Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Application Development
Table 1.1: Logical Operators Supported by the
#if..#endi
f
Directive
Table 1.2: Commonly Used Switches of the File Signing Tool
Table 1.3: Commonly Used Switches of the Certificate Creation Tool
Chapter 2: Working with Data
Table 2.1: Character Encoding Classes
Table 2.2: Commonly Used Regular Expression Metacharacter Elements
Table 2.3: Commonly Used Regular Expressions
Table 2.4: Operators Supported by the
DateTime
and
TimeSpan
Chapter 3: Application Domains, Reflection, and Metadata
Table 3.1: Commonly Used
AppDomainSetup
Properties
Table 3.2: Methods That Return Type Objects
Table 3.3: Members of the
AttributeUsage
Enumeration
Chapter 4: Threads, Processes, and Synchronization
Table 4.1: Controlling the Execution of a Thread
Table 4.2:
WaitHandl
e
Methods for Synchronizing Thread Execution
Table 4.3: Properties of the
ProcessStartInfo
Class
Table 4.4: Methods for Obtaining
Process
References
Chapter 5: XML Processing
Table 5.1:
XPath
Expression Syntax
Chapter 7: ASP.NET and Web Forms
Table 7.1: Types of State Management
Table 7.2: Types of Authentication
Chapter 9: Files, Directories, and I/O
Table 9.1: Members for Files and Directories
Table 9.2: Methods for Manipulating a
FileInfo
Object
Table 9.3: Methods for Manipulating a
DirectoryInfo
Object
Chapter 10: Database Access
Table 10.1: .NET Framework Data Provider Implementations
Table 10.2: Connection String Settings That Control Connection Pooling
Table 10.3: Common Command Object Properties
Table 10.4: Parameter Properties
Table 10.5: Commonly Used Members of Data Reader Classes
Chapter 13: Runtime Security
Table 13.1:
Evidence
Classes That Generate Identity Permissions
Table 13.2: Classes and Their Methods That Allow You to Assign Evidence to an Assembly
Table 13.3: Windows Built-In Account Names and Identifiers
Table 13.4: Members of the
PrincipalPolicy
Enumeration
Chapter 14: Cryptography
Table 14.1: Hashing Algorithm Implementations
Table 14.2: Keyed Hashing Algorithm Implementations
Table 14.3: Symmetric Algorithm Implementations
Table 14.4: Operation of a
CryptoStrea
m
Object
Chapter 16: Commonly Used Interfaces and Patterns
Table 16.1: Members of the
IEnumerator
Interface
Chapter 17: Windows Integration
Table 17.1: Commonly Used Members of the
Environment
Class
Table 17.2: Determining the Current Operating System
Table 17.3:
Static
Fields of the
Registry
Class
Table 17.4:
RegistryKey
Methods to Create, Read, Update, and Delete Registry Keys and Values
Table 17.5: Methods That Control the Operation of a Service
Previous page
Table of content
C# Programmer[ap]s Cookbook
ISBN: 735619301
EAN: N/A
Year: 2006
Pages: 266
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
IT Project+ Study Guide
Assessment Test
Project Initiation
Project Execution
Project Control
Certified Ethical Hacker Exam Prep
Summary
Sniffers
Study Strategies
Key Terms
Exam Simulation
Building Web Applications with UML (2nd Edition)
Web Services
Types of Security Risk
Architecture Elaboration
Activities
Advanced Client-Side Scripting
MySQL Clustering
Installation
Testing Your Cluster
Upgrading MySQL Cluster
MySQL Cluster Errors
Displaying the Status of the Cluster/Controlling Nodes
Visual C# 2005 How to Program (2nd Edition)
Another C# Application: Adding Integers
Terminology
Logical Operators
Method Overloading
B.5. Converting from Decimal to Binary, Octal or Hexadecimal
Cultural Imperative: Global Trends in the 21st Century
Cross-Century Worldviews
Cultural Black Holes
Culture and Globalization
Conclusion
Appendix B Leadership Test
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies