70-486.reference

Concepts

ARIA

Accessible Rich Internet Applications (ARIA) is a set of attributes that define ways to make web content and web applications (especially those developed with JavaScript) more accessible to people with disabilities.

RDF

Resource Description Framework (RDF) is a standard model for data interchange on the Web. RDF has features that facilitate data merging even if the underlying schemas differ, and it specifically supports the evolution of schemas over time without requiring all the data consumers to be changed.

Semantic markup

Semantic markup is the use of a markup language such as HTML to convey information about the meaning of each element in a document through proper selection of markup elements, and to maintain complete separation between the markup and the visual presentation of the elements contained in the document.
There are two different practices that must be put into place if we are going to write semantic markup.

  1. Semantic markup requires that HTML elements be used according to their intended purpose.
  2. Semantic markup requires the separation of content and presentation.

For example, lots of divs that looked like this: <div id="nav">, <div id="header">, and <div id="footer">. Findings like these helped the W3C identify and target new semantic tags to include in HTML5 such as: nav, header, footer, article, and aside. We can group the most common and important semantic elements into four categories:

  • Document structure tags
  • Textual meaning tags
  • Media type tags
  • Correlation tags

REF: HTML5 Part 1: Semantic Markup and Page Layout

XForms

XForms is an XML format used for collecting inputs from web forms. XForms was designed to be the next generation of HTML / XHTML forms, but is generic enough that it can also be used in a standalone manner or with presentation languages other than XHTML to describe a user interface and a set of common data manipulation tasks.

Web Farm 和 Web Garden 的區(qū)別?

Overview: Build a Web Farm with IIS Servers

Web farms in .NET and IIS (part1 of 5)

Shim types

Shim types are one of two technologies that the Microsoft Fakes Framework uses to let you easily isolate components under test from the environment. Shims divert calls to specific methods to code that you write as part of your test. Many methods return different results dependent on external conditions, but a shim is under the control of your test and can return consistent results at every call. This makes your tests much easier to write.

Stub types

Stub types are one of two technologies that the Microsoft Fakes framework provides to let you easily isolate a component you are testing from other components that it calls. A stub is a small piece of code that takes the place of another component during testing. The benefit of using a stub is that it returns consistent results, making the test easier to write. And you can run tests even if the other components are not working yet.

用 Microsoft Fakes 隔離測試代碼

Fakes come in two flavors:

  • A stub replaces a class with a small substitute that implements the same interface. To use stubs, you have to design your application so that each component depends only on interfaces, and not on other components. (By "component" we mean a class or group of classes that are designed and updated together and typically contained in an assembly.)
  • A shim modifies the compiled code of your application at run time so that instead of making a specified method call, it runs the shim code that your test provides. Shims can be used to replace calls to assemblies that you cannot modify, such as .NET assemblies.

Stub and Shim in Visual Studio 2012 Unit Test

Safe storage of app secrets in development in ASP.NET Core

Environment variables

Environment variables are used to avoid storage of app secrets in code or in local configuration files. Environment variables override configuration values for all previously specified configuration sources.

Secret Manager

The Secret Manager tool stores sensitive data during the development of an ASP.NET Core project. In this context, a piece of sensitive data is an app secret. App secrets are stored in a separate location from the project tree. The app secrets are associated with a specific project or shared across several projects. The app secrets aren't checked into source control.

The Secret Manager tool doesn't encrypt the stored secrets and shouldn't be treated as a trusted store. It's for development purposes only.

Azure Key Vault configuration provider in ASP.NET Core

Azure Key Vault is a cloud-based service that helps you safeguard cryptographic keys and secrets used by apps and services.

App startup in ASP.NET Core

WebHostBuilderExtensions.UseStartup Method

WebHost Class

What is Azure Relay?

The Azure Relay service enables you to securely expose services that run in your corporate network to the public cloud. You can do so without opening a port on your firewall, or making intrusive changes to your corporate network infrastructure.

Azure Cloud Services Definition WebRole Schema

The Azure web role is a role that is customized for web application programming as supported by IIS 7, such as ASP.NET, PHP, Windows Communication Foundation, and FastCGI.

How to use Azure Relay WCF relays with .NET

ASP.NET Core Middleware

Middleware is software that's assembled into an app pipeline to handle requests and responses. Each component:

  • Chooses whether to pass the request to the next component in the pipeline.
  • Can perform work before and after the next component in the pipeline.

Creating Custom Middleware In ASP.Net Core

How to: Receive First-Chance Exception Notifications

The FirstChanceException event of the AppDomain class lets you receive a notification that an exception has been thrown, before the common language runtime has begun searching for exception handlers.

The event is raised at the application domain level. A thread of execution can pass through multiple application domains, so an exception that is unhandled in one application domain could be handled in another application domain. The notification occurs in each application domain that has added a handler for the event, until an application domain handles the exception.

Remote Debug ASP.NET on a Remote IIS Computer

Azure Acs plus asp.net MVC memberships

Windows Identity Foundation 4.5 Overview

Windows Identity Foundation 4.5 is a set of .NET Framework classes for implementing claims-based identity in your applications. By using it, you’ll more easily reap the benefits of claims-aware applications and services. WIF 4.5 can be used in any Web application or Web service that uses the .NET Framework version 4.5 or later. WIF is just one part of Microsoft’s Federated Identity software family that implements the shared industry vision based on open standards.

Peer to Peer ASP.NET State Server

Session and app state in ASP.NET Core

Using Startup Task in Windows Azure detailed summary

Tutorial: Real-time chat with SignalR 2 and MVC 5

ASP.NET SignalR Hubs API Guide - JavaScript Client

var connection = $.hubConnection();
var contosoChatHubProxy = connection.createHubProxy('contosoChatHub');
contosoChatHubProxy.on('addContosoChatMessageToPage', function(userName, message) {
    console.log(userName + ' ' + message);
});
connection.start()
    .done(function(){ console.log('Now connected, connection ID=' + connection.id); })
    .fail(function(){ console.log('Could not connect'); });

ASP.NET MVC Preview 5 and Form Posting Scenarios

Use UI automation to test your code

Coded UI Test for automated UI-driven functional testing is deprecated. We recommend using Selenium for testing web apps and Appium with WinAppDriver for testing desktop and UWP apps.

The OAuth 2.0 Authorization Framework

快速入門:將 Azure Redis 緩存與 .NET Core 應(yīng)用配合使用

What is Azure Cache for Redis

.NET 4.0 中的契約式編程

Cross-Site Request Forgery (CSRF)

Preventing Cross-Site Request Forgery (CSRF) Attacks in ASP.NET MVC Application

The Right Way to Handle Azure OnStop Events

Customize the Lifecycle of a Web or Worker role in .NET

If an exception occurs within one of the lifecycle methods, Azure will raise the UnhandledException event, and then the process is terminated. After your role has been taken offline, it will be restarted by Azure. When an unhandled exception occurs, the Stopping event is not raised, and the OnStop method is not called.

Understanding Action Filters (C#)

Configure IntelliTrace to collect debugging information

Best Practices for Error Handling in ASP.NET MVC

List of HTTP status codes

Understanding ViewData, ViewBag and TempData

Understanding Routing Precedence in ASP.NET MVC and Web API

Setting up Windows Azure Active Directory ACS to provide identities to Windows Azure Pack

Using the IIS Search Engine Optimization Toolkit

Techniques for Mobile-friendly ASP.NET MVC 4.0 web sites

What is a Meta Title, and what is its role in SEO?

What is the meaning of “vnd” in MIME types?

vnd indicates vendor-specific MIME types, which means they are MIME types that were introduced by corporate bodies rather than e.g. an Internet consortium.

Export Data In Excel File With ASP.NET MVC

Custom Model Binding in ASP.NET Core

Understanding and Extending Controller Factory in MVC

Custom Controller Factory in ASP.NET MVC

Windows Azure Remote Desktop

Regular Expression Language - Quick Reference

Extending Identity Accounts and Implementing Role-Based Authentication in ASP.NET MVC 5

Role-based authorization in ASP.NET Core

An Overview of Project Katana

How to: Access Claims in an ASP.NET Page

Using Application Domains

Using Browser Link in Visual Studio 2013

HTTP Handlers and HTTP Modules Overview

Bundling and Minification

Parameterized Query and SQL Injection Attacks

How and Why to Use Parameterized Queries

CSS Sprites: What They Are, Why They’re Cool, and How To Use Them

Content-Encoding

Quality values

Enabling Azure Diagnostics in Azure Cloud Services

Introduction to Azure Blob storage

Media Queries

Implement jQuery UI slider with ASP.NET

ASP.NET MVC Client Side Validation

Trusted Subsystem

Html submission by ValidateInput and AllowHtml attribute in MVC4

Authorize developer accounts by using Azure Active Directory in Azure API Management

Policies in Azure API Management

How to capture an ASP.NET Core memory dump on Azure App Service

How to Use Web.Config customErrors for ASP.NET

Session-State Session-State Modes

Routing in MVC

Consuming an ASP.NET Web Service (ASMX)

What exactly is the Windows AppFabric?


Tools

Aspnet_regiis.exe

When multiple versions of the .NET Framework are executing side-by-side on a single computer, the ASP.NET ISAPI version mapped to an ASP.NET application determines which version of the common language runtime (CLR) is used for the application. The ASP.NET IIS Registration Tool (Aspnet_regiis.exe) allows an administrator or installation program to easily update the script maps for an ASP.NET application to point to the ASP.NET ISAPI version that is associated with the tool. The tool can also be used to display the status of all installed versions of ASP. NET, register the ASP.NET version that is coupled with the tool, create client-script directories, and perform other configuration operations.

Ngen.exe

本機映像生成器 (Ngen.exe) 是一種提高托管應(yīng)用程序性能的工具晕翠。 Ngen.exe 創(chuàng)建本機映像(包含經(jīng)編譯的特定于處理器的機器代碼的文件)袜漩,并將它們安裝到本地計算機上的本機映像緩存中翻诉。 運行時可從緩存中使用本機映像介袜,而不必使用實時 (JIT) 編譯器編譯原始程序集敞曹。

Aspnet_merge.exe

The ASP.NET Merge tool (Aspnet_merge.exe) enables you to combine and manage assemblies that are created by the ASP.NET Compilation (Aspnet_compiler.exe) tool.

EdmGen.exe

EdmGen.exe 是用于處理Entity Framework模型和映射文件的命令行工具世吨。

Resgen.exe

The Resource File Generator (Resgen.exe) converts text (.txt or .restext) files and XML-based resource format (.resx) files to common language runtime binary (.resources) files that can be embedded in a runtime binary executable or satellite assembly.

Mage.exe (Manifest Generation and Editing Tool)

The Manifest Generation and Editing Tool (Mage.exe) is a command-line tool that supports the creation and editing of application and deployment manifests.

NT LAN Manager NTLM

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN Manager (LANMAN), an older Microsoft product. The NTLM protocol suite is implemented in a Security Support Provider, which combines the LAN Manager authentication protocol, NTLMv1, NTLMv2 and NTLM2 Session protocols in a single package.

Application Insights for Azure cloud services

Application Insights can monitor Azure cloud service apps for availability, performance, failures, and usage by combining data from Application Insights SDKs with Azure Diagnostics data from your cloud services. With the feedback you get about the performance and effectiveness of your app in the wild, you can make informed choices about the direction of the design in each development lifecycle.

What is role-based access control (RBAC)?

Access management for cloud resources is a critical function for any organization that is using the cloud. Role-based access control (RBAC) helps you manage who has access to Azure resources, what they can do with those resources, and what areas they have access to.

RBAC is an authorization system built on Azure Resource Manager that provides fine-grained access management of resources in Azure.

Service Control Manager

The service control manager (SCM) is started at system boot. It is a remote procedure call (RPC) server, so that service configuration and service control programs can manipulate services on remote machines.

ClosedXML

ClosedXML is a .NET library for reading, manipulating and writing Excel 2007+ (.xlsx, .xlsm) files. It aims to provide an intuitive and user-friendly interface to dealing with the underlying OpenXML API.


Class & Method & Property

ValidateInputAttribute Class

Represents an attribute that is used to mark action methods whose input must be validated.

HttpRequest.Unvalidated Property

Gets the HTTP request values without triggering request validation.

Request validation checks for HTML markup and script that might indicate a potential cross-site scripting attack. By default, all values are checked using request validation and if any values contain markup or script, ASP.NET throws an HttpRequestValidationException exception. Use this method if you anticipate that the request will contain markup (for example, you are allowing users to post content that contains markup) and you want to get the raw value of a request.

ResourceManager Class

表示資源管理器士鸥,其可在運行時提供對于特定文化資源的便利訪問。

ConfigurationBuilder Class

Used to build key/value based configuration settings for use in an application.

WebPermission Class

控制訪問 HTTP Internet 資源的權(quán)限豪治。

SocketPermission Class

控制在傳輸?shù)刂飞辖⒒蚪邮苓B接的權(quán)利洞拨。

WebRequest Class

對統(tǒng)一資源標識符 (URI) 發(fā)出請求。 這是一個 abstract 類负拟。

WebResponse Class

提供來自統(tǒng)一資源標識符 (URI) 的響應(yīng)扣甲。 這是一個 abstract 類。

SqlMembershipProvider Class

Manages storage of membership information for an ASP.NET application in a SQL Server database.

How to: Use the ASP.NET Membership Provider

RazorPage.RenderSection Method

LinkExtensions.ActionLink Method

ValidateAntiForgeryTokenAttribute Class

ValidateAntiForgeryToken purpose, explanation and example

You need to decorate method with ValidateAntiForgeryToken attribute as below:

[HttpPost]  
[ValidateAntiForgeryToken]  
public ActionResult CreateProduct(Product product)  
{
  if (ModelState.IsValid)  
  {
    //your logic 
  }
  return View(ModelName);
}

And in your view, add this code to add the token so it is used to validate the form upon submission: @Html.AntiForgeryToken()

WebEventCodes Class

OWIN Startup Class Detection

CSS Media Queries

CrashDumps.EnableCollection Method (Boolean)

DataAdapter Class

Represents a set of SQL commands and a database connection that are used to fill the DataSet and update the data source. The DataAdapter serves as a bridge between a DataSet and a data source for retrieving and saving data. The DataAdapter provides this bridge by mapping Fill, which changes the data in the DataSet to match the data in the data source, and Update, which changes the data in the data source to match the data in the DataSet.

?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請聯(lián)系作者
  • 序言:七十年代末齿椅,一起剝皮案震驚了整個濱河市琉挖,隨后出現(xiàn)的幾起案子,更是在濱河造成了極大的恐慌涣脚,老刑警劉巖示辈,帶你破解...
    沈念sama閱讀 216,324評論 6 498
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件,死亡現(xiàn)場離奇詭異遣蚀,居然都是意外死亡矾麻,警方通過查閱死者的電腦和手機,發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 92,356評論 3 392
  • 文/潘曉璐 我一進店門芭梯,熙熙樓的掌柜王于貴愁眉苦臉地迎上來险耀,“玉大人,你說我怎么就攤上這事玖喘∷ξ” “怎么了?”我有些...
    開封第一講書人閱讀 162,328評論 0 353
  • 文/不壞的土叔 我叫張陵累奈,是天一觀的道長贬派。 經(jīng)常有香客問我,道長澎媒,這世上最難降的妖魔是什么搞乏? 我笑而不...
    開封第一講書人閱讀 58,147評論 1 292
  • 正文 為了忘掉前任,我火速辦了婚禮戒努,結(jié)果婚禮上请敦,老公的妹妹穿的比我還像新娘。我一直安慰自己储玫,他們只是感情好侍筛,可當我...
    茶點故事閱讀 67,160評論 6 388
  • 文/花漫 我一把揭開白布。 她就那樣靜靜地躺著缘缚,像睡著了一般勾笆。 火紅的嫁衣襯著肌膚如雪。 梳的紋絲不亂的頭發(fā)上桥滨,一...
    開封第一講書人閱讀 51,115評論 1 296
  • 那天窝爪,我揣著相機與錄音弛车,去河邊找鬼。 笑死蒲每,一個胖子當著我的面吹牛纷跛,可吹牛的內(nèi)容都是我干的。 我是一名探鬼主播邀杏,決...
    沈念sama閱讀 40,025評論 3 417
  • 文/蒼蘭香墨 我猛地睜開眼贫奠,長吁一口氣:“原來是場噩夢啊……” “哼!你這毒婦竟也來了望蜡?” 一聲冷哼從身側(cè)響起唤崭,我...
    開封第一講書人閱讀 38,867評論 0 274
  • 序言:老撾萬榮一對情侶失蹤,失蹤者是張志新(化名)和其女友劉穎脖律,沒想到半個月后谢肾,有當?shù)厝嗽跇淞掷锇l(fā)現(xiàn)了一具尸體,經(jīng)...
    沈念sama閱讀 45,307評論 1 310
  • 正文 獨居荒郊野嶺守林人離奇死亡小泉,尸身上長有42處帶血的膿包…… 初始之章·張勛 以下內(nèi)容為張勛視角 年9月15日...
    茶點故事閱讀 37,528評論 2 332
  • 正文 我和宋清朗相戀三年芦疏,在試婚紗的時候發(fā)現(xiàn)自己被綠了。 大學(xué)時的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片微姊。...
    茶點故事閱讀 39,688評論 1 348
  • 序言:一個原本活蹦亂跳的男人離奇死亡酸茴,死狀恐怖,靈堂內(nèi)的尸體忽然破棺而出兢交,到底是詐尸還是另有隱情薪捍,我是刑警寧澤,帶...
    沈念sama閱讀 35,409評論 5 343
  • 正文 年R本政府宣布魁淳,位于F島的核電站飘诗,受9級特大地震影響与倡,放射性物質(zhì)發(fā)生泄漏界逛。R本人自食惡果不足惜,卻給世界環(huán)境...
    茶點故事閱讀 41,001評論 3 325
  • 文/蒙蒙 一纺座、第九天 我趴在偏房一處隱蔽的房頂上張望息拜。 院中可真熱鬧,春花似錦净响、人聲如沸少欺。這莊子的主人今日做“春日...
    開封第一講書人閱讀 31,657評論 0 22
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽赞别。三九已至,卻和暖如春配乓,著一層夾襖步出監(jiān)牢的瞬間仿滔,已是汗流浹背惠毁。 一陣腳步聲響...
    開封第一講書人閱讀 32,811評論 1 268
  • 我被黑心中介騙來泰國打工, 沒想到剛下飛機就差點兒被人妖公主榨干…… 1. 我叫王不留崎页,地道東北人鞠绰。 一個月前我還...
    沈念sama閱讀 47,685評論 2 368
  • 正文 我出身青樓,卻偏偏與公主長得像飒焦,于是被迫代替她去往敵國和親蜈膨。 傳聞我的和親對象是個殘疾皇子,可洞房花燭夜當晚...
    茶點故事閱讀 44,573評論 2 353

推薦閱讀更多精彩內(nèi)容

  • rljs by sennchi Timeline of History Part One The Cognitiv...
    sennchi閱讀 7,322評論 0 10
  • 咖啡冥想: 目標: 1. 2017年7月31日前牺荠,每月3萬收入翁巍,另額外1萬學(xué)費,種得輕鬆自在 咖啡冥想內(nèi)容: 1....
    潔雯閱讀 185評論 1 5
  • 賈蕓是《紅樓夢》里賈寶玉的遠房侄子休雌,是同門旁支曙咽,母親是“后廊上的五嫂子”。他幼年喪父挑辆,守著寡母過活例朱。賈蕓家雖微寒,...
    陳千尋閱讀 980評論 13 22
  • “人生如戲”鱼蝉,初識此詞隱約記得是在少年時期洒嗤,懵懂無知;“人生如戲魁亦,每天都是現(xiàn)場直播渔隶,且不用排練”,首見此句...
    青蔥歲月淡如水閱讀 461評論 0 0
  • 一 本周四呈野,我與同事去拒簽了一個政府機關(guān)客戶,盡管客戶的決策層已經(jīng)研究決定與我們續(xù)簽合同印叁,給我們漲顧問費被冒,增長幅度...
    海客曰閱讀 640評論 0 3