Book Image

C# 6 and .NET Core 1.0

Book Image

C# 6 and .NET Core 1.0

Overview of this book

With the release of .NET Core 1.0, you can now create applications for Mac OS X and Linux, as well as Windows, using the development tools you know and love. C# 6 and .NET Core 1.0 has been divided into three high-impact sections to help start putting these new features to work. First, we'll run you through the basics of C#, as well as object-orient programming, before taking a quick tour through the latest features of C# 6 such as string interpolation for easier variable value output, exception filtering, and how to perform static class imports. We'll also cover both the full-feature, mature .NET Framework and the new, cross-platform .NET Core. After quickly taking you through C# and how .NET works, we'll dive into the internals of the .NET class libraries, covering topics such as performance, monitoring, debugging, internationalization, serialization, and encryption. We'll look at Entity Framework Core 1.0 and how to develop Code-First entity data models, as well as how to use LINQ to query and manipulate that data. The final section will demonstrate the major types of applications that you can build and deploy cross-device and cross-platform. In this section, we'll cover Universal Windows Platform (UWP) apps, web applications, and web services. Lastly, we'll help you build a complete application that can be hosted on all of today's most popular platforms, including Linux and Docker. By the end of the book, you'll be armed with all the knowledge you need to build modern, cross-platform applications using C# and .NET Core.
Table of Contents (25 chapters)
C# 6 and .NET Core 1.0
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Understanding the vocabulary of protection


There are many techniques to protect your applications and data, some of them are as follows:

  • Encryption and decryption: This is a two-way process to convert cleartext into cryptotext and back again

  • Hashes: This is a one-way process to; generate a hash to securely store passwords, or a hash can be used to detect malicious changes and corruption of data

  • Signatures: This technique is used to ensure that data has come from someone you trust by validating a signature against someone's public key

  • Authentication: This technique is used to identify someone by checking their credentials

  • Authorization: This technique is used to ensure someone has permission to perform an action, or work with some data by checking the roles or groups they belong to

Tip

Best Practice

If security is important to you, then hire an experienced security expert for guidance rather than relying on advice found online. It is very easy to make small mistakes and leave your applications...