C# Programmer[ap]s Cookbook
Chapter 1: Application Development
- Table 1.1: Logical Operators Supported by the #if..#endi f Directive
- Table 1.2: Commonly Used Switches of the File Signing Tool
- Table 1.3: Commonly Used Switches of the Certificate Creation Tool
Chapter 2: Working with Data
- Table 2.1: Character Encoding Classes
- Table 2.2: Commonly Used Regular Expression Metacharacter Elements
- Table 2.3: Commonly Used Regular Expressions
- Table 2.4: Operators Supported by the DateTime and TimeSpan
Chapter 3: Application Domains, Reflection, and Metadata
- Table 3.1: Commonly Used AppDomainSetup Properties
- Table 3.2: Methods That Return Type Objects
- Table 3.3: Members of the AttributeUsage Enumeration
Chapter 4: Threads, Processes, and Synchronization
- Table 4.1: Controlling the Execution of a Thread
- Table 4.2: WaitHandl e Methods for Synchronizing Thread Execution
- Table 4.3: Properties of the ProcessStartInfo Class
- Table 4.4: Methods for Obtaining Process References
Chapter 5: XML Processing
- Table 5.1: XPath Expression Syntax
Chapter 7: ASP.NET and Web Forms
- Table 7.1: Types of State Management
- Table 7.2: Types of Authentication
Chapter 9: Files, Directories, and I/O
- Table 9.1: Members for Files and Directories
- Table 9.2: Methods for Manipulating a FileInfo Object
- Table 9.3: Methods for Manipulating a DirectoryInfo Object
Chapter 10: Database Access
- Table 10.1: .NET Framework Data Provider Implementations
- Table 10.2: Connection String Settings That Control Connection Pooling
- Table 10.3: Common Command Object Properties
- Table 10.4: Parameter Properties
- Table 10.5: Commonly Used Members of Data Reader Classes
Chapter 13: Runtime Security
- Table 13.1: Evidence Classes That Generate Identity Permissions
- Table 13.2: Classes and Their Methods That Allow You to Assign Evidence to an Assembly
- Table 13.3: Windows Built-In Account Names and Identifiers
- Table 13.4: Members of the PrincipalPolicy Enumeration
Chapter 14: Cryptography
- Table 14.1: Hashing Algorithm Implementations
- Table 14.2: Keyed Hashing Algorithm Implementations
- Table 14.3: Symmetric Algorithm Implementations
- Table 14.4: Operation of a CryptoStrea m Object
Chapter 16: Commonly Used Interfaces and Patterns
- Table 16.1: Members of the IEnumerator Interface
Chapter 17: Windows Integration
- Table 17.1: Commonly Used Members of the Environment Class
- Table 17.2: Determining the Current Operating System
- Table 17.3: Static Fields of the Registry Class
- Table 17.4: RegistryKey Methods to Create, Read, Update, and Delete Registry Keys and Values
- Table 17.5: Methods That Control the Operation of a Service
Категории