Documente Academic
Documente Profesional
Documente Cultură
ON
INFORMATION TECHNOLOGY
Of COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
March 2009
DEPARTMENT OF INFORMATION TECHNOLOGY Toc H INSTITUTE OF SCIENCE & TECHNOLOGY Arakkunnam P.O, Ernakulam District, KERALA 682313
CERTIFICATE
This is to certify that the major project entitled CRIME MANAGEMENT AND REPORTING SYSTEM submitted by Sumi Thomas Painumkal of Semester VIII is a bonafide account of the work done by him/her under our supervision, during the academic year 2008-2009.
SEMESTER: VIII
ACKNOWLEDGEMENT
The successful completion of my project can be attributed to the combined efforts made by me and the contribution made in one form or other by the individuals I hereby acknowledge. First and foremost thank God Almighty for giving me all strength, courage and blessings to design and complete this project. I wish to extend my sincere gratitude to the management and our honorable Principle, Prof.V.Job Kuruvilla for providing me the valuable opportunity to this project. I also thank Dr.Varghese Paul, Dean (IT & CS) for his support. I express my sincere gratitude to our Head of the Information Technology Department, Ms.Meera Ramadas.I also thank her for her sincere help and support. Words fail to thank adequately our project-in-charge Ms.Sherly K.K. and Project guide Mr.Prabhu M who gave me all supports and helped me to clear all confusions regarding the project. And last but not the least; I thank my family members and my friends for providing me moral support to achieve my goal.
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
SEMESTER: VIII
ABSTRACT
The Crime Management and Reporting System apply to Police Stations all across the country .It specifically looks into the Crime detection and prevention. Conviction of criminals depends on a highly responsive backbone of Information Management. The efficiency of the police and the effectiveness with which it tackles crime depend on what quality of information it can derive from its existing records and how fast it can have access to it. Different modules of this project are Station module, Crime module, Search module and Administrators module. Each of the station must first register with the software. For the registration part each station enter their details like station name, address, phone number, station in charge etc. and get a User Id from the software. Once the station registers with the software they can avail the existing records. All these are done in the station module. The Crime module is used for entering all details about the crime. It consists of the date and time, place, nature of crime, location of the crime, police station where it is recorded etc.In the search module we can search the crime in station wise, nature of crime, date and time wise. The Administrators module will be protected by user id and password. Ordinary users of the software will not be permitted to enter into this area of the software. This module will be focusing on the Master data maintenance, removal of old and outdated data from the software etc.The details of Indian Penal Codes and classification of crime will be provided in this software. The project will be developed using ASP.net 2005 as front end, Microsoft SQL Server 2000 as back end in Windows XP platform.
SEMESTER: VIII
TABLE OF CONTENTS
1. INTRODUCTION.. 1
2.SYSTEM ANALYSIS 3 2.1 EXISTING SYSTEM. 4 2.2 PROPOSED SYSTEM..5 2.3 FEASIBILITY STUDY6 3. SYTEM REQUIREMENT STUDY..8 3.1 SYSTEM CONFIGURATION......9 3.2 ABOUT THE DEVELOPING SYSTEM..10 3.3 OPERATING SYSTEM.11 3.4GRAPHICAL USER INTERFACE: MS VISUAL STUDIO 2005.13 4. SYSTEM DESIGN.14 4.1 LOGICAL SYSTEM DESIGN..15 4.2 PHYSICAL SYSTEM DESIGN....20 5. SYSTEM IMPLEMENTATION.25 5.1 IMPLEMENTATION DETAILS.28 5.2 CODING...29 6. SYSTEM TESTING....50 7. FUTURE ENHANCEMENT...42 8.CONCLUSION..58 9. BIBLIOGRAPHY.60
SEMESTER: VIII
Page No:1
SEMESTER: VIII
The objective of the project is to develop a site in which any citizen can report crimes. If anybody wants to complaint against crimes he must do it through the police. The Crime Management and Reporting System make the crime reporting easier. This project will be useful for the Police Department. The home page is the login page .Only the Administrator and the Station in-charge of different Police Stations will be able to login to their home pages. The citizen could only report crimes and knows whether the crime reported by him has been accepted. The different modules of the project are station module, crime module, administrators module and search module. In the station module, each of the station must first register with the Software. For the registration part each station enter their details like station name, address, phone no, station in charge etc. and get a User Id and password from the Software. Once the station registers with the software they can avail the existing records. Crime module is used for entering all details about the crime. It contains the date and time, police station where it is recorded, place, nature of Crime, Location of the Crime etc.All details about the criminals will be also included in this module. In the search module we can search the crime in station wise, nature of crime, date and time wise. Searching of criminals is also possible in this module. The administrators module will be protected by user id and password. Ordinary users of the software will not be permitted to enter into this area of the software. The module will be focusing on the Master Data Maintenance, Removal of old and outdated data from the software etc.
Page No:2
SEMESTER: VIII
Page No:3
SEMESTER: VIII
2. SYSTEM ANALYSIS
System analysis is an important phase of any system development process. The system is studied to the minute details and analyzed. The system analyst plays the role of an interrogator and dwells deep in to the working of the present system. In analysis, a detailed study of these operations performed by a system and their relationships within and outside the system is done. A key question considered here is, what must be done to solve the problem? The system is viewed as a whole and the inputs to the system are identified. Once analysis is completed the analyst has a firm understanding of what is to be done. The project mainly aims to develop an application for the Police Department to handle their crime investigation process in an easy way. Often people are reluctant to go to Police stations to report crimes. This project makes reporting of crimes easier.
Page No:4
SEMESTER: VIII
Even an efficient officer may not be able to handle more than one case at a time. As we all know, a covered truth, bribery plays an important role in the existing system. Many cases were pilled up in the corners, due to lack of commitment in the job. In most of the cases, the innocent are accused in the existing system. As per our jurisdiction, Let thousand criminals escape-not a single innocent be punished . As a result of this and other factors that influence investigation, such as bribery, the innocent becomes accused in several situations in the eyes of Justice. The existing system is criticized for being inefficient, time consuming, poorly managed, and lacking flexibility. Because of the large number of serious crimes, minor complaints may be ignored.
Reducing crime and disorder. Confidentiality and anonymity issues. In the fast moving world, if people lack something it is time. All are busy in their world. It will be
welcomed if services are provided at their will. So the main objective of our product is better communication, better leadership, reducing crime and disorder etc.The product provides a framework within which a user can easily work with. That was our next objective. So it should be user friendly. The product provides a framework, which is error free. We know a crime management system is actually a serious process. So even a simple error lead to big problems. So it should be error free and our objective is to build error free software.
Page No:5
SEMESTER: VIII
In the existing system, storage of all these records should be arranged and security should be
provided for the records. In the proposed system, separate security arrangement is not needed since the software provides security and maintenance is simply and hardly needs one or two persons to operate the system.
Page No:6
SEMESTER: VIII
In the proposed system, data can be easily stored and managed in database management system software.
The results for various queries can be generated easily. Therefore, the system is technically
feasible.
Page No:7
SEMESTER: VIII
Page No:8
SEMESTER: VIII
PROCESSOR RAM SIZE CD ROM DRIVE KEYBOARD MONITOR MOUSE FRONT END BACK END
-Pentium 4 -256MB -52X -108 keys -SVGA 15 inch -PS/2 -ASP.NET -MS SQL SERVER 2000 -C# -MS INTERNET EXPLORER
Page No:9
SEMESTER: VIII
BRANCH: INFORMATION
TECHNOLOGY
Page No:10
SEMESTER: VIII
BRANCH: INFORMATION
TECHNOLOGY
3.2.2 BACK END TOOL: SQL Server 2000 Microsoft SQL Server 2000 is a relational database management system (RDBMS) produced by Microsoft. Its primary query language is Transact SQL, an implementation of the ANSI/ISO standard SQL used by both Microsoft and Sybase. SQL Server allows multiple clients to use the same database concurrently. SQL Server provides two modes of concurrency control: pessimistic and optimistic concurrency. When pessimistic concurrency control is being used, SQL Server controls concurrent access by using locks. Locks can be either shared or exclusive. Exclusive lock grants the user exclusive access to the data no other user can access the data as long as the lock is held. Shared locks are used when some data is being read-multiple users can read data locked with a shared lock, but not acquire an exclusive lock. SQL Server also provides the optimistic concurrency control mechanism, which is similar to the multiversion concurrency control used in other databases.
Characteristics: Input/Output
Input and Output is essential to the operation of any computer. Input-Output allows the computer to store and receive data on disks or tapes, to interact with the users terminals and to print the output on
Page No:11
SEMESTER: VIII
BRANCH: INFORMATION
TECHNOLOGY
Time Sharing
Time-Sharing is a way of allowing several people to run programs on different terminals concurrently. This introduces the facility of enabling a group of people to simultaneously approach a problem on different levels or at the same level, when the need arises.
Communication
Communication refers to the ability of one computer to communicate with other computer and terminals, to transfer programs and/or data.
Security
The OS invokes security that protects one user from another and the OS from all users. Its main function is to make sure that only authorized users gain access to the computer and its data and those users do only things that they are authorized to do. As time sharing is available in the OS, a large degree of security is provided.
Modularity
The design of the OS is modular which allows new capabilities to be added as required.
Reliability
Applications are run in their own memory and are unable to corrupt other applications or the system. System errors are logged.
Portability
Allows Windows XP to run on various platforms.
Page No:12
SEMESTER: VIII
BRANCH: INFORMATION
TECHNOLOGY
Page No:13
Page No:14
SEMESTER: VIII
The most creative and challenging phase of the system life cycle is system design. The term design describes a final system and the process by which it is developed. It refers to the technical specifications that will be applied in implementing the proposed system. It also includes the construction of program and designing of output, input, code, database and process of the system.
4.1.1 USECASE DIAGRAM: In designing an efficient and effective system it is important to consider usecase diagram.Usecase diagram is one of the five diagrams in YML or modeling the dynamic aspects of the system.Usecase diagram is central to modeling the behaviour of a system, a subsystem or a class.Usecase diagram are more important for visualizing, specifying and make systems, subsystems and classes approachable and view of how those elements may be used in context.
Page No:15
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
USECASE DIAGRAM
The citizen can report crimes. He will enter all details about the crime. It contains the date, time, spot, nature of crime, location of crime etc.He can view all crimes accepted and closed by the administrator. Thus he can see whether the crime reported by him has been accepted or not. The Administrator will accept the complaints if it is genuine. He can create a new police station, view complaints from the citizens, crime details, criminal details, and victim details, witness details etc.He can create a new investigation team and assign them to the investigation of a crime. Removal of old and outdated crime details will be done by him.
Page No:16
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
The Station in-charge can also view the complaints reported by the citizen. Then he will prepare the FIR and send the FIR to the administrator. The Administrator will assign a team for the investigation. After investigation all details are entered into the software and the Administrator will close the Crime File. The station in-charge can search the crime in station wise, nature of crime, date and time wise. 4.1.2 DATAFLOW DIAGRAM Dataflow diagram is used to define the flow of the system and their resources .It is the way of expressing system requirements in a graphical manner. It is one of the most ingenious tools used for structured analysis. It is the starting point of design phase. Citizen side
The citizen can report complaints using this website. He should provide the complaint details. He can also view the status of his complaint. Page No:17
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
:CRIME AND
Administrator side
login login validation check uname pwd register new station Login station reg station details
Administrator
station master
Page No:18
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
:CRIME AND
The Administrator has to login to the website. The username and password is checked with those in the database. If they matches with the given username and password, he can access the software. The administrator will register a new Police Station with this software. The administrator will create a new investigation team and will decide which all members should be in that team. He can view all the reported complaints, and close the complaint file after the completion of the investigation. Station in-charge side
Page No:19
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
:CRIME AND
The station in-charge has to login to the website using the username and password. The username and password is checked. If it is correct he can enter into his home page. He can enter the crime details .He can also perform searches. Similarly, he can enter criminal details also. The station incharge can send the FIR to the administrator. He can also set the status, whether the investigation is progressing or if it is closed. He will also enter the victims details.
Page No:20
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
:CRIME AND
4.2.3 DATABASE DESIGN: Database design is the most important part of the system design phase. In a database environment common data are available and are used by several users. Instead of each program managing its own data, authorized users share data across application with the database software managing the data as an entity. In our project both the administrator and station in-charge share the crime details and criminal details. The primary objective of database design is fast response time to inquire, more information at low cost, control of redundancies, clarity and ease of use, data and program independencies, accuracy and integrity of the system.
Page No:21
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
Page No:22
5.1
CODING:
The goal of coding phase is to translate the design of the system in to code in a particular
programming language. For a given design, then aim of coding is to implement the design in the best possible manner. Code snippets: ClassLibrary using System; using System.Collections.Generic; using System.Text; using System.Data; using System.Data.SqlClient; namespace ClassLibrary1 { public class Class1 { SqlConnection con = new SqlConnection("server=.;uid=sa;database=toch"); SqlCommand cmd = new SqlCommand(); public void opencon() { if (con.State == ConnectionState.Open) { con.Close(); } con.Open(); cmd.Connection = con; } public SqlConnection getcon { get { return con; }
}
Page No:42
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
:CRIME AND
public SqlCommand getcommand { get { return cmd; } }}} Class2.cs using System; using System.Collections.Generic; using System.Text; using System.Data; using System.Data.SqlClient; namespace ClassLibrary1 { public class Class2 { Class1 c1 = new Class1(); DataSet ds = new DataSet(); public void insert(string complaintid,string name ,string address,string gender,string phonenumber,string place,string complaint,string complintfile ) { c1.opencon(); c1.getcommand.CommandText = "insert into complaints values('"+ complaintid +"','" + name + "','" + address + "','" + gender + "','" + phonenumber + "','" + place + "','" + complaint + "','" + complintfile + "') "; c1.getcommand.ExecuteNonQuery(); } public void insertcriminal(string criminalid,string crimeid,string stationid, string crimename, string criminalname, string housename, string place, string age, string gender,string nickname,string criminaltype,string mop,string comment) { c1.opencon(); c1.getcommand.CommandText = "insert into criminaldetails values('"+criminalid+"','" + crimeid + "','" + stationid + "','" + crimename + "','" + criminalname + "','" + housename + "','"+place +"','" + age + "','" + gender + "','" + nickname + "','" + criminaltype + "','" + mop + "','" + comment + "') "; c1.getcommand.ExecuteNonQuery(); }
Page No:43
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
:CRIME AND
public void insertteam(string teamname,string stationname) { c1.opencon(); c1.getcommand.CommandText = "insert into team values('" + teamname + "','" + stationname + "') "; c1.getcommand.ExecuteNonQuery(); } public void insertmembers(string teamname, string membername, string address, string place, string city, string phone, string age, string gender) { c1.opencon(); c1.getcommand.CommandText = "insert into teammemeber values('" + teamname + "','" + membername + "','" + address + "','" + place + "','" + city + "','" + phone + "','" + age + "','" + gender + "') "; c1.getcommand.ExecuteNonQuery(); } public void insertvictim(string crimename, string victimname, string age, string gender, string address, string dob, string ms, string comp, string ht, string wt, string im, string cb) { c1.opencon(); c1.getcommand.CommandText = "insert into victimdetails values('" + crimename + "','" + victimname + "','" + age + "','" + gender + "','" + address + "','" + dob + "','" + ms + "','" +comp + "','" + ht + "','" + wt + "','" + im + "','" + cb + "') "; } public void delete(string complaintid) { c1.opencon(); c1.getcommand.CommandText = "delete complaints where complaintid = '"+complaintid +"'"; c1.getcommand.ExecuteNonQuery(); } public void deletestation(int id) { c1.opencon(); c1.getcommand.CommandText = "delete " + id + "";
Page No:44
SEMESTER:
VIII
BRANCH:INFORMATION TECHNOLOGY
:CRIME AND
c1.getcommand.ExecuteNonQuery(); } public void updatestation(int id,string stationname) { c1.opencon(); c1.getcommand.CommandText = "update stationreg set stationname = '"+stationname +"' where stationid="+id+""; c1.getcommand.ExecuteNonQuery(); } public void insertstation(string stationid,string stationmame, string place, string phone, string stationincharge, string userid, string password ) { c1.opencon(); c1.getcommand.CommandText = "insert into stationreg values('"+stationid+"','" + stationmame + "','" +place + "','" + phone + "','" +stationincharge + "','" +userid + "','" +password + "') "; c1.getcommand.ExecuteNonQuery(); } public DataSet view() { SqlDataAdapter adp = new SqlDataAdapter("select * from complaints",c1.getcon); adp.Fill(ds); return ds;
public DataSet viewcrime() { SqlDataAdapter adp = new SqlDataAdapter("select * from crimedetails", c1.getcon); adp.Fill(ds); return ds;
Page No:45
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
public DataSet viewcriminal() { SqlDataAdapter adp = new SqlDataAdapter("select * from criminaldetails", c1.getcon); adp.Fill(ds); return ds; } public DataSet viewstation() { SqlDataAdapter adp = new SqlDataAdapter("select * from stationreg", c1.getcon); adp.Fill(ds); return ds; } public DataSet viewvictim() { SqlDataAdapter adp = new SqlDataAdapter("select * from victimdetails", c1.getcon); adp.Fill(ds); return ds; } public string getstationid() { c1.opencon(); c1.getcommand.CommandText = " select isnull(max(stationid)+1,1) from stationreg"; string i; i = c1.getcommand.ExecuteScalar().ToString(); return i; }
Page No:46
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
public string getcriminalid() { c1.opencon(); c1.getcommand.CommandText = " select isnull(max(criminalid)+1,1) from criminaldetails"; string i; i = c1.getcommand.ExecuteScalar().ToString(); return i; } public void insertcrime(string crimeid,string stationid, string crime, string place, string time, string noofcriminals, string noofvictims, string acusename, string date,string remarks) { c1.opencon(); c1.getcommand.CommandText = "insert into crimedetails values('"+crimeid+"','" + stationid + "','" + crime + "','" + place + "','" + time + "','" + noofcriminals + "','" + noofvictims + "','" + acusename + "','" + date + "','"+remarks +"') "; c1.getcommand.ExecuteNonQuery(); } public DataSet readteam() { SqlDataAdapter adp = new SqlDataAdapter("select teamname from team ",c1.getcon ); adp.Fill(ds); return ds; }}} Crime details using System; using System.Data; using System.Configuration; using System.Collections; using System.Web;
Page No:47
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
public partial class crimedetails : System.Web.UI.Page { ClassLibrary1.Class2 obj = new ClassLibrary1.Class2(); protected void Page_Load(object sender, EventArgs e) { GridView1.DataSource = obj.viewcrime (); GridView1.DataBind(); } protected void Button1_Click(object sender, EventArgs e) { obj.insertcrime(TextBox1.Text,TextBox2 .Text ,TextBox3 .Text ,TextBox4 .Text ,TextBox5 .Text ,TextBox6 .Text ,TextBox7 .Text,TextBox8 .Text ,TextBox9 .Text ,TextBox10 .Text ); GridView1.DataSource = obj.viewcrime(); GridView1.DataBind(); } } Complaints using System; using System.Data; using System.Configuration; using System.Collections; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.UI.WebControls.WebParts; using System.Web.UI.HtmlControls; public partial class sendcomplaints : System.Web.UI.Page { ClassLibrary1.Class2 obj = new ClassLibrary1.Class2(); protected void Page_Load(object sender, EventArgs e) { } protected void Button1_Click(object sender, EventArgs e)
Page No:48
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
{ s = RadioButton2.Text; } obj.insert(TextBox1 .Text ,TextBox2.Text, TextBox3.Text, s, DropDownList1.SelectedItem.Text, TextBox6.Text, TextBox7.Text, FileUpload1.FileName); } protected void Button2_Click(object sender, EventArgs e) { } }
Page No:49
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
Page No:50
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
Testing is the process of executing the program to find if there are any errors. It is the final verification and validation activity .In testing phase we have tried to affirm the quality of the product. We have also tried to eliminate errors in the previous stages.
UNIT TESTING:
ADMINISTRATOR MODULE Serial No. 1. Unit Login Input Username and password Expected output Check with database for their relevance and redirect to the admin home page Output obtained Database is verified and application redirected to admin home page status remedies
pass
2.
Station registration
pass
Page No:51
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
Serial No. 3.
Unit search
Expected output Check database for the dates and display crimes during those days
Output obtained
status
remedies
4.
Change password
5.
View crimes
Select all records from the All crimes table displayed crimes in gridview and display it in gridview
success
Page No:52
SEMESTER: VIII
CITIZEN MODULE Serial No. 1. Unit send complaints Input Name, address, phone No., complaint file. Expected output Output obtained status remedies
success
STATION IN-CHARGE MODULE Serial No. Unit Input Expected output Select all records from the table crimes and display it in gridview Output obtained status remedies
1.
View crimes
success
Page No:53
SEMESTER: VIII
Input
Team name, member name,address, phone No.
Expected output
Insert into table team in the database
status success
remedies
3.
Assign team
fail
4.
Arrest details
success
5.
Close crimes
success
Page No:54
SEMESTER: VIII
INTEGRATION TESTING:
Serial No.
Unit
Input
Expected output
Output obtained
status
remedies
1.
Citizen module
complaints
Complaint Insert inserted and success complaints. station incharge could view it.
2.
Station module
in-charge
FIR
Create FIR
success
3.
Administrator module
success
Page No:55
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
Page No:56
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
Nothing can be ended in a single step. It is the fact that nothing is permanent in this world. So this project also has some future enhancements in the evergreen and booming IT industry. Change is inevitable. The project entitled Crime Management and Reporting System was successfully designed developed and tested. The system and the architecture is a compatible one, so addition of new modules can be done without much difficulty. Since this module has its unique properties it can extend further to make this system a complete one.
Scope of further development The various Future Enhancement which shall include in this software are:
We look forward to working with the Government in implementing the recommendations and
seeing an improvement in the effectiveness of the Police Department.
The method of video conferencing can be added to make the project livelier. An intercom facility will add a little more flexible communication between the Administrator,
Station in-charge and investigation team members. Not withstanding this drive and progress, the Panel believes that more fundamental changes are needed. It hopes that the recommendation made in this report will assist in changing the culture around partnership.
Page No:57
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
Page No:58
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
The project entitled Crime Management and Reporting System is very useful for the Police Department. The project was designed, implemented and tested successfully. The Software developed is found to be working efficiently and effectively. It undertakes regular and timely action against the crimes reported. It can be observed that the information can be obtained easily and accurately. The project provides much security. The simplicity and friendliness are the advantages of this project. The Software is made user friendly to the maximum so that any one can run the software provided he could access to the system via the login password. This project manages all details without any risk. All the objectives were met with satisfaction. The performance of the system is found to be satisfactory.
Page No:59
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
Page No:60
SEMESTER: VIII
BRANCH:INFORMATION TECHNOLOGY
BOOKS REFERED :
Active Server Pages for Dummies. IDG Books worldwide, 2001 Scott Stabbert, Authentication and security for Internet developers C#.NET Illuminated ,Art Gittleman California State University, Long Beach C# Professional Projects,Nithin Pandey ,Geetanjali Arora. Microsoft Visual C#.NET ,Mickey Williams
ONLINE HELP :
Page No:61