Book Image

Mastering Entity Framework Core 2.0

By : Prabhakaran Anbazhagan
Book Image

Mastering Entity Framework Core 2.0

By: Prabhakaran Anbazhagan

Overview of this book

Being able to create and maintain data-oriented applications has become crucial in modern programming. This is why Microsoft came up with Entity Framework so architects can optimize storage requirements while also writing efficient and maintainable application code. This book is a comprehensive guide that will show how to utilize the power of the Entity Framework to build efficient .NET Core applications. It not only teaches all the fundamentals of Entity Framework Core but also demonstrates how to use it practically so you can implement it in your software development. The book is divided into three modules. The first module focuses on building entities and relationships. Here you will also learn about different mapping techniques, which will help you choose the one best suited to your application design. Once you have understood the fundamentals of the Entity Framework, you will move on to learn about validation and querying in the second module. It will also teach you how to execute raw SQL queries and extend the Entity Framework to leverage Query Objects using the Query Object Pattern. The final module of the book focuses on performance optimization and managing the security of your application. You will learn to implement failsafe mechanisms using concurrency tokens. The book also explores row-level security and multitenant databases in detail. By the end of the book, you will be proficient in implementing Entity Framework on your .NET Core applications.
Table of Contents (20 chapters)
Title Page
Credits
About the Author
About the Reviewers
www.PacktPub.com
Customer Feedback
Dedication
Preface
4
Building Relationships – Understanding Mapping

Building parameterized queries


Building and executing parameterless queries would have fewer usages, whereas most usages in any application would be based on parameters/conditions. Introducing parameters in flat/raw queries would expose us to a threat of SQL injection. How are we going to protect our application from such a threat? We cannot ignore them in a real-world application, as we have applications that are hugely dependent on inline queries.

Note

SQL injection is a technique used by hackers to exploit any system, and it would shake it to its core in terms of security. It could be performed by embedding user inputs blindly with inline SQL queries. The most commonly injected value would be OR 1 = 1 , which would pump an entire record set instead of using the input value for filtering. For instance, in our blogging system, if a hacker tries to retrieve user information he could tweak the following query (assuming we have such a query in the system):SELECT * FROM USERS WHERE Id =  + userId...