|
This course provides information on how Visual Basic 2005 code interacts with the .NET code access features, how to create and modify code access security policies, and the differences between evidence-based and role-based security.
Objectives:
- Define the fundamentals of mobile code access issues
- Describe access code security issues
- Describe managed code issues
- Explain how "evidence" works in code security
- Describe how to design custom controls in Visual Basic 2005
- Describe how inheritance simplifies design in Visual Basic 2005
- Define how to create and work with delegates and events together
- Explain how an administrator can create a permission set
- Explain how to use a permission set to enforce a security policy
- Describe how to write code that can be safely run in multiple locations
- Describe how to write code that can interact with varying security policies
Topics:
- Custom forms
- Code permissions
- Enforcing security
- Writing mobile code
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|