MCSD Self-Paced Training Kit: Analyzing Requirements and Defining Microsoft .NET Solution Architectures, Exam 70-300: Analyzing Requirements and ... Exam 70-300 (Pro-Certification)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

scalability (PASS MADE)

     logical design validation

     physical design validation 2nd

scalability pyramid

scalability requirements (PASS MADE)

     scalability pyramid

     scaling out

     scaling up

scaling out

scaling up

scenarios

     usage scenarios 2nd

schemas

     database schemas

     snowflake schemas

     star schemas

     XML schemas 2nd

         complexType

         elements 2nd 3rd 4th 5th 6th 7th

         namespaces 2nd

         simpleType

         versus DTD

scope

     extranet applications

     internet applications

     intranet applications

     use cases

scope (Envisioning Phase) 2nd

scoring

     exams 2nd

sealing

    messages

         security strategies

secondary actors

securing

     class libraries

    system access

         security strategies

security

     role-based security

     WS-Security

security (logical design)

security (logical design)

security (logical design)

     authentication

         Forms authentication

         Passport authentication

         signing code

         Windows authentication

     authorization 2nd

         forms applications

         resource-based authorization

         Web applications

     encryption

         database connection strings

         SSL 2nd

security (PASS MADE)

     logical design validation 2nd

     physical design validation 2nd

security measures

     monitoring

security policies

    authentication

         business services authenticaiton 2nd

         data access authenticaiton

         GUI 2nd

         user services authenticaiton

    authorization

         business services authorization

         code access security

         data access authorization 2nd

         role-based security

         user services authorization

     developing 2nd

     encryption policies

     logon policies

     passwords

    secure communication

         cryptography

         data encryption

         SSL

security requirements (PASS MADE) 2nd

     acceptable risk

     auditing

     authentication

     authorization

     data protection

     encryption policies

     intruder prevention processes

     logon policies

     passwords

    security measures

         monitoring

     user accounts

security strategies

     ASP.NET

     data encryption 2nd

         IPSec

         RPC

         SSL

         SSL/TLS

     data privacy strategies

    messages

         sealing

     signing 2nd

    system access

         securing

     system support 2nd

    testing strategies

         functional tests

         regression testing

         usage testing

selecting

     architectural models

         layers

         legacy integration 2nd

         tiers 2nd

         Web applications versus Windows applications 2nd

         XML Web services

     Visual Studio .NET deployment projects

sequence diagrams (UML)

serialized objects

server-side state management 2nd 3rd 4th 5th 6th

     Application state 2nd

     Cache state

     cookies 2nd

     Session state

servers

    Web servers

         deployment strategies 2nd

service accounts

     data access authentication (security policies)

     data access authorization (security policies) 2nd

service agents 2nd

service architectures (logical design) 2nd

     BizTalk Server

     callbacks

     Windows services

service interfaces

serviced components

Session objects

session state

Session state

     server-side state management

session state

     sticky sessions 2nd

set-comparison constraints

Setsko, Inc. (case studies)

     background

     current systems 2nd

     envisioned systems 2nd

     problem statements

Setup Projects (Visual Studio .NET deployment projects) 2nd

Show Answer option (PrepLogic Practice Exams, Preview Edition)

showing

     answers (exams)

ShowSounds property

side-by-side versioning (GAC) 2nd

signing

     security strategies 2nd

signing code

simpleType (XML)

simulations

     exam simulations

         PrepLogic Practice Exams, Preview Edition exam simulation interface

single call objects (.NET Remoting)

Singleton objects (.NET Remoting)

slang expressions

     globalized applications

snowflake schemas

software

     PrepLogic Practice Exams, Preview Edition

         Enable Item Review button

         Enable show Answer button

         exam simulation interface

         exam simulations

         Examination Score Report window 2nd

         Exhibit button

         Flash Review mode 2nd

         Grade Exam option

         installing 2nd

         Item Review button

         Mark Item option

         Next Item option

         Practice Test mode 2nd 3rd

         Previous Item option

         questions

         Randomize Choices option

         removing

         Show Answer option

         software requirements

         viewing time remaining

         Your Score Report window

     QA tests

software requirements (operation requirements) 2nd 3rd

solutions, proposing (Envisioning Phase) 2nd

     analogy 2nd

     feasibility 2nd

         business perspective

         resource perspective 2nd 3rd

         technical perspective 2nd

     metaphors 2nd

     reference architectures

     risk management 2nd

         risk analysis 2nd

         risk controll 2nd

         risk identification

         risk mitigation 2nd

         risk statements

         risk tracking

         Top 10 risk lists

    scope

         versus vision 2nd

     vision

         versus scope 2nd

sorting

    data

         localized applications

source code management processes 2nd

spawning

    new threads in .NET Framework

         asynchronous processing

SQL Server

     Index Tuning Wizard

SQL Server 2000

    data migration

         BCP 2nd

         DTS 2nd

SSL (Secure Socket Layer)

SSL (Secure Sockets Layer) 2nd

     security strategies

SSL/TLS (Secure Sockets Layer/Transport Layer Security)

     security strategies

standalone users

standards

    case studies

         analyzing 2nd

     code review standards

         FxCop

         issue logs

     coding standards 2nd

         abbreviations

         arrays

         asynchronous programming 2nd

         Callback .NET pattern

         camel cases 2nd

         casting types

         class library security 2nd

         collections

         COM

         constructors

         defensive programming

         dimensioning variables 2nd

         Equality Operator

         equals

         Equals .NET pattern

         event handlers

         exception handling

         Finalize and Dispose .NET pattern

         implicit casts

         instantiating variables

         naming classes

         naming methods 2nd

         naming properties 2nd

         operator overloading

         Pascal cases 2nd

         thread design 2nd

         Timeout .NET pattern

         types

     defining 2nd

     documentation standards 2nd

     testing standards

     UI standards

         inheritance

         User Interface standards document

star schemas

starting

     exam reviews

     Practice Test mode (PrepLogic Practice Exams, Preview Edition) 2nd

state

     application state

    Application state

         server-side state management 2nd

    Cache state (ASP.NET)

         server-side state management

     configuring

     managing 2nd 3rd 4th

         Application objects 2nd

         Cache objects

         client-side state management 2nd

         server-side state management 2nd

         Session objects

         Web applications 2nd 3rd 4th

         Windows applications

     session state

         database sessions

    Session state

         server-side state management

    session state

         sticky sessions

state management

     client-side state management 2nd 3rd

         cookies 2nd

         hidden fields 2nd

         query strings

         ViewState 2nd

     data validation 2nd 3rd

         code checking

         complex validation

         data type validation

         range checking

     development strategies

         client-side state management 2nd 3rd

         data validation 2nd 3rd

         server-side state management 2nd 3rd 4th

     server-side state management 2nd 3rd 4th

         Application state 2nd

         Cache state

         cookies 2nd

         Session state

statechart diagrams (UML)

sticky sessions

storing

    data

         cookies 2nd 3rd 4th

         development strategies 2nd 3rd 4th

     system activity information (development strategies)

         Application event log

strategic business unit organizational structures

strategies

     coexistence deployment strategies

    data privacy strategies

         security strategies

     deployment strategies 2nd 3rd

         automated application deployment

         coexistence deployment strategies

         data integration

         data migration

         distributable media

         licensing 2nd 3rd 4th

         merge modules

         Visual Studio .NET

         Web servers 2nd

         Windows Installer

     development strategies 2nd

         auditing system activity 2nd 3rd

         data storage 2nd 3rd 4th

         deployment strategies 2nd 3rd 4th 5th 6th 7th

         error handling 2nd 3rd 4th 5th 6th 7th 8th 9th

         globalization 2nd

         localizability

         localization 2nd 3rd 4th

         logging system activity 2nd 3rd

         logic handling

         monitoring system activity 2nd 3rd

         state management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         storing system activity information 2nd

         system integration

     operations strategies

         data archiving

         data purging 2nd

         upgrades

     security strategies

         ASP.NET

         assigning permissions

         data encryption 2nd

         data privacy strategies

         sealing messages

         securing system access

         signing 2nd

         system support 2nd

         testing strategies

strategies (exams)

strings

    database connection strings

         encryption

    query strings

         client-side state management

struct types

     coding standards

structured exception handling

     try/catch structures 2nd

structured exceptions

     handling 2nd

subtype constraints 2nd

successful projects, defining 2nd

support

    system support

         security strategies 2nd

surrogate keys 2nd

surrogate keys (logical data models)

symbols

    currency symbols

         localized applications

synchronous processing

     versus asynchronous processing 2nd 3rd 4th

syntax errors

     development strategies

system block diagrams

system features

     identifying 2nd

system integration

     development strategies

system malfunctions

     development strategies

system specifications

     developing 2nd 3rd

         development strategies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd

         operations strategies 2nd 3rd 4th 5th

         security strategies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

system support

     security strategies 2nd

System.Globalization namespaces (.NET Framework)

     world-ready applications

System.IO.FileSystemWatcher class

System.Resources namespace

     ResourceManager class

     ResourceReader class

     ResourceSet class

     ResourceWriter class

System.Resources namespaces (.NET Framework)

     world-ready applications

systems

    access, securing

         security strategies

     activity information, storing (development strategies)

         Application event log

     activity, auditing (development strategies) 2nd 3rd

     activity, logging (development strategies) 2nd 3rd

     activity, monitoring (development strategies) 2nd 3rd

    upgrades

         operations strategies

Категории