Book Image

C# 7.1 and .NET Core 2.0 ??? Modern Cross-Platform Development - Third Edition

By : Mark J. Price
Book Image

C# 7.1 and .NET Core 2.0 ??? Modern Cross-Platform Development - Third Edition

By: Mark J. Price

Overview of this book

C# 7.1 and .NET Core 2.0 – Modern Cross-Platform Development, Third Edition, is a practical guide to creating powerful cross-platform applications with C# 7.1 and .NET Core 2.0. It gives readers of any experience level a solid foundation in C# and .NET. The first part of the book runs you through the basics of C#, as well as debugging functions and object-oriented programming, before taking a quick tour through the latest features of C# 7.1 such as default literals, tuples, inferred tuple names, pattern matching, out variables, and more. After quickly taking you through C# and how .NET works, this book dives into the .NET Standard 2.0 class libraries, covering topics such as packaging and deploying your own libraries, and using common libraries for working with collections, performance, monitoring, serialization, files, databases, and encryption. The final section of the book demonstrates the major types of application that you can build and deploy cross-device and cross-platform. In this section, you'll learn about websites, web applications, web services, Universal Windows Platform (UWP) apps, and mobile apps. By the end of the book, you'll be armed with all the knowledge you need to build modern, cross-platform applications using C# and .NET.
Table of Contents (31 chapters)
Title Page
Credits
About the Author
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface
2
Part 1 – C# 7.1
8
Part 2 – .NET Core 2.0 and .NET Standard 2.0
16
Part 3 – App Models
22
Summary
Index

Understanding the vocabulary of protection


There are many techniques to protect your data; some of them are as follows:

  • Encryption and decryption: This is a two-way process to convert your data from clear-text into crypto-text and back again
  • Hashes: This is a one-way process to generate a hash value to securely store passwords or that can be used to detect malicious changes or corruption of your data
  • Signatures: This technique is used to ensure that data has come from someone you trust by validating a signature that has been applied to some data against someone's public key
  • Authentication: This technique is used to identify someone by checking their credentials
  • Authorization: This technique is used to ensure that someone has permission to perform an action or work with some data by checking the roles or groups they belong to

Note

Good PracticeIf security is important to you (and it should be!), then hire an experienced security expert for guidance rather than relying on advice found online. It...