprise Library. For that, you should go to MSDN. Instead, the guide covers most commonly used scenarios and illustrates how Enterprise Library can be applied in implementing those. The powerful message manifesting from the guide is the importance of code reuse. In today’s world of complex large software systems, high-quality pluggable components are a must. After all, who can afford to write and then maintain dozens of different frameworks in a system— all to accomplish the same thing? Enterprise Library allows you to take advantage of the proven code complements to manage a wide range of task and leaves you free to concen- trate on the core business logic and other “working parts” of your application. Another important emphasis that the guide makes is on software designs, which are easy to configure, testable and maintainable. Enterprise Library has a flexible configura- tion subsystem driven from either external config files, or programmatically, or both. Leading by example, Enterprise Library itself is designed in a loosely-coupled manner. It
  • 20. promotes key design principles of the separation of concerns, single responsibility prin- ciple, principle of least knowledge and the DRY principle (Don’t Repeat Yourself). Having said this, don’t expect this particular guide to be a comprehensive reference on design patterns. It is not. It provides just enough to demonstrate how key patterns are used with Enterprise Library. Once you see and understand them, try to extrapolate them to other problems, contexts, scenarios. The authors succeeded in writing a book that is targeted at both those who are sea- soned Enterprise Library developers and who would like to learn about the improvements in version 5.0, and those, who are brand new to Enterprise Library. Hopefully, for the first group, it will help orientate you and also get a quick refresher of some of the key concepts. For the second group, the book may lower your learning curve and get you going with Enterprise Library quickly. Lastly, don’t just read this book. It is meant to be a practical tutorial. And learning comes only through practice. Experience Enterprise Library. Build something with it. Apply the concepts learnt in practice. And don’t forget to share your experience. In conclusion, I am excited about both the release of Enterprise Library 5.0 and this book. Especially, since they ship and support some of our great new releases—Visual Studio 2010, .NET Framework 4.0 and Silverlight 4, which together will make you, the developer, ever more productive. Scott Guthrie Corporate Vice-President Microsoft .NET Developer Platform Redmond, Washington
  • 21. Random documents with unrelated content Scribd suggests to you:
  • 22. Piamontese, Francesco, courier, 415, 420, 432, 433. Pleine, Gerard de, 5. Pole, Henry, Viscount Montague, eldest son of Margaret, Countess of Salisbury, his arrest and attainder, 166. is beheaded on Tower Hill, 167, 168. —— Katharine, the Princess Mary’s nurse, 6. —— Reginald, afterwards Cardinal, Archbishop of Canterbury, younger son of the Countess of Salisbury, 50, 51, 165, 166, 167, 235, 252, 254, 266, 267, 334, 335, 336, 337, 338, 339, 340, 344, 365, 380, 387, 397, 399, 402, 406, 409, 410, 420, 422, 424, 427, 429, 431, 433, 435, 437, 438, 444, 446, 452, 455, 456, 457, 458, 461, 462, 463, 468, 469, 470, 481. declines the Archbishopric of York, 50. leaves England, 51. his book on The Unity of the Church, 166. letter to Cardinal Contarini, 167. is made a Cardinal by Paul III., 335. urges Mary to reconcile the kingdom with Rome and to restore Church property, 235. not yet being pledged to the ecclesiastical state, is proposed as a husband for Queen Mary, 254. is appointed legate a latere et pro pace, 266. only just misses being elected Pope, 372 note, his letter to King Philip, 334. his attainder reversed, 338. returns to England, 339. reconciles the representatives of the nation to the Pope, 340. is appointed to conduct Cranmer’s trial for heresy, 387. is to take Philip’s place in the Government during the King’s absence, 399. consecrated Archbishop of Canterbury, 409, 410. is somewhat embarrassed by Philip’s return, 437. his death, 468.
  • 23. Pope, Sir Thomas, 291, 418. Portugal, King of, 11, 151, 315. —— the Princess of, afterwards the Empress Isabella, 11, 21 note, 19, 136, 165. —— the Infant of, 255. Poynet, John, Bishop of Winchester, 244, 354. Poyns, Sir Nicholas, 291. Priuli, Monsignor, 433, 468. Privy Council— of Edward VI., 187, 189, 194, 196, 197, 198, 200-212, 218-221, 223, 234, 237, 373, 385. of Queen Mary, 231, 234, 244, 245, 254, 261, 272, 276, 282, 283, 287, 295, 309, 310, 311, 319, 330, 332, 333, 334, 354, 357, 363, 364, 377, 390, 402, 405, 415, 437, 439, 440, 443, 466, 470, 474. urges Mary in vain to secure Elizabeth’s person, 276. panic-stricken on Wyatt’s rebellion, 283. for treating the rebels as heretics, 309, 357. some of the members incline to a secret understanding with Elizabeth, 402. and refuse to crown Philip, 405. R. Rauffe, John, gunner, 24. Renard, Simon, Imperial ambassador to Queen Mary, 215, 237, 246, 247, 251, 253, 254, 263, 264, 267, 270, 273, 277, 283, 295, 299, 308, 309, 310, 313, 329, 338, 357. entreats the Queen to take measures against Elizabeth’s disloyalty, 237. regards Elizabeth as the champion of the disaffected, 247. declares that she and Courtenay are in collusion, 253.
  • 24. introduces the subject of a marriage between Mary and Philip, 254. his dislike of Gardiner, 310. advises Philip to come with as little state as possible, 313. his letter to the Emperor after the royal marriage, 329. is sent to Brussels to negotiate the return of Cardinal Pole, 338. Ricardes, Dr., one of the Princess Mary’s chaplains, 203. Rich, Richard, first Baron, Lord Chancellor in Edward’s reign, 207, 208, 223. Richmond, Duke of, natural son of Henry VIII., 65, 105, 136, 153. Ridley, Nicholas, Bishop of London, 196, 212, 223, 224, 238, 268, 375, 377, 378. visits the Princess Mary at Hunsdon, 212. preaches against Mary’s accession, 223. is arrested at Ipswich and sent to the Tower, 224. Rochefoucauld, Count de la, 454. Rochester, Sir Robert, Comptroller of the Household, 203, 206, 209, 211, 212, 234, 261, 295, 432. Rochford, George Viscount. See Boleyn. Rœulx, Baron de, 102. Rogers, John, Prebendary of St. Paul’s, 372, 374. Ross, ——, a reformed preacher, 363. Rota, Court of the, 41, 57. Rowte, Sir Henry, chaplain to the Princess Mary, 6. Rudston, Master, 280, 287. Russell, Sir John, first Earl of Bedford, 44, 223, 278, 313, 326, 341. —— Francis, Viscount, son of the above, succeeded him as second Earl, 296. Rutland, Henry Manners, Earl of, 403.
  • 25. Ruy Gomez, Prince of Eboli, 313. S. Sagudino, Venetian envoy, 5. Sainte Croix, Prosper de, 253. St. Asaph, Bishop of, Thomas Goldwell, 469. Saint Thomas of Aquin, 361. Salinas, Martin de, 18. Salisbury, Margaret Plantagenet, Countess of, 2, 25, 26, 64, 81, 166, 167, 168, 181. accompanies the Princess Mary into Wales, 25. is removed from Mary’s household, 64. her arrest and attainder, 166. her execution, 168, 181. Saluce, Marquis de, 67. Sampson, Dr., 59. Sanguino, Signor Carlo da, gentleman of the mouth to Philip II., 396. San Saluto, Abbot of, 406. Saunders, Laurence, Rector of All Hallows, 372, 374. Savage, Mistress Anne, 98 note. Savagnano, Mario, his report of a visit to the English court, 45. Savoy, Duke of. See Emmanuel Philibert. Scory, Dr. John, successively Bishop of Rochester, Chichester and Hereford, 243. Seamer, Master John, 291. Selve, Monsieur de, French ambassador to the Venetian Republic, 275.
  • 26. Seymour, Edward, Earl of Hertford, afterwards Duke of Somerset, and Lord Protector, 189, 193, 194, 196, 211. —— Jane, third wife of Henry VIII., sister of the above, 99, 103, 105, 107, 112, 125, 137, 149, 150, 153, 154. her affection for the Princess Mary, 125, 150. her death, 153. —— Sir Thomas, Lord Seymour of Sudley, Lord High Admiral, 189, 190, 193. Sforza, Francesco, Duke of Milan, 49. Shelton, Sir John, 218. —— Lady (also called Mistress), governess to the Princess Mary, 69, 70, 75, 81, 99, 124. Shrewsbury, Earl of, 142, 223, 225. Skeffington, Sir William, 24. Smith, Sir Thomas, Secretary of State in Edward’s reign, 196, 374. Sorranzo, Giacomo, Venetian ambassador to England, 261, 302, 518. to France, 411, 412. his description of Queen Mary, 318. Soto Pedro, 254, 377, 380. Southwell, Sir Richard, Master of the Ordnance, 295. Spaniards in England, 323, 329, 343, 344, 356, 436. Speke, Sir George, 167. Spinelli, Gasparo, 28, 29, 30. Stafford, Thomas, grandson of the Duke of Buckingham, 441, 442, 452. Strelley, Sir Anthony, 403. —— Mrs. Frideswide, 351. Strozzi, Prince, 454.
  • 27. Stuart, Mary, Queen of Scots, 215, 245, 274, 306 note, 315, 359. Suffolk, Duke of. See Brandon, Charles, and Grey, Henry. —— Frances, Duchess of, daughter of Charles Brandon, Duke of Suffolk, and Mary Tudor, Queen Dowager of France, sister of Henry VIII., 214, 219, 232, 279. Surian, Michiel, replaces Giovanni Michiel as Venetian ambassador to England, 436, 437, 439, 443, 444, 451, 453, 462, 465, 468. Sussex, Earl of, 58, 59, 124, 218, 304, 305, 328. Sweden, Gustavus Vasa, King of, 464. Sydney, Elizabeth, 220 note. —— Mabel, ibid. T. Tarbes, Bishop of. See Grammont. Taylor, John, alias Cardmaker, Rector of Hadley, 372, 374. Thirlby, Thomas, Bishop of Ely in the reign of Mary, 326, 387, 388, 400, 424. Thomas, William, plots the murder of Queen Mary, 355. Throckmorton, Sir Nicholas, 198, 410, 486. Trivulci, Cardinal, 452. Tunstal, Cuthbert, successively Bishop of London and of Durham, 9, 20, 21, 22, 231, 326. ambassador-extraordinary to Spain, 20. his opinion of the Princess Mary, 22. released from the Tower on Mary’s accession, 231. Turenne, Vicomte de, 30, 31. U.
  • 28. Udal, Nicholas, Headmaster of Eton College, and Vicar of Braintree, 183, 410. Underhill, Edward, Gospeller, 227, 288, 327, 469 note. V. Vagrancy, 248. Venier, Marc Antonio, 47. Vives, Ludovicus, 26, 39, 40. W. Waldegrave, Sir Edward, a member of the Princess Mary’s household, afterwards Master of the Wardrobe, 203, 205, 211, 234. Wallop, Sir John, English ambassador to Francis I., 47, 154. Warham, William, Archbishop of Canterbury, 36, 37, 52, 381. Warre, Lord de la, 416, 421. Warwick, Earl of. See Northumberland, Duke of. —— —— eldest son of the above, 231. Wassilegevich, Ivan, Czar of Russia, 488. Wentworth, Lord, Deputy-governor of Calais, 448, 450. Westmorland, Earl of, 442. Weston, Dr., 302, 311, 386. Westweek, Father, 514 App. White, Dr., Bishop of Winchester, preaches Queen Mary’s funeral sermon, and suffers for his praise of her, 472-474. Williams, Sir John, 225. —— Lord, of Thame, 312.
  • 29. Willoughby, Sir Hugh, 488. Wiltshire, Earl of. See Boleyn, Sir Thomas. Winchester, Marquis of, Lord High Treasurer, 223, 234, 304, 305, 326. Windsor, Sir Andrew, 24. —— Lord, 225. Wingfield, Sir Anthony, Comptroller of the Household to Edward VI., 207. —— Sir Richard, ambassador-extraordinary to Spain, 23 note, 20, 21. Wolsey, Cardinal of York and Lord Chancellor, 2, 4, 6, 7, 8, 9, 12, 13, 14, 18, 19, 24, 28, 32, 33, 36, 37, 38, 40, 41, 50, 55, 136. sponsor at the baptism of the Princess Mary, 2. his ascendency over the King, 4, 6. his foreign policy, 12, 13, 18. his ambition and dreams of the Papacy, 28, 32. schemes to marry the Princess Mary to Francis I., 33. opens a legatine Court, in conjunction with Campeggio, 40. his disgrace, 41, 50, 55. Wood, Anthony à, 367. —— Avis, laundress to the Princess Mary, 6. Worcester, Earl of, 289, 308. Worth, John, his letter to Lord Lisle, 167. Wotton, Dr., Dean of the Chapel to the Princess Mary, and ambassador to Charles V. and Henry II., 25, 201, 202, 266, 406, 442. Wriothesley, Sir Thomas, Keeper of the Wardrobe, and Secretary to Thomas Cromwell, 162, 170, 172. Wyatt, Sir Thomas, son of the poet, special envoy from Henry VIII. to Charles V., and author of the second rebellion under Mary,
  • 30. 145, 151, 275, 277, 280, 282, 287, 289, 290, 291, 292, 296, 299, 303, 308, 311. sets up the standard of revolt in Kent, 280. arrives at Hyde Park Corner, 289. gives himself up at Temple Bar, 290. his conflicting statements concerning Elizabeth and Courtenay, 296, 299, 311. his execution, 311. Z. Zapolski, John, King of Hungary, 49. Zwingli Ulrich, Swiss reformer, 372.
  • 31. THE ABERDEEN UNIVERSITY PRESS LIMITED. Transcriber’s Note: The original spelling, hyphenation, and punctuation have been retained, with the exception of apparent typographical errors which have been corrected without note. Ambiguous hyphens at the ends of lines were retained. Punctuation and spelling were made consistent when a predominant form was found in this book; otherwise they were not changed. Mid-paragraph illustrations have been moved between paragraphs and some illustrations have been moved closer to the text that references them. The List of Illustrations paginations were changed accordingly. Footnotes were moved to the end of chapters and numbered in one continuous sequence. These variants of Boleyn were unchanged: Boleyne (p. 85), Boleine (p. 149). p. 243: “with mine own seal joined thereto.”[1] Footnote anchor removed by
  • 32. the transcriber as it lacks a corresponding footnote.
  • 33. *** END OF THE PROJECT GUTENBERG EBOOK THE HISTORY OF MARY I, QUEEN OF ENGLAND *** Updated editions will replace the previous one—the old editions will be renamed. Creating the works from print editions not protected by U.S. copyright law means that no one owns a United States copyright in these works, so the Foundation (and you!) can copy and distribute it in the United States without permission and without paying copyright royalties. Special rules, set forth in the General Terms of Use part of this license, apply to copying and distributing Project Gutenberg™ electronic works to protect the PROJECT GUTENBERG™ concept and trademark. Project Gutenberg is a registered trademark, and may not be used if you charge for an eBook, except by following the terms of the trademark license, including paying royalties for use of the Project Gutenberg trademark. If you do not charge anything for copies of this eBook, complying with the trademark license is very easy. You may use this eBook for nearly any purpose such as creation of derivative works, reports, performances and research. Project Gutenberg eBooks may be modified and printed and given away—you may do practically ANYTHING in the United States with eBooks not protected by U.S. copyright law. Redistribution is subject to the trademark license, especially commercial redistribution. START: FULL LICENSE
  • 34. THE FULL PROJECT GUTENBERG LICENSE
  • 35. PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK To protect the Project Gutenberg™ mission of promoting the free distribution of electronic works, by using or distributing this work (or any other work associated in any way with the phrase “Project Gutenberg”), you agree to comply with all the terms of the Full Project Gutenberg™ License available with this file or online at www.gutenberg.org/license. Section 1. General Terms of Use and Redistributing Project Gutenberg™ electronic works 1.A. By reading or using any part of this Project Gutenberg™ electronic work, you indicate that you have read, understand, agree to and accept all the terms of this license and intellectual property (trademark/copyright) agreement. If you do not agree to abide by all the terms of this agreement, you must cease using and return or destroy all copies of Project Gutenberg™ electronic works in your possession. If you paid a fee for obtaining a copy of or access to a Project Gutenberg™ electronic work and you do not agree to be bound by the terms of this agreement, you may obtain a refund from the person or entity to whom you paid the fee as set forth in paragraph 1.E.8. 1.B. “Project Gutenberg” is a registered trademark. It may only be used on or associated in any way with an electronic work by people who agree to be bound by the terms of this agreement. There are a few things that you can do with most Project Gutenberg™ electronic works even without complying with the full terms of this agreement. See paragraph 1.C below. There are a lot of things you can do with Project Gutenberg™ electronic works if you follow the terms of this agreement and help preserve free future access to Project Gutenberg™ electronic works. See paragraph 1.E below.
  • 36. 1.C. The Project Gutenberg Literary Archive Foundation (“the Foundation” or PGLAF), owns a compilation copyright in the collection of Project Gutenberg™ electronic works. Nearly all the individual works in the collection are in the public domain in the United States. If an individual work is unprotected by copyright law in the United States and you are located in the United States, we do not claim a right to prevent you from copying, distributing, performing, displaying or creating derivative works based on the work as long as all references to Project Gutenberg are removed. Of course, we hope that you will support the Project Gutenberg™ mission of promoting free access to electronic works by freely sharing Project Gutenberg™ works in compliance with the terms of this agreement for keeping the Project Gutenberg™ name associated with the work. You can easily comply with the terms of this agreement by keeping this work in the same format with its attached full Project Gutenberg™ License when you share it without charge with others. 1.D. The copyright laws of the place where you are located also govern what you can do with this work. Copyright laws in most countries are in a constant state of change. If you are outside the United States, check the laws of your country in addition to the terms of this agreement before downloading, copying, displaying, performing, distributing or creating derivative works based on this work or any other Project Gutenberg™ work. The Foundation makes no representations concerning the copyright status of any work in any country other than the United States. 1.E. Unless you have removed all references to Project Gutenberg: 1.E.1. The following sentence, with active links to, or other immediate access to, the full Project Gutenberg™ License must appear prominently whenever any copy of a Project Gutenberg™ work (any work on which the phrase “Project
  • 37. Gutenberg” appears, or with which the phrase “Project Gutenberg” is associated) is accessed, displayed, performed, viewed, copied or distributed: This eBook is for the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. 1.E.2. If an individual Project Gutenberg™ electronic work is derived from texts not protected by U.S. copyright law (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase “Project Gutenberg” associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9. 1.E.3. If an individual Project Gutenberg™ electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg™ License for all works posted with the permission of the copyright holder found at the beginning of this work. 1.E.4. Do not unlink or detach or remove the full Project Gutenberg™ License terms from this work, or any files
  • 38. containing a part of this work or any other work associated with Project Gutenberg™. 1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1 with active links or immediate access to the full terms of the Project Gutenberg™ License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg™ work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg™ website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg™ License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg™ works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg™ electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg™ works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg™ trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty
  • 39. payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information about donations to the Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright
  • 40. law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund.
  • 41. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg™
  • 42. Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non- profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact
  • 43. Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookultra.com