Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
8 Cards in this Set
- Front
- Back
ACL
|
(Access Control List)
Term commonly used to refer to a discretionary access control list which is an authorization restriction mechanism that identifies the users and groups that are assigned or denied access permissions on an object |
|
AES
|
(Advanced Encryption Standard)
A synonym for Rijndael, which is a symmetric encryption algorithm that uses key sizes of 128 through 256 bits. |
|
Application Domain
|
A logical container that allows multiple assemblies to run within a single process, while preventing them from directly accessing another assembly's memory.
|
|
Assembly Evidence
|
Evidence that an assembly presents that describes the assembly's identity, such as the hash, publisher or the strong name.
|
|
Asymmetric Encryption
|
A cryptography technique that uses separate private and public keys to encrypt and decrypt data. Also known as public-key encryption.
|
|
Asynchronous Programming Model
|
A pattern of working with specific types of .NET classes that use Begin/End method pairs to provide asynchronous execution of certain methods.
|
|
BinaryFormatter
|
Located in System.Runtime.Serialization.Formatters.Binary namespace, this formatter is the most effecient way to serialize objects that will be read only by .NET Framework based applications.
|
|
Boxing
|
Converting from a value type to a reference type which often occurs implicitly. Should be avoided where possible as it adds overhead to the processing.
|