求几道E文有关问题,分不够再加

求几道E文问题,分不够再加
这些怎么实现:
1.advanced   database   techniques   such   as   for   example   ACID   transactions,   prepared   statements,   stored   procedures,   together   with   caching   and   pooling   for   high   performance.  
2.security   such   as   for   example,   the   use   of   symmetric   and   asymmetric   encryption,   secure   hashing,   digital   certificates   and   signatures,   firewalls,   transport   and   application   level   security.  
3.back-end   web   services   to   provide   access   to   external,   third   party,   data   sources,   using   either   REST   or   SOAP-based   communication   mechanisms.  
4.dynamic   and   configurable   page   layout   and   user   interface   using   for   example   master   pages,   web   parts,   portlets,   skins   and   style   sheets.  
5.web   2.0   technologies   using   for   example   agents   together   with   collaborative   and   community-building   facilities.


------解决方案--------------------
数据库访问的例子,可以看Enterprice Library2.0。
web2.0建议你到www.asp.net
------解决方案--------------------
1.advanced数据库技术等酸性交易为例,编制报表,存放程序 加上缓存和高性能汇聚. 例如2.security例如使用对称和不对称加密、散列安全、数字证书及签名、防火墙、 运输安全和应用水平.
3.back端Web服务以通往外部、第三方数据源,无论用肥皂或休息的沟通机制.
4.dynamic页面、用户界面配置和使用举例师父页网页零部件portlets、皮肤和风格表. 5.web2.0技术运用举例代理商一起协作和社区建设设施.
------解决方案--------------------
1.advanced数据库技术等酸性交易为例,编制报表,存放程序 加上缓存和高性能汇聚. 例如2.security例如使用对称和不对称加密、散列安全、数字证书及签名、防火墙、 运输安全和应用水平.
3.back端Web服务以通往外部、第三方数据源,无论用肥皂或休息的沟通机制.
4.dynamic页面、用户界面配置和使用举例师父页网页零部件portlets、皮肤和风格表. 5.web2.0技术运用举例代理商一起协作和社区建设设施.
哈哈,翻译的真好!
------解决方案--------------------
就是说明一下,
简单解释一下
--------------------
wiki:en.wikipedia.org/wiki/

acid:In databases, ACID stands for Atomicity, Consistency, Isolation, and Durability. They are considered to be the key transaction processing features of a database management system, or DBMS. Without them, the integrity of the database cannot be guaranteed.


asymmetric encryption:
Asymmetric encryption uses different keys for encryption and decryption. Each participant is assigned a pair of keys, consisting of an encryption key and a corresponding decryption key. It is impossible to derive (“hack”) the decryption key from a known encryption key (with reasonable computing power, time and money. Asymmetric encryption typically is used for public key encryption.

REST:Representational State Transfer is a model for web services based solely on HTTP. REST takes the view that the Web already has everything necessary for web services, without having to add extra specifications like SOAP and UDDI. Any item can be made available (ie, represented) at a URI, and, subject to the necessary permissions, it can be manipulated using one of the simple operations defined within HTTP (GET to retrieve information, PUT and POST to modify it, DELETE to remove it).

......

4.参考asp.net 2.0的教程
5.web2.0:不懂,lz有时间可以参考博客堂/园的开源项目
------解决方案--------------------
1.advanced database techniques such as for example ACID transactions, prepared statements, stored procedures, together with caching and pooling for high performance.