Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: An Overview of C#
Table 2-1: The C# Keywords
Chapter 3: Data Types, Literals, and Variables
Table 3-1: The C# Value Types
Table 3-2: Character Escape Sequences
Chapter 4: Operators
Table 4-1: The Bitwise Operators
Table 4-2: The Precedence of the C# Operators
Chapter 7: Arrays and Strings
Table 7-1: Some Common String Handling Methods
Chapter 11: Inheritance
Table 11-1: Methods of the object Class
Chapter 13: Exception Handling
Table 13-1: Commonly Used Exceptions Defined Within the System Namespace
Chapter 14: Using I/O
Table 14-1: Some of the Methods Defi ned by Stream
Table 14-2: The Properties Defi ned by Stream
Table 14-3: The Input Methods Defi ned by TextReader
Table 14-4: The FileMode Values
Table 14-5: Commonly Used Output Methods Defined by BinaryWriter
Table 14-6: Commonly Used Input Methods Defined by BinaryReader
Chapter 20: Exploring the System Namespace
Table 20-1: The Methods Defined by Math
Table 20-2: Methods Supported by the Integer Structures
Table 20-3: The Methods Supported by Single
Table 20-4: The Fields Supported by Single
Table 20-5: The Methods Supported by Double
Table 20-6: Fields Supported by Double
Table 20-7: The Methods Defined by Decimal
Table 20-8: Fields Supported by Decimal
Table 20-9: Methods Defined by Char
Table 20-10: Methods Defined by Boolean
Table 20-11: Properties Defined by Array
Table 20-12: Methods Defined by Array
Table 20-13: Methods Defined by BitConverter
Table 20-14: Methods Defined by Random
Table 20-15: Methods Defined by GC
Table 20-16: Methods Defined by Object
Chapter 21: Strings and Formatting
Table 21-1: The String Comparison Methods
Table 21-2: The StringComparison Enumeration Values
Table 21-3: The Search Methods Offered by String
Table 21-4: The Format Specifiers
Table 21-5: The Format( ) Methods
Table 21-6: Custom Format Placeholder Characters
Table 21-7: The Date and Time Format Specifiers
Table 21-8: The Custom Date and Time Placeholder Characters
Table 21-9: The Enumeration Format Specifiers
Chapter 23: Collections, Enumerators, and Iterators
Table 23-1: The Non-Generic Collection Interfaces
Table 23-2: The Methods Defined by IList
Table 23-3: The Methods Defined by IDictionary
Table 23-4: Several Commonly Used Methods Defined by ArrayList
Table 23-5: Several Commonly Used Methods Defined by Hashtable
Table 23-6: Several Commonly Used Methods Defined by SortedList
Table 23-7: The Methods Defined by Stack
Table 23-8: The Methods Defined by Queue
Table 23-9: The Methods Defined by BitArray
Table 23-10: The Generic Collection Interfaces
Table 23-11: The Methods Defined by IList<T>
Table 23-12: The Methods Defined by IDictionary<TK, TV>
Table 23-13: The Generic Collection Classes
Table 23-14: A Sampling of Methods Defined by List<T>
Table 23-15: A Sampling of Methods Defined by LinkedList<T>
Table 23-16: Several Commonly Used Methods Defined by Dictionary<TK, TV>
Table 23-17: A Sampling of Methods Defined by SortedDictionary<TK, TV>
Table 23-18: Several Commonly Used Methods Defined by SortedList<TK, TV>
Table 23-19: The Methods Defined by Stack<T>
Table 23-20: The Methods Defined by Queue<T>
Chapter 24: Networking Through the Internet
Table 24-1: The Methods Defined by WebRequest That Support Synchronous Communications
Table 24-2: The Properties Defined by WebRequest
Table 24-3: The Methods Defined by WebResponse
Table 24-4: The Properties Defined by WebResponse
Table 24-5: The Properties Defined by HttpWebResponse
Table 24-6: The Properties Defined by WebClient
Table 24-7: The Synchronous Methods Defined by WebClient
Appendix A: XML Comment Quick Reference
Table A-1: The XML Comment Tags
Previous page
Table of content
C# 2.0: The Complete Reference (Complete Reference Series)
ISBN: 0072262095
EAN: 2147483647
Year: 2006
Pages: 300
Authors:
Herbert Schildt
BUY ON AMAZON
FileMaker Pro 8: The Missing Manual
Navigating Your Database
Print-Related Layout Options
Validate Data Entry with a Calculation
Go to Layout
Disable Script Steps
Network Security Architectures
References
IPsec Modes of Operation and Security Options
Applied Knowledge Questions
Network Design Considerations
Network Security Management Best Practices
Cisco Voice Gateways and Gatekeepers
Providing Fax and Modem Services
Case Study: Using a T1 Link as a Tie Line
Case Study: Implementing Gateway-Controlled RSVP
Verifying and Troubleshooting SRST
Gatekeepers with CallManager
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Case Studies
Metadata exchange
Part IV: Building SOA (Planning and Analysis)
SOA Delivery Strategies
WS-MetadataExchange language basics
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
.NET-A Complete Development Cycle
Getting Started
Unit Tests
Refining Requirements for 3D Text Display
Putting It All Together
No Longer under Construction
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies