1. Analysis of a regular expression

Illustration for .NET framework

2. You can use serialization events to run methods during different phases of the serialization and deserialization process

Illustration for .NET framework

3. Application domains keep assemblies separate within a single process

Illustration for .NET framework

4. Assemblies can host child application domains

Illustration for .NET framework

5. CAS complements, but does not replace, role-based security

Illustration for .NET framework

6. Demand checks all callers for a permission

Illustration for .NET framework

7. LinkDemand checks only the immediate caller

Illustration for .NET framework

8. Assert blocks demand checks, increasing performance and allowing underprivileged code to call methods with CAS permission requirements

Illustration for .NET framework

9. To access a resource, a user must be authenticated and then authorized

Illustration for .NET framework

10. Symmetric encryption uses the same key for both encryption and decryption

Illustration for .NET framework

11. Symmetric key encryption requires separately exchanging both the key and the encrypted document

Illustration for .NET framework

12. Asymmetric cryptography uses separate keys for encryption and decryption

Illustration for .NET framework

13. Combine asymmetric and symmetric algorithms to optimize both security and performance

Illustration for .NET framework

相关文章:

  • 2022-03-03
  • 2022-02-27
  • 2021-11-30
  • 2021-07-26
  • 2021-10-28
  • 2021-11-10
  • 2021-06-04
猜你喜欢
  • 2022-01-09
  • 2021-08-21
  • 2021-05-28
  • 2022-12-23
  • 2022-12-23
  • 2021-06-06
  • 2021-07-28
相关资源
相似解决方案