With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security, you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to:
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Adam Freeman is a professional programmer and the author of two early Java books, Programming the Internet with Java and Active Java, both published by Addison Wesley, as well as Java course materials. His recent experience architecting a green-field e-commerce platform has given him an in-depth understanding of the current security challenges facing those developing large scale distributed systems. Adam has previously worked for Netscape, Sun Microsystems and the NASDAQ stock exchange.
Allen Jones has been developing Windows solutions since 1990 and working with Windows NT and Win32 since 1993. He was one of the first MCSEs to qualify anywhere in the world. For the last 3 years, Allen has been developing e-commerce and security systems for large corporations and financial institutions. He is a former employee of Microsoft in both Australia and the UK and co-author, with Adam Freeman, of C# for Java Developers and .NET XML Web Services Step by Step , both from Microsoft Press.
Dedication; Preface; How This Book Is Organized; Who Should Read This Book; Assumptions This Book Makes; Conventions Used in This Book; How to Contact Us; Part I: Fundamentals; Chapter 1: Security Fundamentals; 1.1 The Need for Security; 1.2 Roles in Security; 1.3 Understanding Software Security; 1.4 End-to-End Security; Chapter 2: Assemblies; 2.1 Assemblies Explained; 2.2 Creating Assemblies; 2.3 Shared Assemblies; 2.4 Strong Names; 2.5 Publisher Certificates; 2.6 Decompiling Explained; Chapter 3: Application Domains; 3.1 Application Domains Explained; Chapter 4: The Lifetime of a Secure Application; 4.1 Designing a Secure .NET Application; 4.2 Developing a Secure .NET Application; 4.3 Security Testing a .NET Application; 4.4 Deploying a .NET Application; 4.5 Executing a .NET Application; 4.6 Monitoring a .NET Application; Part II: .NET Security; Chapter 5: Introduction to Runtime Security; 5.1 Runtime Security Explained; 5.2 Introducing Role-Based Security; 5.3 Introducing Code-Access Security; 5.4 Introducing Isolated Storage; Chapter 6: Evidence and Code Identity; 6.1 Evidence Explained; 6.2 Programming Evidence; 6.3 Extending the .NET Framework; Chapter 7: Permissions; 7.1 Permissions Explained; 7.2 Programming Code-Access Security; 7.3 Extending the .NET Framework; Chapter 8: Security Policy; 8.1 Security Policy Explained; 8.2 Programming Security Policy; 8.3 Extending the .NET Framework; Chapter 9: Administering Code-Access Security; 9.1 Default Security Policy; 9.2 Inspecting Declarative Security Statements; 9.3 Using the .NET Framework Configuration Tool; 9.4 Using the Code-Access Security Policy Tool; Chapter 10: Role-Based Security; 10.1 Role-Based Security Explained; 10.2 Programming Role-Based Security; Chapter 11: Isolated Storage; 11.1 Isolated Storage Explained; 11.2 Programming Isolated Storage; 11.3 Administering Isolated Storage; Part III: .NET Cryptography; Chapter 12: Introduction to Cryptography; 12.1 Cryptography Explained; 12.2 Cryptography Is Key Management; 12.3 Cryptographic Attacks; Chapter 13: Hashing Algorithms; 13.1 Hashing Algorithms Explained; 13.2 Programming Hashing Algorithms; 13.3 Keyed Hashing Algorithms Explained; 13.4 Programming Keyed Hashing Algorithms; 13.5 Extending the .NET Framework; Chapter 14: Symmetric Encryption; 14.1 Encryption Revisited; 14.2 Symmetric Encryption Explained; 14.3 Programming Symmetrical Encryption; 14.4 Extending the .NET Framework; Chapter 15: Asymmetric Encryption; 15.1 Asymmetric Encryption Explained; 15.2 Programming Asymmetrical Encryption; 15.3 Extending the .NET Framework; Chapter 16: Digital Signatures; 16.1 Digital Signatures Explained; 16.2 Programming Digital Signatures; 16.3 Programming XML Signatures; 16.4 Extending the .NET Framework; Chapter 17: Cryptographic Keys; 17.1 Cryptographic Keys Explained; 17.2 Programming Cryptographic Keys; 17.3 Extending the .NET Framework; Part IV: .NET Application Frameworks; Chapter 18: ASP.NET Application Security; 18.1 ASP.NET Security Explained; 18.2 Configuring the ASP.NET Worker Process Identity; 18.3 Authentication; 18.4 Authorization; 18.5 Impersonation; 18.6 ASP.NET and Code-Access Security; Chapter 19: COM+ Security; 19.1 COM+ Security Explained; 19.2 Programming COM+ Security; 19.3 Administering COM+ Security; Chapter 20: The Event Log Service; 20.1 The Event Log Service Explained; 20.2 Programming the Event Log Service; Part V: API Quick Reference; Chapter 21: How to Use This Quick Reference; 21.1 Finding a Quick-Reference Entry; 21.2 Reading a Quick-Reference Entry; Chapter 22: Converting from C# to VB Syntax; 22.1 General Considerations; 22.2 Classes; 22.3 Structures; 22.4 Interfaces; 22.5 Class, Structure, and Interface Members; 22.6 Delegates; 22.7 Enumerations; Chapter 23: The System.Security Namespace; Chapter 24: The System.Security.Cryptography Namespace; Chapter 25: The System.Security.Cryptography.X509Certificates Namespace; Chapter 26: The System.Security.Cryptography.Xml Namespace; Chapter 27: The System.Security.Permissions Namespace; Chapter 28: The System.Security.Policy Namespace; Chapter 29: The System.Security.Principal Namespace; Colophon;
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
GRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiGRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiDa: SecondSale, Montgomery, IL, U.S.A.
Condizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00078026873
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. 1st Edition. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Codice articolo GRP70405862
Quantità: 1 disponibili
Da: Half Price Books Inc., Dallas, TX, U.S.A.
paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Codice articolo S_402320971
Quantità: 1 disponibili
Da: AwesomeBooks, Wallingford, Regno Unito
Paperback. Condizione: Very Good. Programming .NET Security This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Codice articolo 7719-9780596004422
Quantità: 1 disponibili
Da: Bahamut Media, Reading, Regno Unito
Paperback. Condizione: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Codice articolo 6545-9780596004422
Quantità: 1 disponibili
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Programming .Net Security 2.5. Book. Codice articolo BBS-9780596004422
Quantità: 5 disponibili
Da: Lakeside Books, Benton Harbor, MI, U.S.A.
Condizione: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books! Codice articolo OTF-Y-9780596004422
Quantità: Più di 20 disponibili
Da: Toscana Books, AUSTIN, TX, U.S.A.
Paperback. Condizione: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Codice articolo Scanned0596004427
Quantità: 1 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Feb2416190070741
Quantità: Più di 20 disponibili
Da: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo WO-9780596004422
Quantità: 1 disponibili