Flylib.com
Customizing the Microsoft .NET Framework Common Language Runtime
Customizing the Microsoft .NET Framework Common Language Runtime
ISBN: 735619883
EAN: N/A
Year: 2005
Pages: 119
BUY ON AMAZON
Customizing the Microsoft .NET Framework Common Language Runtime
Table of Contents
Copyright
Foreword
Acknowledgments
Introduction
What Makes This .NET Framework Book Unique?
The .NET Framework 2.0 Prereleases
Sample Code and System Requirements
Comments, Corrections, and Support
Chapter 1. CLR Hosts and Other Extensible Applications
Summary
Chapter 2. A Tour of the CLR Hosting API
CorBindToRuntimeEx and ICLRRuntimeHost
CLR Hosting Managers
CLR Initialization and Startup
Other Unmanaged Functions on mscoree.dll
Hosting Manager Discovery
Overview of the Hosting Managers
Summary
Chapter 3. Controlling CLR Startup and Shutdown
The CLR Startup Configuration Settings
Setting the Startup Options Using CorBindToRuntimeEx
Starting the CLR
Handling Failures from CorBindToRuntimeEx
Deferring CLR Initialization and Startup
The CLR and Process Lifetime
Summary
Chapter 4. Using the Default CLR Host
Invoking the Default Host: Running Managed Executables
Invoking the Default Host: Activating Managed Types Through COM Interop
Defaults for the CLR Startup Options
Customizing the Default Host Using Configuration Files
Summary
Chapter 5. Using Application Domains Effectively
The Role of Application Domains
Application Domain Structure
Guidelines for Partitioning a Process into Multiple Application Domains
Application Domain Managers
Application Domains and Threads
Unloading Application Domains
Summary
Chapter 6. Configuring Application Domains
Application Domain Configuration Settings
Private Assembly Directory Settings
Configuration File Settings
Shadow Copy Settings
Assembly Binding Settings
Miscellaneous Settings
Customizing Application Domain Creation Using System.AppDomainManager
Summary
Chapter 7. Loading Assemblies in Extensible Applications
Concepts and Terminology
Loading Assemblies by Assembly Identity
Loading Assemblies by Filename
Loading Assemblies Using ICLRRuntimeHost
Capturing Assembly Load Events
Versioning Considerations for Extensible Applications
Summary
Chapter 8. Customizing How Assemblies Are Loaded
The Cocoon Deployment Model
Implementing an Assembly Loading Manager
Customizing How Assemblies Are Loaded Using Only Managed Code
Summary
Chapter 9. Domain-Neutral Assemblies
Domain-Neutral Assembly Architecture
Specifying Which Assemblies Are Loaded Domain Neutral
Determining Whether an Assembly Has Been Loaded Domain Neutral
Summary
Chapter 10. Extending the CLR Security System to Protect Your Extensible Application
An Overview of Code Access Security
Customizing the Code Access Security System Using a HostSecurityManager
Code Access Security in the Cocoon Host
Associating Evidence with an Application Domain
The AllowPartiallyTrustedCallers Attribute
Summary
Chapter 11. Writing Highly Available Microsoft .NET Framework Applications
Application Domain Isolation and Process Lifetimes
Specifying Escalation Policy Using the CLR Hosting Interfaces
Guidelines for Writing Highly Available Managed Code
Summary
Chapter 12. Enforcing Application-Specific Programming Model Constraints
The Host Protection Categories
Using the Host Protection Manager
Host Protection in the Cocoon Deployment Model
Summary
Chapter 13. Managing How the CLR Uses Memory
Integrating the CLR with Custom Memory Managers
Configuring the CLR Garbage Collector
Summary
Chapter 14. Integrating the CLR with Custom Schedulers and Thread Pools
The Task Abstraction
Controlling the Execution of Tasks
Summary
About the Author
Index
SYMBOL
A
B
C
D
E
F
G
H
I
L
M
N
O
P
R
S
T
U
V
W
Customizing the Microsoft .NET Framework Common Language Runtime
ISBN: 735619883
EAN: N/A
Year: 2005
Pages: 119
BUY ON AMAZON
CISSP Exam Cram 2
Question-Handling Strategies
System Architecture and Models
System Validation
Business Continuity Planning
Cryptographic Services
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Legal, Regulations, Compliance, and Investigations
Physical (Environmental) Security
Appendix A Answers to Assessment Questions
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
MySQL Clustering
Management Nodes
Running MySQL in a Chrooted Environment
Benchmarking
Displaying the Status of the Cluster/Controlling Nodes
Logging Commands
MySQL Cookbook
Adding a Temporal Interval to a Date
Floating Specific Values to the Head or Tail of the Sort Order
Using an AUTO_INCREMENT Column to Create Multiple Sequences
Finding Cumulative Sums and Running Averages
Generating Random Numbers
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Designing and Installing a Computer Network
Designing and Installing Distributed Video Systems
Water Management Systems
Home Access Control Systems
Appendix E CEDIA Installer Level I Classification System
MPLS Configuration on Cisco IOS Software
Option 1: Inter-Provider VPN Using Back-to-Back VRF Method
Deployment Scenarios with CSC Architecture
Introduction to Layer 2 VPNs
Case Study 5: Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
Case Study 8: Implementing Hub and Spoke Topologies with EIGRP
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies