70-486.reference

Concepts

ARIA

Accessible Rich Internet Applications (ARIA) is a set of attributes that define ways to make web content and web applications (especially those developed with JavaScript) more accessible to people with disabilities.

RDF

Resource Description Framework (RDF) is a standard model for data interchange on the Web. RDF has features that facilitate data merging even if the underlying schemas differ, and it specifically supports the evolution of schemas over time without requiring all the data consumers to be changed.

Semantic markup

Semantic markup is the use of a markup language such as HTML to convey information about the meaning of each element in a document through proper selection of markup elements, and to maintain complete separation between the markup and the visual presentation of the elements contained in the document.
There are two different practices that must be put into place if we are going to write semantic markup.

  1. Semantic markup requires that HTML elements be used according to their intended purpose.
  2. Semantic markup requires the separation of content and presentation.

For example, lots of divs that looked like this: <div id="nav">, <div id="header">, and <div id="footer">. Findings like these helped the W3C identify and target new semantic tags to include in HTML5 such as: nav, header, footer, article, and aside. We can group the most common and important semantic elements into four categories:

  • Document structure tags
  • Textual meaning tags
  • Media type tags
  • Correlation tags

REF: HTML5 Part 1: Semantic Markup and Page Layout

XForms

XForms is an XML format used for collecting inputs from web forms. XForms was designed to be the next generation of HTML / XHTML forms, but is generic enough that it can also be used in a standalone manner or with presentation languages other than XHTML to describe a user interface and a set of common data manipulation tasks.

Web Farm 和 Web Garden 的区别?

Overview: Build a Web Farm with IIS Servers

Web farms in .NET and IIS (part1 of 5)

Shim types

Shim types are one of two technologies that the Microsoft Fakes Framework uses to let you easily isolate components under test from the environment. Shims divert calls to specific methods to code that you write as part of your test. Many methods return different results dependent on external conditions, but a shim is under the control of your test and can return consistent results at every call. This makes your tests much easier to write.

Stub types

Stub types are one of two technologies that the Microsoft Fakes framework provides to let you easily isolate a component you are testing from other components that it calls. A stub is a small piece of code that takes the place of another component during testing. The benefit of using a stub is that it returns consistent results, making the test easier to write. And you can run tests even if the other components are not working yet.

用 Microsoft Fakes 隔离测试代码

Fakes come in two flavors:

  • A stub replaces a class with a small substitute that implements the same interface. To use stubs, you have to design your application so that each component depends only on interfaces, and not on other components. (By "component" we mean a class or group of classes that are designed and updated together and typically contained in an assembly.)
  • A shim modifies the compiled code of your application at run time so that instead of making a specified method call, it runs the shim code that your test provides. Shims can be used to replace calls to assemblies that you cannot modify, such as .NET assemblies.

Stub and Shim in Visual Studio 2012 Unit Test

Safe storage of app secrets in development in ASP.NET Core

Environment variables

Environment variables are used to avoid storage of app secrets in code or in local configuration files. Environment variables override configuration values for all previously specified configuration sources.

Secret Manager

The Secret Manager tool stores sensitive data during the development of an ASP.NET Core project. In this context, a piece of sensitive data is an app secret. App secrets are stored in a separate location from the project tree. The app secrets are associated with a specific project or shared across several projects. The app secrets aren't checked into source control.

The Secret Manager tool doesn't encrypt the stored secrets and shouldn't be treated as a trusted store. It's for development purposes only.

Azure Key Vault configuration provider in ASP.NET Core

Azure Key Vault is a cloud-based service that helps you safeguard cryptographic keys and secrets used by apps and services.

App startup in ASP.NET Core

WebHostBuilderExtensions.UseStartup Method

WebHost Class

What is Azure Relay?

The Azure Relay service enables you to securely expose services that run in your corporate network to the public cloud. You can do so without opening a port on your firewall, or making intrusive changes to your corporate network infrastructure.

Azure Cloud Services Definition WebRole Schema

The Azure web role is a role that is customized for web application programming as supported by IIS 7, such as ASP.NET, PHP, Windows Communication Foundation, and FastCGI.

How to use Azure Relay WCF relays with .NET

ASP.NET Core Middleware

Middleware is software that's assembled into an app pipeline to handle requests and responses. Each component:

  • Chooses whether to pass the request to the next component in the pipeline.
  • Can perform work before and after the next component in the pipeline.

Creating Custom Middleware In ASP.Net Core

How to: Receive First-Chance Exception Notifications

The FirstChanceException event of the AppDomain class lets you receive a notification that an exception has been thrown, before the common language runtime has begun searching for exception handlers.

The event is raised at the application domain level. A thread of execution can pass through multiple application domains, so an exception that is unhandled in one application domain could be handled in another application domain. The notification occurs in each application domain that has added a handler for the event, until an application domain handles the exception.

Remote Debug ASP.NET on a Remote IIS Computer

Azure Acs plus asp.net MVC memberships

Windows Identity Foundation 4.5 Overview

Windows Identity Foundation 4.5 is a set of .NET Framework classes for implementing claims-based identity in your applications. By using it, you’ll more easily reap the benefits of claims-aware applications and services. WIF 4.5 can be used in any Web application or Web service that uses the .NET Framework version 4.5 or later. WIF is just one part of Microsoft’s Federated Identity software family that implements the shared industry vision based on open standards.

Peer to Peer ASP.NET State Server

Session and app state in ASP.NET Core

Using Startup Task in Windows Azure detailed summary

Tutorial: Real-time chat with SignalR 2 and MVC 5

ASP.NET SignalR Hubs API Guide - JavaScript Client

var connection = $.hubConnection();
var contosoChatHubProxy = connection.createHubProxy('contosoChatHub');
contosoChatHubProxy.on('addContosoChatMessageToPage', function(userName, message) {
    console.log(userName + ' ' + message);
});
connection.start()
    .done(function(){ console.log('Now connected, connection ID=' + connection.id); })
    .fail(function(){ console.log('Could not connect'); });

ASP.NET MVC Preview 5 and Form Posting Scenarios

Use UI automation to test your code

Coded UI Test for automated UI-driven functional testing is deprecated. We recommend using Selenium for testing web apps and Appium with WinAppDriver for testing desktop and UWP apps.

The OAuth 2.0 Authorization Framework

快速入门:将 Azure Redis 缓存与 .NET Core 应用配合使用

What is Azure Cache for Redis

.NET 4.0 中的契约式编程

Cross-Site Request Forgery (CSRF)

Preventing Cross-Site Request Forgery (CSRF) Attacks in ASP.NET MVC Application

The Right Way to Handle Azure OnStop Events

Customize the Lifecycle of a Web or Worker role in .NET

If an exception occurs within one of the lifecycle methods, Azure will raise the UnhandledException event, and then the process is terminated. After your role has been taken offline, it will be restarted by Azure. When an unhandled exception occurs, the Stopping event is not raised, and the OnStop method is not called.

Understanding Action Filters (C#)

Configure IntelliTrace to collect debugging information

Best Practices for Error Handling in ASP.NET MVC

List of HTTP status codes

Understanding ViewData, ViewBag and TempData

Understanding Routing Precedence in ASP.NET MVC and Web API

Setting up Windows Azure Active Directory ACS to provide identities to Windows Azure Pack

Using the IIS Search Engine Optimization Toolkit

Techniques for Mobile-friendly ASP.NET MVC 4.0 web sites

What is a Meta Title, and what is its role in SEO?

What is the meaning of “vnd” in MIME types?

vnd indicates vendor-specific MIME types, which means they are MIME types that were introduced by corporate bodies rather than e.g. an Internet consortium.

Export Data In Excel File With ASP.NET MVC

Custom Model Binding in ASP.NET Core

Understanding and Extending Controller Factory in MVC

Custom Controller Factory in ASP.NET MVC

Windows Azure Remote Desktop

Regular Expression Language - Quick Reference

Extending Identity Accounts and Implementing Role-Based Authentication in ASP.NET MVC 5

Role-based authorization in ASP.NET Core

An Overview of Project Katana

How to: Access Claims in an ASP.NET Page

Using Application Domains

Using Browser Link in Visual Studio 2013

HTTP Handlers and HTTP Modules Overview

Bundling and Minification

Parameterized Query and SQL Injection Attacks

How and Why to Use Parameterized Queries

CSS Sprites: What They Are, Why They’re Cool, and How To Use Them

Content-Encoding

Quality values

Enabling Azure Diagnostics in Azure Cloud Services

Introduction to Azure Blob storage

Media Queries

Implement jQuery UI slider with ASP.NET

ASP.NET MVC Client Side Validation

Trusted Subsystem

Html submission by ValidateInput and AllowHtml attribute in MVC4

Authorize developer accounts by using Azure Active Directory in Azure API Management

Policies in Azure API Management

How to capture an ASP.NET Core memory dump on Azure App Service

How to Use Web.Config customErrors for ASP.NET

Session-State Session-State Modes

Routing in MVC

Consuming an ASP.NET Web Service (ASMX)

What exactly is the Windows AppFabric?


Tools

Aspnet_regiis.exe

When multiple versions of the .NET Framework are executing side-by-side on a single computer, the ASP.NET ISAPI version mapped to an ASP.NET application determines which version of the common language runtime (CLR) is used for the application. The ASP.NET IIS Registration Tool (Aspnet_regiis.exe) allows an administrator or installation program to easily update the script maps for an ASP.NET application to point to the ASP.NET ISAPI version that is associated with the tool. The tool can also be used to display the status of all installed versions of ASP. NET, register the ASP.NET version that is coupled with the tool, create client-script directories, and perform other configuration operations.

Ngen.exe

本机映像生成器 (Ngen.exe) 是一种提高托管应用程序性能的工具。 Ngen.exe 创建本机映像(包含经编译的特定于处理器的机器代码的文件),并将它们安装到本地计算机上的本机映像缓存中。 运行时可从缓存中使用本机映像,而不必使用实时 (JIT) 编译器编译原始程序集。

Aspnet_merge.exe

The ASP.NET Merge tool (Aspnet_merge.exe) enables you to combine and manage assemblies that are created by the ASP.NET Compilation (Aspnet_compiler.exe) tool.

EdmGen.exe

EdmGen.exe 是用于处理Entity Framework模型和映射文件的命令行工具。

Resgen.exe

The Resource File Generator (Resgen.exe) converts text (.txt or .restext) files and XML-based resource format (.resx) files to common language runtime binary (.resources) files that can be embedded in a runtime binary executable or satellite assembly.

Mage.exe (Manifest Generation and Editing Tool)

The Manifest Generation and Editing Tool (Mage.exe) is a command-line tool that supports the creation and editing of application and deployment manifests.

NT LAN Manager NTLM

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN Manager (LANMAN), an older Microsoft product. The NTLM protocol suite is implemented in a Security Support Provider, which combines the LAN Manager authentication protocol, NTLMv1, NTLMv2 and NTLM2 Session protocols in a single package.

Application Insights for Azure cloud services

Application Insights can monitor Azure cloud service apps for availability, performance, failures, and usage by combining data from Application Insights SDKs with Azure Diagnostics data from your cloud services. With the feedback you get about the performance and effectiveness of your app in the wild, you can make informed choices about the direction of the design in each development lifecycle.

What is role-based access control (RBAC)?

Access management for cloud resources is a critical function for any organization that is using the cloud. Role-based access control (RBAC) helps you manage who has access to Azure resources, what they can do with those resources, and what areas they have access to.

RBAC is an authorization system built on Azure Resource Manager that provides fine-grained access management of resources in Azure.

Service Control Manager

The service control manager (SCM) is started at system boot. It is a remote procedure call (RPC) server, so that service configuration and service control programs can manipulate services on remote machines.

ClosedXML

ClosedXML is a .NET library for reading, manipulating and writing Excel 2007+ (.xlsx, .xlsm) files. It aims to provide an intuitive and user-friendly interface to dealing with the underlying OpenXML API.


Class & Method & Property

ValidateInputAttribute Class

Represents an attribute that is used to mark action methods whose input must be validated.

HttpRequest.Unvalidated Property

Gets the HTTP request values without triggering request validation.

Request validation checks for HTML markup and script that might indicate a potential cross-site scripting attack. By default, all values are checked using request validation and if any values contain markup or script, ASP.NET throws an HttpRequestValidationException exception. Use this method if you anticipate that the request will contain markup (for example, you are allowing users to post content that contains markup) and you want to get the raw value of a request.

ResourceManager Class

表示资源管理器,其可在运行时提供对于特定文化资源的便利访问。

ConfigurationBuilder Class

Used to build key/value based configuration settings for use in an application.

WebPermission Class

控制访问 HTTP Internet 资源的权限。

SocketPermission Class

控制在传输地址上建立或接受连接的权利。

WebRequest Class

对统一资源标识符 (URI) 发出请求。 这是一个 abstract 类。

WebResponse Class

提供来自统一资源标识符 (URI) 的响应。 这是一个 abstract 类。

SqlMembershipProvider Class

Manages storage of membership information for an ASP.NET application in a SQL Server database.

How to: Use the ASP.NET Membership Provider

RazorPage.RenderSection Method

LinkExtensions.ActionLink Method

ValidateAntiForgeryTokenAttribute Class

ValidateAntiForgeryToken purpose, explanation and example

You need to decorate method with ValidateAntiForgeryToken attribute as below:

[HttpPost]  
[ValidateAntiForgeryToken]  
public ActionResult CreateProduct(Product product)  
{
  if (ModelState.IsValid)  
  {
    //your logic 
  }
  return View(ModelName);
}

And in your view, add this code to add the token so it is used to validate the form upon submission: @Html.AntiForgeryToken()

WebEventCodes Class

OWIN Startup Class Detection

CSS Media Queries

CrashDumps.EnableCollection Method (Boolean)

DataAdapter Class

Represents a set of SQL commands and a database connection that are used to fill the DataSet and update the data source. The DataAdapter serves as a bridge between a DataSet and a data source for retrieving and saving data. The DataAdapter provides this bridge by mapping Fill, which changes the data in the DataSet to match the data in the data source, and Update, which changes the data in the data source to match the data in the DataSet.

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 158,117评论 4 360
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 66,963评论 1 290
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 107,897评论 0 240
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 43,805评论 0 203
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 52,208评论 3 286
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 40,535评论 1 216
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 31,797评论 2 311
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 30,493评论 0 197
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 34,215评论 1 241
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 30,477评论 2 244
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 31,988评论 1 258
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 28,325评论 2 252
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 32,971评论 3 235
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 26,055评论 0 8
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 26,807评论 0 194
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 35,544评论 2 271
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 35,455评论 2 266

推荐阅读更多精彩内容

  • rljs by sennchi Timeline of History Part One The Cognitiv...
    sennchi阅读 7,098评论 0 10
  • 咖啡冥想: 目標: 1. 2017年7月31日前,每月3萬收入,另額外1萬學費,種得輕鬆自在 咖啡冥想內容: 1....
    潔雯阅读 182评论 1 5
  • 贾芸是《红楼梦》里贾宝玉的远房侄子,是同门旁支,母亲是“后廊上的五嫂子”。他幼年丧父,守着寡母过活。贾芸家虽微寒,...
    陈千寻阅读 909评论 13 22
  • “人生如戏”,初识此词隐约记得是在少年时期,懵懂无知;“人生如戏,每天都是现场直播,且不用排练”,首见此句...
    青葱岁月淡如水阅读 443评论 0 0
  • 一 本周四,我与同事去拒签了一个政府机关客户,尽管客户的决策层已经研究决定与我们续签合同,给我们涨顾问费,增长幅度...
    海客曰阅读 620评论 0 3