• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/8

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

8 Cards in this Set

  • Front
  • Back
ACL
(Access Control List)

Term commonly used to refer to a discretionary access control list which is an authorization restriction mechanism that identifies the users and groups that are assigned or denied access permissions on an object
AES
(Advanced Encryption Standard)

A synonym for Rijndael, which is a symmetric encryption algorithm that uses key sizes of 128 through 256 bits.
Application Domain
A logical container that allows multiple assemblies to run within a single process, while preventing them from directly accessing another assembly's memory.
Assembly Evidence
Evidence that an assembly presents that describes the assembly's identity, such as the hash, publisher or the strong name.
Asymmetric Encryption
A cryptography technique that uses separate private and public keys to encrypt and decrypt data. Also known as public-key encryption.
Asynchronous Programming Model
A pattern of working with specific types of .NET classes that use Begin/End method pairs to provide asynchronous execution of certain methods.
BinaryFormatter
Located in System.Runtime.Serialization.Formatters.Binary namespace, this formatter is the most effecient way to serialize objects that will be read only by .NET Framework based applications.
Boxing
Converting from a value type to a reference type which often occurs implicitly. Should be avoided where possible as it adds overhead to the processing.