Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Application Development
Table 1.1: Logical Operators Supported by the
#if..#endi
f
Directive
Table 1.2: Commonly Used Switches of the File Signing Tool
Table 1.3: Commonly Used Switches of the Certificate Creation Tool
Chapter 2: Working with Data
Table 2.1: Character Encoding Classes
Table 2.2: Commonly Used Regular Expression Metacharacter Elements
Table 2.3: Commonly Used Regular Expressions
Table 2.4: Operators Supported by the
DateTime
and
TimeSpan
Chapter 3: Application Domains, Reflection, and Metadata
Table 3.1: Commonly Used
AppDomainSetup
Properties
Table 3.2: Methods That Return Type Objects
Table 3.3: Members of the
AttributeUsage
Enumeration
Chapter 4: Threads, Processes, and Synchronization
Table 4.1: Controlling the Execution of a Thread
Table 4.2:
WaitHandl
e
Methods for Synchronizing Thread Execution
Table 4.3: Properties of the
ProcessStartInfo
Class
Table 4.4: Methods for Obtaining
Process
References
Chapter 5: XML Processing
Table 5.1:
XPath
Expression Syntax
Chapter 7: ASP.NET and Web Forms
Table 7.1: Types of State Management
Table 7.2: Types of Authentication
Chapter 9: Files, Directories, and I/O
Table 9.1: Members for Files and Directories
Table 9.2: Methods for Manipulating a
FileInfo
Object
Table 9.3: Methods for Manipulating a
DirectoryInfo
Object
Chapter 10: Database Access
Table 10.1: .NET Framework Data Provider Implementations
Table 10.2: Connection String Settings That Control Connection Pooling
Table 10.3: Common Command Object Properties
Table 10.4: Parameter Properties
Table 10.5: Commonly Used Members of Data Reader Classes
Chapter 13: Runtime Security
Table 13.1:
Evidence
Classes That Generate Identity Permissions
Table 13.2: Classes and Their Methods That Allow You to Assign Evidence to an Assembly
Table 13.3: Windows Built-In Account Names and Identifiers
Table 13.4: Members of the
PrincipalPolicy
Enumeration
Chapter 14: Cryptography
Table 14.1: Hashing Algorithm Implementations
Table 14.2: Keyed Hashing Algorithm Implementations
Table 14.3: Symmetric Algorithm Implementations
Table 14.4: Operation of a
CryptoStrea
m
Object
Chapter 16: Commonly Used Interfaces and Patterns
Table 16.1: Members of the
IEnumerator
Interface
Chapter 17: Windows Integration
Table 17.1: Commonly Used Members of the
Environment
Class
Table 17.2: Determining the Current Operating System
Table 17.3:
Static
Fields of the
Registry
Class
Table 17.4:
RegistryKey
Methods to Create, Read, Update, and Delete Registry Keys and Values
Table 17.5: Methods That Control the Operation of a Service
Previous page
Table of content
C# Programmer[ap]s Cookbook
ISBN: 735619301
EAN: N/A
Year: 2006
Pages: 266
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
SWT/JFace Mechanisms
Jump Start with SWT/JFace
Dialogs
Other Important SWT Components
Eclipse Forms
Java for RPG Programmers, 2nd Edition
Structured Operations And Statements
Data Types And Variables
Date And Time Manipulation
User Interface
Database Access
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Using Loops
Exploring Excel Objects
VBA Help
Introduction
Figuring a Break-Even Point
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Group Management Protocol (IGMP)
Transmission Control Protocol (TCP) Retransmission and Time-Out
Windows Internet Name Service (WINS)
File and Printer Sharing
Internet Protocol Security (IPSec)
C & Data Structures (Charles River Media Computer Engineering)
Preprocessing
Function
Memory Allocation
Trees
Problems in Trees
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies