鸡毛信
征服世界,并不伟大,一个人能征服自己,才是世界上最伟大的人。

1. Analysis of a regular expression

clip_image001

2. You can use serialization events to run methods during different phases of the serialization and deserialization process

clip_image002

3. Application domains keep assemblies separate within a single process

clip_image003

4. Assemblies can host child application domains

clip_image004

5. CAS complements, but does not replace, role-based security

clip_image005

6. Demand checks all callers for a permission

clip_image006

7. LinkDemand checks only the immediate caller

clip_image007

8. Assert blocks demand checks, increasing performance and allowing underprivileged code to call methods with CAS permission requirements

clip_image008

9. To access a resource, a user must be authenticated and then authorized

clip_image009

10. Symmetric encryption uses the same key for both encryption and decryption

clip_image010

11. Symmetric key encryption requires separately exchanging both the key and the encrypted document

clip_image011

12. Asymmetric cryptography uses separate keys for encryption and decryption

clip_image012

13. Combine asymmetric and symmetric algorithms to optimize both security and performance

clip_image013

posted on 2009-11-19 14:55  鸡毛信  阅读(169)  评论(0编辑  收藏  举报