Flylib.com
Advanced .NET Programming
Advanced .NET Programming
ISBN: 1861006292
EAN: 2147483647
Year: 2002
Pages: 124
Authors:
Simon Robinson
BUY ON AMAZON
Advanced .NET Programming
Table of Contents
Introduction
Programming Languages Used
Conventions
Customer Support
Chapter 1: Introducing Intermediate Language
Introducing IL Assembly
IL Principles
Programming IL
Debugging IL
Summary
Chapter 2: Intermediate Language: Digging Deeper
Working with Objects and ValueType Instances
Enumerations
Arrays
Calling Unmanaged Code with PInvoke
Defining Literal Binary Data
Exception Handling
Attributes
Disassembling IL and Round-Tripping
Summary
Chapter 3: Inside the CLR
The .NET Framework Components and ECMA
The ValueReference Type System
JIT Compilation: Verification and Validation
Managed and Unmanaged Code
Summary
Chapter 4: Assemblies
The Internal View: Assembly Physical Structure
The External View: Assembly Logical Structure
Locating Assemblies
Generating Assemblies
Putting it all Together
Summary
Chapter 5: Garbage Collection
Why Use Garbage Collection?
How the .NET Garbage Collector Works
Implementing Dispose() and Finalize()
Weak References
Summary
Chapter 6: Improving Performance
Managed or Unmanaged?
JIT Compiler Optimization
Performance Tips
Summary
Chapter 7: Profiling and Performance Counters
How Windows Supports Performance Monitoring
Understanding Memory
Performance Counters
PerfMon
Profiling
Summary
Chapter 8: Dynamic Code Generation
Reasons to Use Dynamic Code Generation
Architecture
Coding using Reflection.Emit
Coding with the CodeDom
Summary
Chapter 9: Threading
CLR Threading Support
Multi-Threading Techniques
Asynchronous Delegates
Synchronizing Variable Access
Timers
Explicitly Creating and Aborting a Thread
Summary
Chapter 10: Management Instrumentation
What is WMI?
Performing Queries using the System.Management Classes
Asynchronous Processing
Receiving Notifications
Summary
Chapter 11: Advanced Windows Forms
Windows Messages Under the Hood
Message Loop Examples
XP Themed Controls
Non-Rectangular Windows
Owner Draw Controls
Graphics
Summary
Chapter 12: Code Access Security
Code Access Security Concepts
The Default Security Policy
Coding with CAS
CAS Under the Hood
Defining Custom Permissions
Asserting Permissions
Summary
Chapter 13: Cryptography
The Aims of Cryptography
Symmetric Encryption
Public Key Encryption
Hashing
Digital Signatures
Certificates
Summary
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Advanced .NET Programming
ISBN: 1861006292
EAN: 2147483647
Year: 2002
Pages: 124
Authors:
Simon Robinson
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
ERP System Acquisition: A Process Model and Results From an Austrian Survey
The Second Wave ERP Market: An Australian Viewpoint
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Distributed Data Warehouse for Geo-spatial Services
Beginning Cryptography with Java
The JCA and the JCE
Object Description in Cryptography Using ASN.1
Certificate Revocation and Path Validation
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Monitoring and Controlling Risky Projects
FileMaker Pro 8: The Missing Manual
Opening and Closing Database Files
Creating a Calculation Field
The Importance of the Layout
Script Steps
Appendix A. Getting Help
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
Java Concurrency in Practice
Delegating Thread Safety
Handling Abnormal Thread Termination
JVM Shutdown
Configuring ThreadPoolExecutor
Why are GUIs Single-threaded?
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies