S

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

scalability (PASS MADE)
     logical design validation
     physical design validation 2nd
scalability pyramid
scalability requirements (PASS MADE)
     scalability pyramid
     scaling out
     scaling up
scaling out
scaling up
scenarios
     usage scenarios 2nd
schemas
     database schemas
     snowflake schemas
     star schemas
     XML schemas 2nd
         complexType
         elements 2nd 3rd 4th 5th 6th 7th
         namespaces 2nd
         simpleType
         versus DTD
scope
     extranet applications
     internet applications
     intranet applications
     use cases
scope (Envisioning Phase) 2nd
scoring
     exams 2nd
sealing
    messages
         security strategies
secondary actors
securing
     class libraries
    system access
         security strategies
security
     role-based security
     WS-Security
security (logical design)
security (logical design)
security (logical design)
     authentication
         Forms authentication
         Passport authentication
         signing code
         Windows authentication
     authorization 2nd
         forms applications
         resource-based authorization
         Web applications
     encryption
         database connection strings
         SSL 2nd
security (PASS MADE)
     logical design validation 2nd
     physical design validation 2nd
security measures
     monitoring
security policies
    authentication
         business services authenticaiton 2nd
         data access authenticaiton
         GUI 2nd
         user services authenticaiton
    authorization
         business services authorization
         code access security
         data access authorization 2nd
         role-based security
         user services authorization
     developing 2nd
     encryption policies
     logon policies
     passwords
    secure communication
         cryptography
         data encryption
         SSL
security requirements (PASS MADE) 2nd
     acceptable risk
     auditing
     authentication
     authorization
     data protection
     encryption policies
     intruder prevention processes
     logon policies
     passwords
    security measures
         monitoring
     user accounts
security strategies
     ASP.NET
     data encryption 2nd
         IPSec
         RPC
         SSL
         SSL/TLS
     data privacy strategies
    messages
         sealing
     signing 2nd
    system access
         securing
     system support 2nd
    testing strategies
         functional tests
         regression testing
         usage testing
selecting
     architectural models
         layers
         legacy integration 2nd
         tiers 2nd
         Web applications versus Windows applications 2nd
         XML Web services
     Visual Studio .NET deployment projects
sequence diagrams (UML)
serialized objects
server-side state management 2nd 3rd 4th 5th 6th
     Application state 2nd
     Cache state
     cookies 2nd
     Session state
servers
    Web servers
         deployment strategies 2nd
service accounts
     data access authentication (security policies)
     data access authorization (security policies) 2nd
service agents 2nd
service architectures (logical design) 2nd
     BizTalk Server
     callbacks
     Windows services
service interfaces
serviced components
Session objects
session state
Session state
     server-side state management
session state
     sticky sessions 2nd
set-comparison constraints
Setsko, Inc. (case studies)
     background
     current systems 2nd
     envisioned systems 2nd
     problem statements
Setup Projects (Visual Studio .NET deployment projects) 2nd
Show Answer option (PrepLogic Practice Exams, Preview Edition)
showing
     answers (exams)
ShowSounds property
side-by-side versioning (GAC) 2nd
signing
     security strategies 2nd
signing code
simpleType (XML)
simulations
     exam simulations
         PrepLogic Practice Exams, Preview Edition exam simulation interface
single call objects (.NET Remoting)
Singleton objects (.NET Remoting)
slang expressions
     globalized applications
snowflake schemas
software
     PrepLogic Practice Exams, Preview Edition
         Enable Item Review button
         Enable show Answer button
         exam simulation interface
         exam simulations
         Examination Score Report window 2nd
         Exhibit button
         Flash Review mode 2nd
         Grade Exam option
         installing 2nd
         Item Review button
         Mark Item option
         Next Item option
         Practice Test mode 2nd 3rd
         Previous Item option
         questions
         Randomize Choices option
         removing
         Show Answer option
         software requirements
         viewing time remaining
         Your Score Report window
     QA tests
software requirements (operation requirements) 2nd 3rd
solutions, proposing (Envisioning Phase) 2nd
     analogy 2nd
     feasibility 2nd
         business perspective
         resource perspective 2nd 3rd
         technical perspective 2nd
     metaphors 2nd
     reference architectures
     risk management 2nd
         risk analysis 2nd
         risk controll 2nd
         risk identification
         risk mitigation 2nd
         risk statements
         risk tracking
         Top 10 risk lists
    scope
         versus vision 2nd
     vision
         versus scope 2nd
sorting
    data
         localized applications
source code management processes 2nd
spawning
    new threads in .NET Framework
         asynchronous processing
SQL Server
     Index Tuning Wizard
SQL Server 2000
    data migration
         BCP 2nd
         DTS 2nd
SSL (Secure Socket Layer)
SSL (Secure Sockets Layer) 2nd
     security strategies
SSL/TLS (Secure Sockets Layer/Transport Layer Security)
     security strategies
standalone users
standards
    case studies
         analyzing 2nd
     code review standards
         FxCop
         issue logs
     coding standards 2nd
         abbreviations
         arrays
         asynchronous programming 2nd
         Callback .NET pattern
         camel cases 2nd
         casting types
         class library security 2nd
         collections
         COM
         constructors
         defensive programming
         dimensioning variables 2nd
         Equality Operator
         equals
         Equals .NET pattern
         event handlers
         exception handling
         Finalize and Dispose .NET pattern
         implicit casts
         instantiating variables
         naming classes
         naming methods 2nd
         naming properties 2nd
         operator overloading
         Pascal cases 2nd
         thread design 2nd
         Timeout .NET pattern
         types
     defining 2nd
     documentation standards 2nd
     testing standards
     UI standards
         inheritance
         User Interface standards document
star schemas
starting
     exam reviews
     Practice Test mode (PrepLogic Practice Exams, Preview Edition) 2nd
state
     application state
    Application state
         server-side state management 2nd
    Cache state (ASP.NET)
         server-side state management
     configuring
     managing 2nd 3rd 4th
         Application objects 2nd
         Cache objects
         client-side state management 2nd
         server-side state management 2nd
         Session objects
         Web applications 2nd 3rd 4th
         Windows applications
     session state
         database sessions
    Session state
         server-side state management
    session state
         sticky sessions
state management
     client-side state management 2nd 3rd
         cookies 2nd
         hidden fields 2nd
         query strings
         ViewState 2nd
     data validation 2nd 3rd
         code checking
         complex validation
         data type validation
         range checking
     development strategies
         client-side state management 2nd 3rd
         data validation 2nd 3rd
         server-side state management 2nd 3rd 4th
     server-side state management 2nd 3rd 4th
         Application state 2nd
         Cache state
         cookies 2nd
         Session state
statechart diagrams (UML)
sticky sessions
storing
    data
         cookies 2nd 3rd 4th
         development strategies 2nd 3rd 4th
     system activity information (development strategies)
         Application event log
strategic business unit organizational structures
strategies
     coexistence deployment strategies
    data privacy strategies
         security strategies
     deployment strategies 2nd 3rd
         automated application deployment
         coexistence deployment strategies
         data integration
         data migration
         distributable media
         licensing 2nd 3rd 4th
         merge modules
         Visual Studio .NET
         Web servers 2nd
         Windows Installer
     development strategies 2nd
         auditing system activity 2nd 3rd
         data storage 2nd 3rd 4th
         deployment strategies 2nd 3rd 4th 5th 6th 7th
         error handling 2nd 3rd 4th 5th 6th 7th 8th 9th
         globalization 2nd
         localizability
         localization 2nd 3rd 4th
         logging system activity 2nd 3rd
         logic handling
         monitoring system activity 2nd 3rd
         state management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         storing system activity information 2nd
         system integration
     operations strategies
         data archiving
         data purging 2nd
         upgrades
     security strategies
         ASP.NET
         assigning permissions
         data encryption 2nd
         data privacy strategies
         sealing messages
         securing system access
         signing 2nd
         system support 2nd
         testing strategies
strategies (exams)
strings
    database connection strings
         encryption
    query strings
         client-side state management
struct types
     coding standards
structured exception handling
     try/catch structures 2nd
structured exceptions
     handling 2nd
subtype constraints 2nd
successful projects, defining 2nd
support
    system support
         security strategies 2nd
surrogate keys 2nd
surrogate keys (logical data models)
symbols
    currency symbols
         localized applications
synchronous processing
     versus asynchronous processing 2nd 3rd 4th
syntax errors
     development strategies
system block diagrams
system features
     identifying 2nd
system integration
     development strategies
system malfunctions
     development strategies
system specifications
     developing 2nd 3rd
         development strategies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd
         operations strategies 2nd 3rd 4th 5th
         security strategies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
system support
     security strategies 2nd
System.Globalization namespaces (.NET Framework)
     world-ready applications
System.IO.FileSystemWatcher class
System.Resources namespace
     ResourceManager class
     ResourceReader class
     ResourceSet class
     ResourceWriter class
System.Resources namespaces (.NET Framework)
     world-ready applications
systems
    access, securing
         security strategies
     activity information, storing (development strategies)
         Application event log
     activity, auditing (development strategies) 2nd 3rd
     activity, logging (development strategies) 2nd 3rd
     activity, monitoring (development strategies) 2nd 3rd
    upgrades
         operations strategies



Analyzing Requirements and Defining. Net Solution Architectures (Exam 70-300)
MCSD Self-Paced Training Kit: Analyzing Requirements and Defining Microsoft .NET Solution Architectures, Exam 70-300: Analyzing Requirements and ... Exam 70-300 (Pro-Certification)
ISBN: 0735618941
EAN: 2147483647
Year: 2006
Pages: 175

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net