You are on page 1of 48

ABSTRACT

The main aim of the project is to make the working of Online Book Store very simple and easily achievable. The major objective of the project is to make the process of Online Book Store easy and user friendly Also, an utmost care has been taken to make this project totally system efficient. This project intends to introduce more user friendliness in the various activities such as- book updating, maintenance, and searching. The process of book maintenance and updation can also be accomplished by the admin. The entire information is maintained in the database or files and has been secured with security measures.

Online Book Store has been designed to computerize the following functions -

y y y y y y y y y y y y

Creating new account Providing a specific Books Show the Category Modification to existing Category Modification to existing Details Updation of Books Deletion of existing Books, Author and Publisher Administrative Login Change Password Addition of New User Feedback Help Section

COMPANY PROFILE
Linux Soft Technologies Pvt. Ltd., Jaipur is the Redhat Authorized training partner, exam centre & Registered with Govt. of India. We are the leading TrainingSolution-Development organization of Redhat Linux, Oracle, Cisco, Microsoft, Sun Microsystems, VHDL / VLSI & ROBOMAKINGEMBEDDED SYSTEMS. We have been providing services in imparting training and solution in Networking domain & Programming covering LAN, MAN, WAN with the complete offerings in Internet Security.

Based on our extensive support experience with a variety of customers, Linux Soft Technologies Pvt. Ltd. has developed a unique approach for technical support. We offer consulting and planning, integration and maintenance services for many open source projects, allowing you to deploy them across your network with complete peace of mind. With growing popularity and acceptance of Linux, RoboMaking, VLSI, Oracle, and Routers in the govt. sector we started a company, The Linux Soft Technologies Pvt. Ltd. to provide all Computer based solutions under one roof.

Linux Soft Technologies Pvt. Ltd. is


1) An Authorized Redhat Training partner & Exam Centre from USA, Microsoft Certified Solution Provider (MCSP) & Cisco Solution Provider.

2) Training, Solution & Development Company Registered by Govt. of INDIA.

Background

Linux Soft TECHNOLOGIES Pvt. Ltd. is providing full service security and data networking solutions provider & Training centre for all major I.T Certifications. We provide complete, reliable, and dynamic network solutions, Web Solution & Security Solution to our clients. We design, develop, train, and deploy state - of - the - art information and communication system that are best suited to the needs of our customers.

Philosophy Linux Soft TECHNOLOGIES Pvt. Ltd. is committed to addressing each and every customer opportunity with a partnering approach. Based upon the customer's requirements, we design a solution that meets their business objectives. We ensure that our solution will provide growth and migration plans for the future. Linux Soft TECHNOLOGIES Pvt. Ltd. incorporates only the highest quality products and services in its solutions. This approach guarantees that all of our solutions meet the following criteria: overall quality, cost effectiveness, reliability, availability, maintainability, and are standards based.

People

The Linux Soft TECHNOLOGIES Pvt. Ltd. family is a team of qualified, skilled, highly trained and highly motivated professionals. We believe in the adage that a company is best defined by its people- dedicated, enthusiastic and innovative. There are no "Sales people" at Linux Soft TECHNOLOGIES Pvt. Ltd. Each employee is responsible for creating new business opportunities through a creative approach which combines cutting edge technology skills with expertise in the domain of networks.

Network Security Solution

The number of intrusions/hacking into private computer networks from the Internet is growing rapidly, in parallel with the explosive growth of the Internet; the extent of criminal activities within the Internet is expected to grow at an alarming rate. As businesses make increasing use of the Internet, this has also led to a spurt in deliberate abuse and criminal activities in this new medium. To protect your network from internal and external threats, Linux Soft Technologies Pvt. Ltd. Provides the most complete and comprehensive security solution from start to finish. If your company houses proprietary data and you have not addressed security, contact Linux Soft Technologies Pvt. Ltd. immediately. Security is not just a firewall.

Network Security Linux Soft Technologies Pvt. Ltd. prides itself on its ability to offer scalable, turnkey security solutions, which includes the following process. *Define Security Plan *Create network security design *Provide hardware and software *Implementation of security Architecture *Configuration of hardware and software *Ongoing security consulting services Linux / Windows Server-Setup Solution Linux Soft Technologies have implemented many Linux Windows Solution. In Linux & Windows we provide Solution for DNS, DHCP, WEB, MAIL, FIREWALL, PROXY, NETWORK INSTALLATION, ADS, BACKUP-RESTORE & Troubleshooting.

Security Services Linux Soft Technologies Pvt. Ltd. security audit looks at the current state of your information security and evaluates it against a benchmark - as directed by your internal policies, industry standards or applicable legislation. At the end of this audit, Linux Soft Technologies Pvt. Ltd. will prepare a paper and discuss the "GAP ANALYSIS" along with options to "plug" the gaps. Linux Soft Technologies Pvt. Ltd. will then work with your team to come to a level of risk and cost of security which you feel happy with.

Firewall Services A firewall is protective fence around your network. Linux Soft Technologies Pvt. Ltd. range of firewall services is one of the most comprehensive in the market today. Our firewall solutions are not simply of the shelf, but are designed and implemented after a complete security audit of the organization's network. Linux Soft Technologies Pvt. Ltd. firewall suite has products from all leading vendors. Anti-Virus Services We monitor your gateway to the Internet for viruses, worms and Trojan horse programs, which continue to cause significant losses to organizations. Our continuous monitoring allows us to update patches remotely and immediately from our 24x7 secure lab- thus ensuring you are protected to highest level at all times. VPN Services We create a secure VPN tunnel from your corporate networks to your clients. We achieve confidentiality, integrity and authenticity for your network users by implementing IPSec with IKE options and using AES or 3DES or IDEA algorithms.

WAN Services

Linux Soft Technologies Pvt. Ltd. range of WAN solutions runs the entire gamut from leased lines, ISDN, Broadband & Frame Relay. From large corporations to small home offices to mobile users we have the WAN Technology to suite every need. Our WAN Solutions are a byword for efficiency, robustness, flexibility and maintainability. . Linux Soft Technologies Pvt. Ltd. undertakes total consultancy for WAN's including the supply and configuration of Modems, CSU/DSU, Remote Access Servers, Routers, Firewalls, etc. We coordinate installation of all necessary cabling and ancillary support infrastructure to insure all elements necessary for a robust network are in place.

Leased Lines Linux Soft Technologies Pvt. Ltd. has setup many Leased lines with speeds ranging from 64Kbps to 512kbps, to provide dedicated connectivity to customers.

ISDN

Linux Soft Technologies Pvt. Ltd. is a virtual powerhouse of ISDN solutions, with unsurpassed proficiency in ISDN BRI, ISDN Leased Lines to ISDN Backups to Telecommuter ISDN Dial Ups.

We configure ISDN BRI routers, NT Boxes and TA's. Linux Soft Technologies Pvt. Ltd. Is providing Training program on following Technologies Red Hat Linux RHCT, RHCE Cisco System CCNA, CCNP, CSPFA Microsoft MCP, MCSA, MCSE 2003, VB.Net, ASP.Net, C#.Net CompTia A+, Network+ Sun Microsystems Java, J2EE Oracle Oracle DBA/Developer VHDL/VLSI, Robomaking / Embedded Systems Security CEH, CCSA Linux Soft Technologies Pvt. Ltd. Is providing Solution on following Technologies 1) 2) 3) 4) 5) 6) 7) 8) 9) Redhat Linux Cisco Router Switch Implementation Windows Server Installation & Configuration Cisco Pix Firewall Implementation Web Hosting, Domain Registration Web Site Development, Web Solution Software Development Electronic Projects Database Solution

Software Development Life Cycle


Software Development Life Cycle (SDLC) is a structured sequence of phases for implementing an information system. A System/Software development life cycle (SDLC) is a logical process by which systems analysts, software engineers, programmers and end-users build information systems and computer application to solve business problems and needs. The System/Software development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. In the software development process we focus on the activities directly related to the production of the software, for example, design, coding, and testing. A development process is a sequence of steps. Each step performs a well-defined activity leading towards the satisfaction of the project goals, with the output of one step forming the input of the next one. We have followed the concept of SDLC in the following way:        Survey Analysis Preliminary Design System Design Implementation Acceptance Test Generation Quality Assurance

REQUIREMENT ANALYSIS
Requirement Analysis is the first phase of the SDLC. First, we need to figure out what the problem is (analysis)? We must know exactly what we want to do before we can begin to do it. A clear understanding of exactly what is needed is necessary for creating a solution. In this phase Business Analysts (BA), find out what is the problem and what are requirements and so on.It begins with a request from the user for a new system. It involves the following:  Identify the requirement for the system.  Clarify deficiencies in the current system.  Identify deficiencies in the current system.  Establish goals and objectives for the new system.  Determine the feasibility for the new system. Prepare a project charter that will be used to guide the reminder of the project.

ANALYSIS
Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. This activity is also used to study the system in details. The objective of this step is to develop structured system specifications for the proposed system. The structured system specification will be called the Essential Model. It involves: Detailed study of the system. Understand the procedure of the system. Determine the scope of the system. Define the goals of the proposed system.

PRELIMINARY DESIGN
The most creative and challenging phase of the system life cycle is System Design. The term design describes the final system and the process by which it is developed. This activity deals with certain design issues that are to be finalized in consultation with the user. The two most important issues of relevance to the user are the automation boundary & the human machine interface. The output of this activity is the user implementation model. This model, in addition to the essential model defines the following for the system:  Automation Boundary  Report Layout  Workable plan for implementing the candidate system.  Screen layouts for the data entry forms  Menus  Information on personnel, money, hardware, facilities, and their estimated cost must also be available.

DESIGN
System Design involves the transformation of the user implementation model into software design. The first step is to determine how the output is to be produced and in what format. Second, input data and master files (database) have to be designed to meet the requirements of the proposed output.  The design specification of the proposed system consists of the following:  Database schema & Pseudo code for all the modules.

10

CODING
After designing the new system/software, the whole system/software is required to be converted into computer language. Coding the new system/software into computer programming language does this. It is an important stage where the defined procedures are transformed into control specifications by the help of a computer language. This is also called the Programming Phase in which the programmer converts the program specifications into computer instructions, which we refer as programs. The programs coordinate the data movement as and control the entire process in a system/software.

TESTING
Before actually implementing the new system/software into operations, a test run of the system/software is done removing all the bugs, if any. It an important phase of a successful system. After codifying the whole programs of the system, a test plan should be developed and run on a given set of test data. In the system/software testing stage, we check the overall behavior of the system/software against the functional and the performance requirements. There are two type of testing:  White-Box: Internal part (code) of the project is testing.  Black-Box: System behavior (input/output) is checked.

11

IMPLEMENTATION

After having the user acceptance of the new system/software developed, the Implementation phase begins. Implementation is the stage of a project during which theory is turned into practice. In this phase, user can know how to execute the package, how to enter data and so on. y The implementation phase is less creative then system design. This activity includes programming, testing & integration of modules into progressively more complete system. y It is primarily concerned with user training, site preparation, and file conversion. During the final testing user acceptance is tested, followed by user training. y System testing checks the readiness and accuracy of the system to access, update, and retrieve data from new files. The output of this activity is the complete integrated system. y Major sub activities  Coding  Integration  Testing  Debugging y Inputs  Project character  Design specification y Outputs  Integrated Systems

12

MAINTENANCE
When the implementation report is submitted, an Maintenance should be made to determine whether the system/software meets the objectives stated in the general design report. In this phase, users may be able to suggest the easy-to-implement improvements.

ACCEPTANCE TEST GENERATION


This activity generated a set of test data that can be used to test the new system before accepting it. If successful, the program(s) is then run with live data. Otherwise a diagnostic procedure is used to locate and correct errors in the program. y Input  Project Character y Output  Quality Assurance test set

PROCEDURE DESCRIPTION
The objective of this step is to produce a manual, which may be used as a guide for operating the system. Inputs Project Character User implementation model Outputs User manual (guide for end user)

13

TOOLS AND TECHNOLOGY


ASP.NET
ASP.net is the latest version of Microsofts Active Server pages Technology (ASP). ASP.NET is a unified Web development model that includes the services necessary for you to build enterprise class web application with a minimum of coding. ASP.net is part of .net framework, and when coding ASP.net you have access to classes in the .net framework. You can code your applications in any language compatible with the common language runtime (CLR), including Microsoft Visual Basic, C#, and Jscript, .Net and J #. These languages enable you to develop ASP.Net applications that benefit from the common language runtime, type safety and inheritance and so on.

ASP.NET Includes
 A page and control framework.  The ASP.NET compiler.  Security Infrastructure.  State-management facilities.  Application configuration.  Health monitoring and performance features.  Debugging support.  An XML web service framework.  Extensible hosting environment and application life cycle management.  An extensible designer environment. ASP is a server side scripting technology that enables scripts (embedded in web pages) to be executed by an Internet Server.
14

 ASP is a Microsoft technology.  ASP stands for Active Server Pages.  ASP is a program that runs inside IIS.  IIS stands for Internet Information Services.  IIS comes a free component with Windows 2000.  IIS is also a part of the Windows NT 4.0 Option pack.  PWS is a smaller but fully functional version of IIS.  PWS can be found on your windows 95/98 CD.

ASP file
    An ASP file is just the same as an HTML file. An ASP file can contain text, HTML, XML and scripts. Scripts in an ASP file are executed on the server. An ASP file has the file extension .asp.

ABOUT ASP.NET
ASP 3.0 is the latest version of ASP, but there will never be an ASP 4.0 version . ASP.NET is the next generation ASP, but its not an upgraded version of ASP.ASP.NET Framework. Microsoft spent three years rewriting ASP.NET from the ground up, and ASP.NET is not fully backward compatible with ASP 3.0.

15

.NET FRAMEWORK
The .NET framework is the infrastructure for the Microsoft .NET platform. The .NET Framework is an environment for building, deploying and running web applications and the .NET framework contains a common language runtime and common class libraries like ADO.NET, ASP.NET and Windows Forms to provide advanced standard services that can be integrated into a variety of computer systems. The.NET framework provides a feature-rich application environment, simplified development and easy integration between a numbers of different development languages. The .NET framework is language neutral. Currently it supports C++, C#, Visual Basic and Jscript.Microsoft Visual Studio .Net is a common development for the .net framework.

Differences between ASP and ASP.NET


 ASP .NET has a better language support, a large set of new controls and XML based components and better user authentication.  ASP.NET provides increased performance by running compiled code.  ASP.NET is not fully backward compatible with ASP.

New in ASP.NET
         Better language support Programmable controls. Event Driven programming. XML-Based components. User authentication, with accounts and roles. Higher scalability. Increased performance compiled code . Easier configuration and deployment. Not fully ASP compatible.
16

Language Support
 ASP.NET uses the new ADO.NET.  ASP.NET supports full Visual Basic , not VB script.  ASP.NET supports C# and C++.  ASP.NET supports Jscript as before.

ASP.NET Controls
ASP.NET contains a large set of HTML controls. Almost all HTML controls on a page can be defined as ASP.NET control objects that can be controlled by scripts .ASP.NET also contains a new set of object oriented input controls , like programmable list boxes and validation controls. A new data grid control supports sorting, data paging and everything you expect from a dataset control.

17

Software & Hardware Specification

Hardware Specification: Processor:


Minimum: 600 megahertz (MHz) Pentium processor. Recommended: 1 gigahertz (GHz) Pentium processor or higher.

Random Access Memory


Minimum: 256 megabytes (MB). Recommended: 512 MB or higher.

Hard Disk:
Without MSDN: 2 GB of available space required on installation drive. 1 GB of available space required on system drive. With MSDN: 3.8 GB of available space required on installation drive with a full MSDN install or 2.8 GB of available space required on installation drive with a default MSDN install. 1 GB of available space required on system drive. Display: Minimum: 800 X 600 256 colors. Recommended: 1024 X 768 High Color - 16-bit.

18

Software Specification:

Operating System: Minimum:Microsoft Windows 2000 SP4. Recommended:Microsoft Windows XP SP2 (All Edition). Microsoft Windows Server 2003 SP1 (All Edition).

Web Browsers: Minimum: Internet Explorer 5, Mozilla 5, Firefox 2, Netscape 7.

DATABASE: Microsoft SQL Server 2005.

SOFTWARE TOOLS: Language: ASP.NET 2008 or Visual Studio 2008

Server Language:

C#

19

SYSTEM ANALYSIS AND DESIGN

DATA FLOW DIAGRAM:Graphical description of a systems data and how the processes transform the data is known as Data Flow Diagram (DFD). A DFD shows the flow of data through a system. It views a system as a function that transforms the inputs into desired outputs. Any complex system will not perform this transformation in a Single Stop, and the data will typically undergo a series of transformations before it becomes the output. The DFD aims to capture the transformations that take place within a system to the input data so that eventually the output data is produces. The agent that performs the transformation of data form one state to another is called processes. So the DFD show the movement of data through the different transformations of processes in the system. Control information such as record counts, passwords and validation requirements is not pertinent to a data flow diagram. Meaning full names for data flows, processes and data stores must be chosen.To construct the data flow diagrams, we use Arrows: An arrow identifies the data flow- data in motion. It is a pipeline through which information flows. All data flow are identified by unique names. These names are chosen so that they convey some meaning about what the data is. Circles: Circles stands for processes that convert data into information. Open ended boxes: An open-ended box represents a data store or a temporary repository of data. Squares: A square defines a source (originator) or destination of system data.

20

1 Level DATA FLOW DIAGRAM


At this level of D.F.D. all the process together with all the data stores (tables). It shows the true data flow i.e. how data is actually flowing in the system .Data is coming from which table and going into which table is clearly shown by this DFD. This DFD is the main reference for the development of the system. After understanding the whole system, The application developer will fall back upon this DFD during the development phase.

21

Executive Summary : BookWorm is Book providing company site. User can see different BOOKS available , by different Authors and Publisher etc. User can select his book of interest and can order online and pay online.

This Web Application is developed for make easiest communication and share the information between Book company & User Of The Web Site. Having studied the various requirements of the customer, Our Team concluded the following requirements of the Application:

y BookWorm Website is the Book Search Engine. y It share the informations related to most famous books, new books, Books of particular category. y The user of the site: a. Administrator: Administrator will access all the page of site. Admin can modify any information about the Books, Category , Author, Pubisher etc any time. b. Guest User : Guest user has interaction with all the information of site related to any Book, Author, Publisher etc. He can store his feedback on the website

22

Web Page Description


ADMIN LOGIN PAGE

Web Page Description


Name Admin User-ID Details Control: Text Field Function Description: Administrator will enter there Id. It will accept nvarchar type value. It should not be blank otherwise an error message will be displayed i.e. Enter :Login Id Password Control: Text Field Function Description: User will enter their password and it should be masked. Login Function Description: If Login Id and Password is correct, Index page of Administrator section Open.

23

y Validation in Login Process: When Administrator wants to Login, the following checks are carried out. y Administrator have to fill LoginId otherwise an error message should be displayed i.e. Enter Login Id. y Administrator must have to enter Password otherwise an error message should be displayed i.e. Enter Password. y LoginId and Password should be correct otherwise an error message will be displayed i.e. Either Login Id or Password is incorrect.

ADMIN PANEL

24

Web Page Description


Name Details

Main Page Options: y ADMIN HOME y Category Management y Author Management y Publisher Management y Book Management y Account Manager y Help y Contact Us y About Us y FAQ ADMIN HOME Control: HyperLink Function Description: This option displays new page that have the options to manage the available Contents. Category Management Control: Hyper Link Function Description: This option displays new page that have the options to manage the Category. Author Management Control: Hyper Link Function Description: This option display new page that have the options to manage the Author. Publisher Control: Hyper Link

25

Management

Function Description: This option display new page that have the options to manage the Publisher.

Book Management

Control: Hyper Link Function Description: This option display new page that have the options to manage the Books.

Account Manager

Control: Hyper Link Function Description: This option display new page that have the options to manage the Admin Accounts.

Help

Control: Hyper Link Function Description: This option display new page that have the options to manage the States in which Tours are available.

Contact Us

Control: Hyper Link Function Description: This option display new page that have the Contact Details

About Us

Control: Hyper Link Function Description: This option display new page that have the About us Details.

FAQ

Control: Hyper Link Function Description: This option display new page that have the options to manage the Frequently Asked Questions.

26

BOOK MANAGEMENT

Web Page Description


Name Select Category Details Control: Drop Down List Function Description: This control the Category Selection. Book Display Control: Grid View Function Description: This Grid View control the Books of selected Category Add Book Function Description: This Opens a a new view which is use to Add New Books
27

ADD BOOK

Web Page Description


Name Select Category Details Control: DropDownList Function Description: This field enables us to enter the category name from the list. Book Name Control: Text Box Default: Blank Function Description: This field accepts nvarchar type value. Author Control: DropDownList Function Description This field enables us to enter the Author name from the list.

28

Publisher

Control: DropDownList Default: Blank Function Description: This field enables us to enter the Publisher name from the list.

Edition

Control: Text Box Default: Select City Function Description: This field accepts nvarchar type value.

Price

Control: Text Box Default: Blank Function Description: This field accepts nvarchar type value..

Image

Control: File Upload Default: Blank Function Description: This field accepts the image Url.

Submit

Control: Button Default: Enable Function Description: This button have the functionality to enter all the values into the database.

Reset

Control: Button Default: Enable Function Description: Reset all the controls.

Finish

Control: Link Button Default: Back Function Description: This have the functionality to go one step back from the current page.

29

CATEGORY MANAGEMENT

Web Page Description


Name Add Category Details Control: Link Button Default: Enable Function Description: This button navigate to new page that have the options to add the new Category Delete Control: Button of GridView Default: Enable Function Description: This button have the functionality to delete the particular schedule.

30

Edit

Control: Button of GridView Default: Enable Function Description: This button have the functionality to navigate on new page that have the functionality to edit selected schedule.

ADD CATEGORY

Web Page Description


Category Name Submit Control: Text Box Function Description: This field accepts nvarchar type value. Control: Button Function Description: This button have the functionality to enter

31

all the values into the database. Reset Control: Button Function Description: Reset all the controls. Finish Control: Button Function Description: This have the functionality to go one step back from the current page

AUTHOR MANAGEMENT

32

Web Page Description


Name Author Management Delete Details Control: Grid View Function Description: The gridview shows the Author . Control: Button of GridView Function Description: This button has the functionality to delete. Edit Control: Button of GridView Function Description: This button have the functionality to navigate on new page that have the functionality to edit

ADD AUTHOR

33

Web Page Description


Author Name Author Details E-Mail Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description:. This field accepts nvarchar type value. Website Control: Text Box Function Description: This field accepts nvarchar type value. Submit Control: Button Function Description: This button have the functionality to enter all the values into the database.

PUBLISHER MANAGEMENT

34

Web Page Description


Name Publisher Management Delete Details Control: Grid View Function Description: The gridview shows the Publisher Control: Button of GridView Default: Enable Function Description: This button has the functionality to delete. Edit Control: Button of GridView Function Description: This button have the functionality to navigate on new page that have the functionality to edit.

ADD PUBLISHER

35

Web Page Description

Publisher Name Publisher Address Contact No.

Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value.

E-MAIL

Control: Text Box Function Description: This field accepts nvarchar type value.

Website

Control: Text Box Function Description: This field accepts nvarchar type value.

Reset

Control: Button Default: Enable Function Description: Reset all the controls.

Submit

Control: Button Function Description: This button have the functionality to enter all the values into the database.

Finish

Control: Button Default: Back Function Description: This have the functionality to go one step back from the current page.

36

ACCOUNT MANAGER

Web Page Description


Name Change Password Details Control: Button Function Description: This button navigate to new page that have the options to Change Password Add New Admin Control: Button Function Description: This button navigate to new page that have the options to Add New Admin

37

CHANGE PASSWORD

Web Page Description


Name User Name Details Control: Text Box Function Description: This field accepts nvarchar type value. Enter Password New Password Confirm Password Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description : This field accepts nvarchar type value.

38

ADMIN HELP SECTION

USER HOMEPAGE

39

ABOUT US

CONTACT US

40

BOOKS PAGE

Web Page Description


Name Select Category Details Control: Drop Down List Function Description: helps to select the desired Category of books Books Control: Datalist Function Description: Helps to Show the books of the selected category Buy Control: Button Function Description: this button navigates you to the buy section of the website

41

AUTHOR PAGE

Web Page Description


Name Authors Details Control: Datalist Function Description: Helps to Show the various Authors stored in the database

42

DATABASE DESIGN
Once the input data is captured in the system, these may have to be

preserved either for a short or long period. These data will generally be stored in files or databases in logical manner. The designer will have to advise the techniques of sorting and retrieving data from these files. The system uses database, which is described as follows.

1. Table Name : author

2.Table Name : category

43

3.Table Name : book

4.Table Name : login

5.Table Name : publisher

44

DATABASE SNAPSHOTS
Category Table :-

Author Table :-

Publisher Table :-

Book Table :-

45

SECURITY FEATURES
Authentication is the process of identifying users. Authorization is the process of granting access to users based on identity. Together, authentication and authorization provide the means to keep your application secure from intruders. The kind of security measures used in our System are as follows: User Authentication Only the Valid users, who are present in the pre defined list of Users stored in User Master table are granted permissions to enter the System . Any user apart from Record of users are denied access.

User Session Creation :This helps in the creation of isolated Login which reduces the chance of trespassing into the Admin Panelor any other restricted part.

46

CONCLUSION

The main objective of this package is to assist an online Book Management System or Search Engine in dealing with the customer of the Books for Ordering and Searching of the books with just a very less span of time..The chance of making mistake is negligible as with every transaction the database is updated. It also reduces service time. With this Website the workload is reduced and hence the efficiency is increased due to the User Friendliness of this website, the chance of error is Negligible. The accuracy of this Website is optimum. We have completed the study about ASP.NET and project on BOOKWORM. Now we conclude that: ASP.NET is more beneficial then Asp not only because it supports many languages one need not to study a particular language to work on this , but also the coding part is very limited. ASP.NET 3.5 framework is highly secured platform for building and modifying website and other web application.

47

BIBLIOGRAPHY
[1 ] ASP.NET in 21 days [2] Programming in C# [3] Essential Asp.Net with examples in C# [4] Professional ASP.NET 3.5 [5] A First Look At Sql Server 2005

48

You might also like