David Checa´s Blog

Special Weapons And Tactics For Net Developers

Primary Menu

  • About Me
Search

Month: October 2018

Roslyn & You (Part II): APIs

Landing Roslyn From an operational point of view we can identify the…

Continue reading “Roslyn & You (Part II): APIs”…
Posted on: 27 Oct 2018 Written by: David Checa

Roslyn & You (Part I): Overview

Intro As a part of metaprogramming series we are going to provide…

Continue reading “Roslyn & You (Part I): Overview”…
Posted on: 27 Oct 2018 Written by: David Checa

Dynamic C# & DLR (Part V): Creating Custom Dynamic Types

Intro In this article I´ll try to show an easy way of…

Continue reading “Dynamic C# & DLR (Part V): Creating Custom Dynamic Types”…
Posted on: 27 Oct 2018 Written by: David Checa

Dynamic C# & DLR (Part IV): ExpandoObject Class

Intro In the following tow articles I´ll try to explain the advantages…

Continue reading “Dynamic C# & DLR (Part IV): ExpandoObject Class”…
Posted on: 27 Oct 2018 Written by: David Checa

Dynamic C# & DLR (Part III): More S4mpl3s

iNTRO Here we will see extra samples about dynamic C# capablities in…

Continue reading “Dynamic C# & DLR (Part III): More S4mpl3s”…
Posted on: 27 Oct 2018 Written by: David Checa

Dynamic C# & DLR (Part II): S4mpl3s

Intro Now we have introduced main dynamic features of C# and DLR…

Continue reading “Dynamic C# & DLR (Part II): S4mpl3s”…
Posted on: 27 Oct 2018 Written by: David Checa

Dynamic C# & DLR (Part I): Overview

Intro As part of metaprogramming existing techniques, we are going to review…

Continue reading “Dynamic C# & DLR (Part I): Overview”…
Posted on: 27 Oct 2018 Written by: David Checa

Footer sidebar

Tags

.NET ThreadPool Angular AppDomains Application Security Architecture Asynchronous Programming AWS Azure Broekn Authentication CLR CLR-Threading CodeDOM Command Injection DLR DSL Dynamic C# Garbage Collector GCP HTST LDAP Injection Metaprogramming Microfrontends Microservices mono.cecil OWASP TOP 10 OWASP Top Ten React Reflection Reflection Injection Roslyn Sensitive Data Exposure Session Hijacking Session Management SQL Injection SSL Strong Hashing Syntax Nodes Syntax Trees T4 TLS Trivial Node Uncategorised WCF Weak Encryption XPath Injection
© 2025 David Checa´s Blog | Using Auberge WordPress theme. | Back to top ↑