Cover image for Essential SourceSafe.
Essential SourceSafe.
Title:
Essential SourceSafe.
Author:
Roche, Ted.
ISBN:
9781930919143
Personal Author:
Physical Description:
1 online resource (245 pages)
Contents:
BookCover -- Our Contract with You, The Reader -- Table of Contents -- Acknowledgements -- About the Author -- How to Download the Files -- Introduction -- Versions covered -- The purpose of this book -- The organization of this book -- Why VFP? -- The future of SourceSafe -- Feedback, questions, compliments, comments and complaints -- Chapter 1 Visual SourceSafe Installation -- How many installs do I do? -- Installing Visual SourceSafe as a stand-alone product -- Installing VSS as part of the Visual Studio install -- Installing VSS as part of a Microsoft Office Developer install -- What files get installed where? -- Update SourceSafe with service packs -- VSS is installed-now what? -- Creating user accounts -- Configuring the database for integration -- Chapter 2 SourceSafe in Theory and Practice -- The theory: Learning to climb the tree -- Tutorial: Climbing the tree -- The reality: Swinging through the branches -- Multiple checkouts and the Dreaded Visual Merge form -- Is the hassle worth it? -- The Explorer interface -- Toolbar -- Menu -- Project tree view -- File pane -- Results pane -- Status bar -- Drag and drop -- Reports -- Dialog by dialog -- The File menu -- Open Database -- Add Files -- Create Project -- Delete -- Rename -- Properties -- Set Working Folder -- Create Shortcut -- Label -- Move -- The Edit menu -- View File and Edit File -- Select -- Select All -- Invert Selection -- The View menu -- Sort (Name, Type, User, Date, Checkout Folder) -- Search -- Wildcard Search -- Status Search -- Cancel Search -- Refresh File List -- The SourceSafe menu -- Get Latest Version -- Check Out -- Check In -- Undo Check Out -- Share -- Branch -- Merge Branches -- The Tools menu -- Show History -- History form -- Show Differences -- Differences form -- Find in Files… -- Files Report -- SourceSafe Explorer's Tools

Customize Toolbar -- Change Password -- The Web menu -- Deploy -- Check Hyperlinks -- Create Site Map -- Chapter 3 Configuring Applications -- The SCCAPI mechanism -- Standardize on one configuration for the team -- Configuring Visual FoxPro -- Configuring Visual Basic -- SourceSafe common Advanced options -- Configuring InterDev and Visual J++ -- Configuring Visual InterDev for Web projects -- Configuring C++ -- Configuring Microsoft Office -- Configuring FrontPage -- Configuring InterDev and SQL Server for data projects -- Chapter 4 Visual SourceSafe and Visual Studio Integration -- Should you use integration? -- How it works: The big picture -- Creating a new project -- Joining an existing project -- Maintaining existing code -- Adding new code to a project -- Bringing an existing project into source code control -- The devil's in the details -- Are metadata and process information data, or are they code? -- What about development and test data? -- Should my add-on tools, build tools and setup tools be in SourceSafe, too? -- How to handle projects with remote developers -- What to do when the project gets mangled? -- Visual FoxPro -- SCCTEXT.PRG -- Routine source control operations with VFP -- Problems with Visual FoxPro integration -- Visual Basic -- How it works -- Problems with VB integration -- Visual C++ -- How it works -- Problems with VC++ integration -- Chapter 5 Visual InterDev and Visual SourceSafe -- The InterDev interface -- Visual InterDev and Internet Information Server -- Visual InterDev and SQL Server -- Chapter 6 Visual SourceSafe and Microsoft Office -- Microsoft Office Developer Edition -- VBA/VB interface -- Access -- What's going on under the hood -- Issues with Office and SourceSafe -- Chapter 7 Administration -- Configuring SourceSafe's Administrator -- Backups -- Analyze, Analyze, Analyze.

Strategies for performing analysis -- The physical file structure -- Generating a physical file list -- Parsing the physical file list into a database table -- The security model -- Journaling -- Project security -- The User file UM.DAT -- Cleaning out the temporary directory -- Working with shadow folders -- Archive and Restore -- Chapter 8 Beyond the Basics -- Using the INI files -- INI structure -- Order of precedence -- Settings -- SSADMIN.INI -- TEMPLATE.INI -- Using environment variables -- Starting the Explorer with startup switches -- Using Microsoft's Source Code Control Application Programming Interface (SCCAPI) -- Using the command line -- Common command-line options -- The auxiliary tools: Analyze, Archive, Restore, DDUPD, MKSS -- Using the SourceSafe engine from the command line -- Sample SourceSafe sessions using the command line -- Diffing using SourceSafe -- Manipulating files-Get, CheckIn, CheckOut... -- Reporting-History -- Physical file lists -- Using Automation -- Automating the SourceSafe engine -- Objects and collections -- Navigating the SourceSafe object model -- SourceSafe constants and file flags -- Using Automation -- Example 1: Traversing the SourceSafe tree -- Example 2: Adding users to the database using Automation -- Example 3: The entire process, Automated -- Trapping SourceSafe events -- Chapter 9 Troubleshooting -- First: Have a Plan B -- Second: Prevent the problem -- Third: Have a method to your madness -- Fixing common problems -- Finding Help in the Knowledge Base -- Analyze errors -- Corrupted cache files -- Rebuilding the AAAAAAAA.CNT file -- Network slowness / performance problems -- Lost passwords -- Upgrades, updates, service packs and DLL Hell -- Cleaning up users no longer there -- Folder recurring within folder -- Appendix Resources and References -- Microsoft publications -- Web sites.

Magazine articles -- Third-party tools -- Training -- Index.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: