[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] scalability (PASS MADE) logical design validation physical design validation 2nd scalability pyramid scalability requirements (PASS MADE) scalability pyramid scaling out scaling up scaling out scaling up scenarios usage scenarios 2nd schemas database schemas snowflake schemas star schemas XML schemas 2nd complexType elements 2nd 3rd 4th 5th 6th 7th namespaces 2nd simpleType versus DTD scope extranet applications internet applications intranet applications use cases scope (Envisioning Phase) 2nd scoring exams 2nd sealing messages security strategies secondary actors securing class libraries system access security strategies security role-based security WS-Security security (logical design) security (logical design) security (logical design) authentication Forms authentication Passport authentication signing code Windows authentication authorization 2nd forms applications resource-based authorization Web applications encryption database connection strings SSL 2nd security (PASS MADE) logical design validation 2nd physical design validation 2nd security measures monitoring security policies authentication business services authenticaiton 2nd data access authenticaiton GUI 2nd user services authenticaiton authorization business services authorization code access security data access authorization 2nd role-based security user services authorization developing 2nd encryption policies logon policies passwords secure communication cryptography data encryption SSL security requirements (PASS MADE) 2nd acceptable risk auditing authentication authorization data protection encryption policies intruder prevention processes logon policies passwords security measures monitoring user accounts security strategies ASP.NET data encryption 2nd IPSec RPC SSL SSL/TLS data privacy strategies messages sealing signing 2nd system access securing system support 2nd testing strategies functional tests regression testing usage testing selecting architectural models layers legacy integration 2nd tiers 2nd Web applications versus Windows applications 2nd XML Web services Visual Studio .NET deployment projects sequence diagrams (UML) serialized objects server-side state management 2nd 3rd 4th 5th 6th Application state 2nd Cache state cookies 2nd Session state servers Web servers deployment strategies 2nd service accounts data access authentication (security policies) data access authorization (security policies) 2nd service agents 2nd service architectures (logical design) 2nd BizTalk Server callbacks Windows services service interfaces serviced components Session objects session state Session state server-side state management session state sticky sessions 2nd set-comparison constraints Setsko, Inc. (case studies) background current systems 2nd envisioned systems 2nd problem statements Setup Projects (Visual Studio .NET deployment projects) 2nd Show Answer option (PrepLogic Practice Exams, Preview Edition) showing answers (exams) ShowSounds property side-by-side versioning (GAC) 2nd signing security strategies 2nd signing code simpleType (XML) simulations exam simulations PrepLogic Practice Exams, Preview Edition exam simulation interface single call objects (.NET Remoting) Singleton objects (.NET Remoting) slang expressions globalized applications snowflake schemas software PrepLogic Practice Exams, Preview Edition Enable Item Review button Enable show Answer button exam simulation interface exam simulations Examination Score Report window 2nd Exhibit button Flash Review mode 2nd Grade Exam option installing 2nd Item Review button Mark Item option Next Item option Practice Test mode 2nd 3rd Previous Item option questions Randomize Choices option removing Show Answer option software requirements viewing time remaining Your Score Report window QA tests software requirements (operation requirements) 2nd 3rd solutions, proposing (Envisioning Phase) 2nd analogy 2nd feasibility 2nd business perspective resource perspective 2nd 3rd technical perspective 2nd metaphors 2nd reference architectures risk management 2nd risk analysis 2nd risk controll 2nd risk identification risk mitigation 2nd risk statements risk tracking Top 10 risk lists scope versus vision 2nd vision versus scope 2nd sorting data localized applications source code management processes 2nd spawning new threads in .NET Framework asynchronous processing SQL Server Index Tuning Wizard SQL Server 2000 data migration BCP 2nd DTS 2nd SSL (Secure Socket Layer) SSL (Secure Sockets Layer) 2nd security strategies SSL/TLS (Secure Sockets Layer/Transport Layer Security) security strategies standalone users standards case studies analyzing 2nd code review standards FxCop issue logs coding standards 2nd abbreviations arrays asynchronous programming 2nd Callback .NET pattern camel cases 2nd casting types class library security 2nd collections COM constructors defensive programming dimensioning variables 2nd Equality Operator equals Equals .NET pattern event handlers exception handling Finalize and Dispose .NET pattern implicit casts instantiating variables naming classes naming methods 2nd naming properties 2nd operator overloading Pascal cases 2nd thread design 2nd Timeout .NET pattern types defining 2nd documentation standards 2nd testing standards UI standards inheritance User Interface standards document star schemas starting exam reviews Practice Test mode (PrepLogic Practice Exams, Preview Edition) 2nd state application state Application state server-side state management 2nd Cache state (ASP.NET) server-side state management configuring managing 2nd 3rd 4th Application objects 2nd Cache objects client-side state management 2nd server-side state management 2nd Session objects Web applications 2nd 3rd 4th Windows applications session state database sessions Session state server-side state management session state sticky sessions state management client-side state management 2nd 3rd cookies 2nd hidden fields 2nd query strings ViewState 2nd data validation 2nd 3rd code checking complex validation data type validation range checking development strategies client-side state management 2nd 3rd data validation 2nd 3rd server-side state management 2nd 3rd 4th server-side state management 2nd 3rd 4th Application state 2nd Cache state cookies 2nd Session state statechart diagrams (UML) sticky sessions storing data cookies 2nd 3rd 4th development strategies 2nd 3rd 4th system activity information (development strategies) Application event log strategic business unit organizational structures strategies coexistence deployment strategies data privacy strategies security strategies deployment strategies 2nd 3rd automated application deployment coexistence deployment strategies data integration data migration distributable media licensing 2nd 3rd 4th merge modules Visual Studio .NET Web servers 2nd Windows Installer development strategies 2nd auditing system activity 2nd 3rd data storage 2nd 3rd 4th deployment strategies 2nd 3rd 4th 5th 6th 7th error handling 2nd 3rd 4th 5th 6th 7th 8th 9th globalization 2nd localizability localization 2nd 3rd 4th logging system activity 2nd 3rd logic handling monitoring system activity 2nd 3rd state management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th storing system activity information 2nd system integration operations strategies data archiving data purging 2nd upgrades security strategies ASP.NET assigning permissions data encryption 2nd data privacy strategies sealing messages securing system access signing 2nd system support 2nd testing strategies strategies (exams) strings database connection strings encryption query strings client-side state management struct types coding standards structured exception handling try/catch structures 2nd structured exceptions handling 2nd subtype constraints 2nd successful projects, defining 2nd support system support security strategies 2nd surrogate keys 2nd surrogate keys (logical data models) symbols currency symbols localized applications synchronous processing versus asynchronous processing 2nd 3rd 4th syntax errors development strategies system block diagrams system features identifying 2nd system integration development strategies system malfunctions development strategies system specifications developing 2nd 3rd development strategies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd operations strategies 2nd 3rd 4th 5th security strategies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th system support security strategies 2nd System.Globalization namespaces (.NET Framework) world-ready applications System.IO.FileSystemWatcher class System.Resources namespace ResourceManager class ResourceReader class ResourceSet class ResourceWriter class System.Resources namespaces (.NET Framework) world-ready applications systems access, securing security strategies activity information, storing (development strategies) Application event log activity, auditing (development strategies) 2nd 3rd activity, logging (development strategies) 2nd 3rd activity, monitoring (development strategies) 2nd 3rd upgrades operations strategies |