zoukankan      html  css  js  c++  java
  • Illustration for .NET framework

    1. Analysis of a regular expression

    clip_image001

    2. You can use serialization events to run methods during different phases of the serialization and deserialization process

    clip_image002

    3. Application domains keep assemblies separate within a single process

    clip_image003

    4. Assemblies can host child application domains

    clip_image004

    5. CAS complements, but does not replace, role-based security

    clip_image005

    6. Demand checks all callers for a permission

    clip_image006

    7. LinkDemand checks only the immediate caller

    clip_image007

    8. Assert blocks demand checks, increasing performance and allowing underprivileged code to call methods with CAS permission requirements

    clip_image008

    9. To access a resource, a user must be authenticated and then authorized

    clip_image009

    10. Symmetric encryption uses the same key for both encryption and decryption

    clip_image010

    11. Symmetric key encryption requires separately exchanging both the key and the encrypted document

    clip_image011

    12. Asymmetric cryptography uses separate keys for encryption and decryption

    clip_image012

    13. Combine asymmetric and symmetric algorithms to optimize both security and performance

    clip_image013

  • 相关阅读:
    创新工场 笔试1
    C++的异常处理
    阿里笔试题2
    阿里笔试题1
    控制CPU占用率曲线
    再探结构体字节对齐问题
    1401
    pancake sort的几个问题
    CF198 D2
    谨慎设计一个单例类
  • 原文地址:https://www.cnblogs.com/happlyonline/p/1606086.html
Copyright © 2011-2022 走看看