C# tutorials, programming examples and algorithms
MD5 Explained in C#: Hashing Algorithm, Password Security and File Integrity
SHA-256 Explained in C#: Secure Hashing, Password Protection, File Integrity and Cryptographic Security
SHA-512 Explained in C#: Secure Hashing, Cryptographic Security, File Verification and Enterprise Use Cases
Maven
Metaprogramming
Reflection
Simple Object Access Protocol (SOAP)
Microsoft Message Queuing (MSMQ)
Element Management System (EMS)
Windows Communication Foundation (WCF)
Extensible Markup Language (XML)
Extensible Stylesheet Language (XSL)
Integrated Development Environment (IDE)
JIT (Just-In-Time Compiler) Explained in .NET: Compilation Process, Optimizations and Tiered Compilation
Garbage Collector (GC) Explained in .NET: Memory Management, Generations and Performance Optimization
CLR (Common Language Runtime) Explained in .NET
.NET Cluster Explained for Developers: Architecture, Load Balancing and High Availability
Representational state transfer (REST) API
Asynchronous JavaScript and XML (AJAX)
CXF
Axis
FIX Antenna
User Datagram Protocol (UDP)
Transport Layer Security (TLS), Secure Sockets Layer (SSL)