Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer
Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer
Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer
Gupta Art & Architecture Temple and Sculptures.pptxVirag Sontakke
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock Rajshri Ghogare
Cybersecurity: How to Protect your Digital World from Hackersvaidikpanda4
Ad
Developer s Guide to Microsoft Enterprise Library C Edition Alex Homer
1. Developer s Guide to Microsoft Enterprise
Library C Edition Alex Homer download
https://ebookultra.com/download/developer-s-guide-to-microsoft-
enterprise-library-c-edition-alex-homer/
Explore and download more ebooks or textbooks
at ebookultra.com
2. We believe these products will be a great fit for you. Click
the link to download now, or visit ebookultra.com
to discover even more!
C net Web Developer s Guide 1st Edition Saurabh Nandu
https://ebookultra.com/download/c-net-web-developer-s-guide-1st-
edition-saurabh-nandu/
The Little Book on CoffeeScript The JavaScript Developer s
Guide to Building Better Web Apps 1st Edition Alex Maccaw
https://ebookultra.com/download/the-little-book-on-coffeescript-the-
javascript-developer-s-guide-to-building-better-web-apps-1st-edition-
alex-maccaw/
Applications Code Markup A Guide to the Microsoft Windows
Presentation Foundation Pro Developer 1st Edition Charles
Petzold
https://ebookultra.com/download/applications-code-markup-a-guide-to-
the-microsoft-windows-presentation-foundation-pro-developer-1st-
edition-charles-petzold/
Developer s Guide to Web Application Security 1st Edition
Michael Cross
https://ebookultra.com/download/developer-s-guide-to-web-application-
security-1st-edition-michael-cross/
3. The NET Developer s Guide to Windows Security 1st Edition
Keith Brown
https://ebookultra.com/download/the-net-developer-s-guide-to-windows-
security-1st-edition-keith-brown/
The Ruby Developer s Guide 1st Edition Syngress
https://ebookultra.com/download/the-ruby-developer-s-guide-1st-
edition-syngress/
Professional Microsoft Robotics Developer Studio Wrox
Programmer to Programmer 1st Edition Kyle Johns
https://ebookultra.com/download/professional-microsoft-robotics-
developer-studio-wrox-programmer-to-programmer-1st-edition-kyle-johns/
Sun Certification Training Guide 310 080 Java 2 Enterprise
Edition J2EE Web Component Developer Alain Trottier
https://ebookultra.com/download/sun-certification-training-
guide-310-080-java-2-enterprise-edition-j2ee-web-component-developer-
alain-trottier/
Microsoft SharePoint 2010 Developer Reference 1st Edition
Paolo Pialorsi
https://ebookultra.com/download/microsoft-sharepoint-2010-developer-
reference-1st-edition-paolo-pialorsi/
5. Developer s Guide to Microsoft Enterprise Library C
Edition Alex Homer Digital Instant Download
Author(s): Alex Homer, Nicolas Botto
ISBN(s): 9780735645233, 073564523X
Edition: Kindle
File Details: PDF, 3.35 MB
Year: 2010
Language: english
6. D E V E LO P E R S ’ S GU I D E TO
M I C R O S O F T
®
EN T E R P R I S E
LI B R A RY
Alex Homer
with
Nicolas Botto
Bob Brumfield
Grigori Melnik
Erik Renaud
Fernando Simonazzi
Chris Tavares
Solutions for
Enterprise Development
C# Edition
11. Contents
preface xv
About This Guide xv
What Does This Guide Cover? xv
What This Guide Does Not Cover xvi
How Will This Guide Help You? xvii
What Do You Need to Get Started? xvii
the team who brought you this guide xix
The Enterprise Library 5.0 Development Team xix
1 Welcome to the Library 1
Meet the Librarian 1
What You Get with Enterprise Library 1
Things You Can Do with Enterprise Library 3
Why You Should Use Enterprise Library 4
Some Fundamentals of Enterprise Library 6
Choosing Which Blocks To Install 6
Installing Enterprise Library 7
Assemblies And References 7
GAC or Bin, Signed or Unsigned? 8
Importing Namespaces 9
Configuring Enterprise Library 10
The Configuration Tools 10
Using The Configuration Tools 11
Encrypting Configuration Sections 14
Instantiating and Using Enterprise Library Objects 14
Enterprise Library Objects, Facades, and Factories 15
foreword
Scott Guthrie ix
12. Creating Instances of Enterprise Library Types 15
The Simple Approach
— Using The Enterprise Library Service Locator 16
The Sophisticated Approach
— Accessing The Container Directly 16
Pros and Cons of Object Instantiation 18
More Reasons to be Sophisticated 19
Getting Objects From Previous Versions
Of Enterprise Library 21
The Example Applications 22
Summary 23
2 Much ADO about Data Access 25
Introduction 25
What Does the Data Access Application Block Do? 26
Data Operations Supported by the Data Access Block 26
How Do I Use the Data Access Block? 28
Configuring the Block and Referencing the Required Assemblies 28
Creating Database Instances 29
The Example Application 30
Reading Multiple Data Rows 31
Reading Rows Using a Query with No Parameters 31
Reading Rows Using an Array of Parameter Values 32
Reading Rows Using Queries with Named Parameters 33
Retrieving Data as Objects 35
About Accessors 35
Creating and Executing an Accessor 37
Creating and Using Mappers 38
Retrieving Xml Data 39
Retrieving Single Scalar Values 40
Retrieving Data Asynchronously 41
Preparing for Asynchronous Data Access 42
Retrieving Row Set Data Asynchronously 43
Retrieving Data as Objects Asynchronously 45
Updating Data 45
Executing an Update Query 46
Working with DataSets 47
Updating the Database from a DataSet 48
Managing Connections 52
Working with Connection-Based Transactions 53
Working with Distributed Transactions 55
Extending the Block to Use Other Databases 58
Summary 58
13. 3 Error Management Made Exceptionally Easy 61
Introduction 61
When Should I Use the Exception Handling Block? 62
How Do I Use the Exception Handling Block? 62
What Exception Policies Do I Need? 63
Allowing Exceptions to Propagate 63
About Exception Handling Policies 63
Choosing an Exception Handling Strategy 65
Process or Handle Exception? 66
Using the Process Method 67
Diving in with a Simple Example 68
Applying Exception Shielding 69
Wrapping an Exception 70
Configuring the Wrap Handler Policy 70
Initializing the Exception Handling Block 71
Editing the Application Code to Use the New Policy 71
Replacing an Exception 74
Logging an Exception 75
Shielding Exceptions at WCF Service Boundaries 78
Creating a Fault Contract 78
Configuring the Exception Handling Policy 78
Editing the Service Code to Use the New Policy 79
The Fault Contract Exception Handler 80
Handling Specific Exception Types 81
Executing Code around Exception Handling 82
Assisting Administrators 84
Extending Your Exception Handling 87
Summary 87
4 As Easy as Falling Off a Log 89
Introduction 89
What Does the Logging Block Do? 90
Logging Categories 92
Logging Overhead and Additional Context Information 93
How Do I Use the Logging Block? 93
Configuring the Logging Block 93
Initializing the Logging Block 94
Diving In with an Example 95
Creating and Writing Log Entries with a Logwriter 95
About Logging Categories 98
Filtering by Category 100
Writing Log Entries to Multiple Categories 100
Controlling Output Formatting 101
14. Non-Formatted Trace Listeners 102
Filtering by Severity in a Trace Listener 103
Filtering All Log Entries by Priority 103
Creating and Using Logentry Objects 104
Capturing Unprocessed Events and Logging Errors 105
About Special Sources 105
An Example of Using Special Sources 106
Logging to a Database 108
Using the Database Trace Listener 109
Testing Logging Filter Status 110
Obtaining Information about Trace Sources
and Trace Listeners 111
Checking if Filters Will Block a Log Entry 112
Adding Additional Context Information 114
Tracing and Correlating Activities 115
An Example of Tracing Activities 116
Creating Custom Trace Listeners, Filters, and Formatters 119
Summary 119
5 A Cache Advance for Your Applications 121
Introduction 121
What Does the Caching Block Do? 123
Flushed or Expired? 123
Which Expiration Policy? 124
How Do I Configure the Caching Block? 124
Persistent Caching 125
Encrypting Cached Items 126
Initializing the Caching Block 126
How Do I Use the Caching Block? 127
About the Example Application 127
Adding Items to and Retrieving Items from the Cache 127
What’s In My Cache? 130
Using the Isolated Storage Backing Store 131
Encrypting the Cached Data 133
Using the Database Backing Store 134
Removing Items From and Flushing the Cache 135
Using a File Dependency and Extended Time Expiration 136
Adding the Items to the Cache 137
Refreshing the Cache 139
Loading the Cache 141
Proactive Cache Loading 141
Reactive Cache Loading 142
Extending Your Cache Advance 143
Summary 144
15. 6 Banishing Validation Complication 145
Introduction 145
Techniques for Validation 146
Where Should I Validate? 146
What Should I Validate? 146
How Should I Validate? 147
What Does the Validation Block Do? 147
The Range of Validators 149
Validating with Attributes 151
DataAnnotations Attributes 151
Self-Validation 152
Validation Rule Sets 154
Assigning Validation Rules to Rule Sets 154
Configuring Validation Block Rule Sets 154
Specifying Rule Sets When Validating 155
How Do I Use The Validation Block? 156
Preparing Your Application 156
Choosing a Validation Approach 157
Options for Creating Validators Programmatically 158
Performing Validation and Displaying Validation Errors 159
Understanding Message Template Tokens 160
Diving in With Some Simple Examples 161
Validating Objects and Collections of Objects 162
Creating a Type Validator using the ValidatorFactory 162
Delving Deeper into ValidationResults 163
Using the Object Validator 164
Differences Between the Object Validator
and the Factory-Created Type Validators 165
Validating Collections of Objects 165
Using Validation Attributes 166
Using the Validation Block Attributes 166
Using Data Annotation Attributes 169
Defining Attributes in Metadata Classes 171
Specifying the Location of Validation Rules 172
Creating and Using Individual Validators 173
Validating Strings for Contained Characters 173
Validating Integers within a Domain 173
Validating with a Composite Validator 174
Validating Single Members of an Object 175
WCF Service Validation Integration 176
Defining Validation in the Service Contract 176
Editing the Service Configuration 177
Using the Product Service and Detecting Validation Errors 178
User Interface Validation Integration 180
ASP.NET User Interface Validation 180
16. Windows Forms User Interface Validation 181
WPF User Interface Validation 181
Creating Custom Validators 182
Summary 182
7 Relieving Cryptography Complexity 183
Introduction 183
What Does the Cryptography Block Do? 183
A Secret Shared 184
Making a Hash of It 184
How Does the Cryptography Block Manage
Encryption Keys? 184
How Does the Cryptography Block Integrate
With Other Blocks? 185
How Do I Use the Cryptography Block? 185
Configuring Cryptographic Providers 186
Adding the Required References 187
Diving in with an Example 187
Encrypting and Decrypting Data Using
A Symmetric Provider 188
Encrypting and Decrypting a Text String 188
Encrypting and Decrypting an Object Instance 189
Obtaining and Comparing Hash Values 191
Creating and Comparing Hash Values for Text Strings 191
Creating and Comparing Hash Values for Object Instances 193
Creating Custom Cryptography Providers 195
Summary 196
8 An Authentic Approach to Token Identity 197
Introduction 197
What Does the Security Block Do? 198
What are Authorization Rule Providers? 198
About Authorization Manager (AzMan) 198
Why Do I Need a Security Cache? 199
How Do I Configure the Security Block? 200
Configuring Authorization Rules 202
How Do I Use the Security Block? 202
Diving in With an Example 203
Caching a User Identity and Obtaining
A Temporary Token 204
Displaying User Identity Details 205
Displaying Generic Principal Details 205
Authenticating a User Using a Token 206
17. Terminating a User Session and Expiring the Token 207
Checking If a User is Authorized to Perform a Task 208
Using Security Block Configured Rules 208
Using AzMan Provider Rules 210
Creating Custom Authorization Providers 212
Summary 212
appendices
a dependency injection with unity 213
What is Dependency Injection? 213
The Unity Dependency Injection and Interception Mechanism 214
Summary of Unity Features 215
Defining Dependencies with Unity 216
Constructor Injection 217
Automatic Constructor Injection 217
Design-Time Configuration 218
Run-Time Configuration 219
Configuration with Attributes 219
Property (Setter) Injection 220
Design-Time Configuration 220
Run-Time Configuration 221
Configuration with Attributes 221
Method Call Injection 222
Design-Time Configuration 222
Run-Time Configuration 223
Configuration with Attributes 223
More Dependency Injection Opportunities 224
Resolving Populated Instances of Your Classes 224
b dependency injection in enterprise library 225
Loading Configuration Information into a Unity Container 225
Viewing Registrations in the Container 226
Populating Entire Object Graphs at Application Startup 227
Maintaining a Container Reference in Request-Based
Applications 228
Using an Alternative Service Locator or Container 229
c policy injection in enterprise library 231
d enterprise library configuration scenarios 233
About Enterprise Library Configuration 233
External Configuration 234
Programmatic Support 234
Using the Fluent Interfaces 234
18. Scenarios for Advanced Configuration 235
scenario 1: Using The Default Application
Configuration File 235
scenario 2: Using A Non-Default Configuration Store 235
scenario 3: Sharing The Same Configuration
Between Multiple Applications 236
scenario 4: Managing And Enforcing Configuration
For Multiple Applications 236
scenario 5: Sharing Configuration Sections
Across Multiple Applications 237
scenario 6: Applying a Common Configuration
Structure for Applications 238
Deployment Environments 239
e encrypting configuration files 241
index 243
19. xiii
Foreword
You are holding in your hands a book that will make your life as an enterprise developer a
whole lot easier.
It’s a guide on Microsoft Enterprise Library and it’s meant to guide you through how
to apply .NET for enterprise development. Enterprise Library, developed by the patterns
& practices group, is a collection of reusable components, each addressing a specific cross
cutting concern—be it system logging, or data validation, or exception management.
Many of these can be taken advantage of easily. These components are architecture
agnostic and can be applied in a multitude of different contexts.
The book walks you through functional blocks of the Enterprise Library, which
include data access, caching, cryptography, exception handling, logging, security, and
validation. It contains a large collection of exercises, tricks and tips.
Developing robust, reusable, and maintainable application requires knowledge of
design patterns, software architectures and solid coding skills. We can help you develop
those skills with Enterprise Library since it encapsulates proven and recommended prac-
tices of developing enterprise applications on the .NET platform. Though this guide does
not go into the depth of discussions of architecture and patterns, it provides a solid basis
for you to discover and implement these patterns from a reusable set of components.
That’s why I also encourage you to check out the Enterprise Library source code and
read it.
This guide is not meant to be a complete reference on Enterprise Library. For that,
you should go to MSDN. Instead, the guide covers most commonly used scenarios and
illustrates how Enterprise Library can be applied in implementing those. The powerful
message manifesting from the guide is the importance of code reuse. In today’s world of
complex large software systems, high-quality pluggable components are a must. After all,
who can afford to write and then maintain dozens of different frameworks in a system—
all to accomplish the same thing? Enterprise Library allows you to take advantage of the
proven code complements to manage a wide range of task and leaves you free to concen-
trate on the core business logic and other “working parts” of your application.
Another important emphasis that the guide makes is on software designs, which are
easy to configure, testable and maintainable. Enterprise Library has a flexible configura-
tion subsystem driven from either external config files, or programmatically, or both.
Leading by example, Enterprise Library itself is designed in a loosely-coupled manner. It
20. promotes key design principles of the separation of concerns, single responsibility prin-
ciple, principle of least knowledge and the DRY principle (Don’t Repeat Yourself). Having
said this, don’t expect this particular guide to be a comprehensive reference on design
patterns. It is not. It provides just enough to demonstrate how key patterns are used with
Enterprise Library. Once you see and understand them, try to extrapolate them to other
problems, contexts, scenarios.
The authors succeeded in writing a book that is targeted at both those who are sea-
soned Enterprise Library developers and who would like to learn about the improvements
in version 5.0, and those, who are brand new to Enterprise Library. Hopefully, for the
first group, it will help orientate you and also get a quick refresher of some of the key
concepts. For the second group, the book may lower your learning curve and get you
going with Enterprise Library quickly.
Lastly, don’t just read this book. It is meant to be a practical tutorial. And learning
comes only through practice. Experience Enterprise Library. Build something with it.
Apply the concepts learnt in practice. And don’t forget to share your experience.
In conclusion, I am excited about both the release of Enterprise Library 5.0 and this
book. Especially, since they ship and support some of our great new releases—Visual
Studio 2010, .NET Framework 4.0 and Silverlight 4, which together will make you, the
developer, ever more productive.
Scott Guthrie
Corporate Vice-President
Microsoft .NET Developer Platform
Redmond, Washington
22. Piamontese, Francesco, courier, 415, 420, 432, 433.
Pleine, Gerard de, 5.
Pole, Henry, Viscount Montague, eldest son of Margaret, Countess of
Salisbury, his arrest and attainder, 166.
is beheaded on Tower Hill, 167, 168.
—— Katharine, the Princess Mary’s nurse, 6.
—— Reginald, afterwards Cardinal, Archbishop of Canterbury,
younger son of the Countess of Salisbury, 50, 51, 165, 166, 167,
235, 252, 254, 266, 267, 334, 335, 336, 337, 338, 339, 340, 344,
365, 380, 387, 397, 399, 402, 406, 409, 410, 420, 422, 424, 427,
429, 431, 433, 435, 437, 438, 444, 446, 452, 455, 456, 457, 458,
461, 462, 463, 468, 469, 470, 481.
declines the Archbishopric of York, 50.
leaves England, 51.
his book on The Unity of the Church, 166.
letter to Cardinal Contarini, 167.
is made a Cardinal by Paul III., 335.
urges Mary to reconcile the kingdom with Rome and to restore
Church property, 235.
not yet being pledged to the ecclesiastical state, is proposed as a
husband for Queen Mary, 254.
is appointed legate a latere et pro pace, 266.
only just misses being elected Pope, 372 note,
his letter to King Philip, 334.
his attainder reversed, 338.
returns to England, 339.
reconciles the representatives of the nation to the Pope, 340.
is appointed to conduct Cranmer’s trial for heresy, 387.
is to take Philip’s place in the Government during the King’s
absence, 399.
consecrated Archbishop of Canterbury, 409, 410.
is somewhat embarrassed by Philip’s return, 437.
his death, 468.
23. Pope, Sir Thomas, 291, 418.
Portugal, King of, 11, 151, 315.
—— the Princess of, afterwards the Empress Isabella, 11, 21 note,
19, 136, 165.
—— the Infant of, 255.
Poynet, John, Bishop of Winchester, 244, 354.
Poyns, Sir Nicholas, 291.
Priuli, Monsignor, 433, 468.
Privy Council—
of Edward VI., 187, 189, 194, 196, 197, 198, 200-212, 218-221,
223, 234, 237, 373, 385.
of Queen Mary, 231, 234, 244, 245, 254, 261, 272, 276, 282, 283,
287, 295, 309, 310, 311, 319, 330, 332, 333, 334, 354, 357,
363, 364, 377, 390, 402, 405, 415, 437, 439, 440, 443, 466,
470, 474.
urges Mary in vain to secure Elizabeth’s person, 276.
panic-stricken on Wyatt’s rebellion, 283.
for treating the rebels as heretics, 309, 357.
some of the members incline to a secret understanding with
Elizabeth, 402.
and refuse to crown Philip, 405.
R.
Rauffe, John, gunner, 24.
Renard, Simon, Imperial ambassador to Queen Mary, 215, 237, 246,
247, 251, 253, 254, 263, 264, 267, 270, 273, 277, 283, 295, 299,
308, 309, 310, 313, 329, 338, 357.
entreats the Queen to take measures against Elizabeth’s
disloyalty, 237.
regards Elizabeth as the champion of the disaffected, 247.
declares that she and Courtenay are in collusion, 253.
24. introduces the subject of a marriage between Mary and Philip,
254.
his dislike of Gardiner, 310.
advises Philip to come with as little state as possible, 313.
his letter to the Emperor after the royal marriage, 329.
is sent to Brussels to negotiate the return of Cardinal Pole, 338.
Ricardes, Dr., one of the Princess Mary’s chaplains, 203.
Rich, Richard, first Baron, Lord Chancellor in Edward’s reign, 207,
208, 223.
Richmond, Duke of, natural son of Henry VIII., 65, 105, 136, 153.
Ridley, Nicholas, Bishop of London, 196, 212, 223, 224, 238, 268,
375, 377, 378.
visits the Princess Mary at Hunsdon, 212.
preaches against Mary’s accession, 223.
is arrested at Ipswich and sent to the Tower, 224.
Rochefoucauld, Count de la, 454.
Rochester, Sir Robert, Comptroller of the Household, 203, 206, 209,
211, 212, 234, 261, 295, 432.
Rochford, George Viscount. See Boleyn.
Rœulx, Baron de, 102.
Rogers, John, Prebendary of St. Paul’s, 372, 374.
Ross, ——, a reformed preacher, 363.
Rota, Court of the, 41, 57.
Rowte, Sir Henry, chaplain to the Princess Mary, 6.
Rudston, Master, 280, 287.
Russell, Sir John, first Earl of Bedford, 44, 223, 278, 313, 326, 341.
—— Francis, Viscount, son of the above, succeeded him as second
Earl, 296.
Rutland, Henry Manners, Earl of, 403.
25. Ruy Gomez, Prince of Eboli, 313.
S.
Sagudino, Venetian envoy, 5.
Sainte Croix, Prosper de, 253.
St. Asaph, Bishop of, Thomas Goldwell, 469.
Saint Thomas of Aquin, 361.
Salinas, Martin de, 18.
Salisbury, Margaret Plantagenet, Countess of, 2, 25, 26, 64, 81, 166,
167, 168, 181.
accompanies the Princess Mary into Wales, 25.
is removed from Mary’s household, 64.
her arrest and attainder, 166.
her execution, 168, 181.
Saluce, Marquis de, 67.
Sampson, Dr., 59.
Sanguino, Signor Carlo da, gentleman of the mouth to Philip II., 396.
San Saluto, Abbot of, 406.
Saunders, Laurence, Rector of All Hallows, 372, 374.
Savage, Mistress Anne, 98 note.
Savagnano, Mario, his report of a visit to the English court, 45.
Savoy, Duke of. See Emmanuel Philibert.
Scory, Dr. John, successively Bishop of Rochester, Chichester and
Hereford, 243.
Seamer, Master John, 291.
Selve, Monsieur de, French ambassador to the Venetian Republic,
275.
26. Seymour, Edward, Earl of Hertford, afterwards Duke of Somerset,
and Lord Protector, 189, 193, 194, 196, 211.
—— Jane, third wife of Henry VIII., sister of the above, 99, 103,
105, 107, 112, 125, 137, 149, 150, 153, 154.
her affection for the Princess Mary, 125, 150.
her death, 153.
—— Sir Thomas, Lord Seymour of Sudley, Lord High Admiral, 189,
190, 193.
Sforza, Francesco, Duke of Milan, 49.
Shelton, Sir John, 218.
—— Lady (also called Mistress), governess to the Princess Mary, 69,
70, 75, 81, 99, 124.
Shrewsbury, Earl of, 142, 223, 225.
Skeffington, Sir William, 24.
Smith, Sir Thomas, Secretary of State in Edward’s reign, 196, 374.
Sorranzo, Giacomo, Venetian ambassador to England, 261, 302, 518.
to France, 411, 412.
his description of Queen Mary, 318.
Soto Pedro, 254, 377, 380.
Southwell, Sir Richard, Master of the Ordnance, 295.
Spaniards in England, 323, 329, 343, 344, 356, 436.
Speke, Sir George, 167.
Spinelli, Gasparo, 28, 29, 30.
Stafford, Thomas, grandson of the Duke of Buckingham, 441, 442,
452.
Strelley, Sir Anthony, 403.
—— Mrs. Frideswide, 351.
Strozzi, Prince, 454.
27. Stuart, Mary, Queen of Scots, 215, 245, 274, 306 note, 315, 359.
Suffolk, Duke of. See Brandon, Charles, and Grey, Henry.
—— Frances, Duchess of, daughter of Charles Brandon, Duke of
Suffolk, and Mary Tudor, Queen Dowager of France, sister of
Henry VIII., 214, 219, 232, 279.
Surian, Michiel, replaces Giovanni Michiel as Venetian ambassador to
England, 436, 437, 439, 443, 444, 451, 453, 462, 465, 468.
Sussex, Earl of, 58, 59, 124, 218, 304, 305, 328.
Sweden, Gustavus Vasa, King of, 464.
Sydney, Elizabeth, 220 note.
—— Mabel, ibid.
T.
Tarbes, Bishop of. See Grammont.
Taylor, John, alias Cardmaker, Rector of Hadley, 372, 374.
Thirlby, Thomas, Bishop of Ely in the reign of Mary, 326, 387, 388,
400, 424.
Thomas, William, plots the murder of Queen Mary, 355.
Throckmorton, Sir Nicholas, 198, 410, 486.
Trivulci, Cardinal, 452.
Tunstal, Cuthbert, successively Bishop of London and of Durham, 9,
20, 21, 22, 231, 326.
ambassador-extraordinary to Spain, 20.
his opinion of the Princess Mary, 22.
released from the Tower on Mary’s accession, 231.
Turenne, Vicomte de, 30, 31.
U.
28. Udal, Nicholas, Headmaster of Eton College, and Vicar of Braintree,
183, 410.
Underhill, Edward, Gospeller, 227, 288, 327, 469 note.
V.
Vagrancy, 248.
Venier, Marc Antonio, 47.
Vives, Ludovicus, 26, 39, 40.
W.
Waldegrave, Sir Edward, a member of the Princess Mary’s
household, afterwards Master of the Wardrobe, 203, 205, 211,
234.
Wallop, Sir John, English ambassador to Francis I., 47, 154.
Warham, William, Archbishop of Canterbury, 36, 37, 52, 381.
Warre, Lord de la, 416, 421.
Warwick, Earl of. See Northumberland, Duke of.
—— —— eldest son of the above, 231.
Wassilegevich, Ivan, Czar of Russia, 488.
Wentworth, Lord, Deputy-governor of Calais, 448, 450.
Westmorland, Earl of, 442.
Weston, Dr., 302, 311, 386.
Westweek, Father, 514 App.
White, Dr., Bishop of Winchester, preaches Queen Mary’s funeral
sermon, and suffers for his praise of her, 472-474.
Williams, Sir John, 225.
—— Lord, of Thame, 312.
29. Willoughby, Sir Hugh, 488.
Wiltshire, Earl of. See Boleyn, Sir Thomas.
Winchester, Marquis of, Lord High Treasurer, 223, 234, 304, 305,
326.
Windsor, Sir Andrew, 24.
—— Lord, 225.
Wingfield, Sir Anthony, Comptroller of the Household to Edward VI.,
207.
—— Sir Richard, ambassador-extraordinary to Spain, 23 note, 20,
21.
Wolsey, Cardinal of York and Lord Chancellor, 2, 4, 6, 7, 8, 9, 12, 13,
14, 18, 19, 24, 28, 32, 33, 36, 37, 38, 40, 41, 50, 55, 136.
sponsor at the baptism of the Princess Mary, 2.
his ascendency over the King, 4, 6.
his foreign policy, 12, 13, 18.
his ambition and dreams of the Papacy, 28, 32.
schemes to marry the Princess Mary to Francis I., 33.
opens a legatine Court, in conjunction with Campeggio, 40.
his disgrace, 41, 50, 55.
Wood, Anthony à, 367.
—— Avis, laundress to the Princess Mary, 6.
Worcester, Earl of, 289, 308.
Worth, John, his letter to Lord Lisle, 167.
Wotton, Dr., Dean of the Chapel to the Princess Mary, and
ambassador to Charles V. and Henry II., 25, 201, 202, 266, 406,
442.
Wriothesley, Sir Thomas, Keeper of the Wardrobe, and Secretary to
Thomas Cromwell, 162, 170, 172.
Wyatt, Sir Thomas, son of the poet, special envoy from Henry VIII.
to Charles V., and author of the second rebellion under Mary,
30. 145, 151, 275, 277, 280, 282, 287, 289, 290, 291, 292, 296, 299,
303, 308, 311.
sets up the standard of revolt in Kent, 280.
arrives at Hyde Park Corner, 289.
gives himself up at Temple Bar, 290.
his conflicting statements concerning Elizabeth and Courtenay,
296, 299, 311.
his execution, 311.
Z.
Zapolski, John, King of Hungary, 49.
Zwingli Ulrich, Swiss reformer, 372.
31. THE ABERDEEN UNIVERSITY PRESS LIMITED.
Transcriber’s Note:
The original spelling, hyphenation, and
punctuation have been retained, with the
exception of apparent typographical errors
which have been corrected without note.
Ambiguous hyphens at the ends of lines
were retained.
Punctuation and spelling were made
consistent when a predominant form was
found in this book; otherwise they were not
changed.
Mid-paragraph illustrations have been
moved between paragraphs and some
illustrations have been moved closer to the
text that references them. The List of
Illustrations paginations were changed
accordingly.
Footnotes were moved to the end of
chapters and numbered in one continuous
sequence.
These variants of Boleyn were unchanged:
Boleyne (p. 85), Boleine (p. 149).
p. 243: “with mine own seal joined
thereto.”[1] Footnote anchor removed by
33. *** END OF THE PROJECT GUTENBERG EBOOK THE HISTORY OF
MARY I, QUEEN OF ENGLAND ***
Updated editions will replace the previous one—the old editions
will be renamed.
Creating the works from print editions not protected by U.S.
copyright law means that no one owns a United States
copyright in these works, so the Foundation (and you!) can copy
and distribute it in the United States without permission and
without paying copyright royalties. Special rules, set forth in the
General Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.
START: FULL LICENSE
35. PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg™ mission of promoting the
free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.
Section 1. General Terms of Use and
Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.
1.B. “Project Gutenberg” is a registered trademark. It may only
be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
36. 1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E. Unless you have removed all references to Project
Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
37. Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is
derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is
posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files
38. containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or
providing access to or distributing Project Gutenberg™
electronic works provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
39. payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project
Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
40. law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except
for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
41. If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.
1.F.4. Except for the limited right of replacement or refund set
forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.
Section 2. Information about the Mission
of Project Gutenberg™
42. Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.
The Foundation’s business office is located at 809 North 1500
West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
43. Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com