What is included with this book?
Adam Freeman is a professional programmer and the author of two early Java books, Programming the Internet with Java and Active Java, both published by Addison Wesley, as well as Java course materials. His recent experience architecting a green-field e-commerce platform has given him an in-depth understanding of the current security challenges facing those developing large scale distributed systems. Adam has previously worked for Netscape, Sun Microsystems and the NASDAQ stock exchange.
Allen Jones has been developing Windows solutions since 1990 and working with Windows NT and Win32 since 1993. He was one of the first MCSEs to qualify anywhere in the world. For the last 3 years, Allen has been developing e-commerce and security systems for large corporations and financial institutions. He is a former employee of Microsoft in both Australia and the UK and co-author, with Adam Freeman, of C# for Java Developers and .NET XML Web Services Step by Step , both from Microsoft Press.
Preface | |
Fundamentals | |
Security Fundamentals The Need for Security Roles in Security Understanding Software Security End-to-End Security | |
Assemblies Assemblies Explained Creating Assemblies Shared Assemblies Strong Names Publisher Certificates Decompiling Explained | |
Application Domains Application Domains Explained | |
The Lifetime of a Secure Application Designing a Secure .NET Application Developing a Secure .NET Application Security Testing a .NET Application Deploying a .NET Application Executing a .NET Application Monitoring a .NET Application | |
NET Security | |
Introduction to Runtime Security Runtime Security Explained Introducing Role-Based Security Introducing Code-Access Security Introducing Isolated Storage | |
Evidence and Code Identity Evidence Explained Programming Evidence Extending the .NET Framework | |
Permissions Permissions Explained Programming Code-Access Security Extending the .NET Framework | |
Security Policy Security Policy Explained Programming Security Policy Extending the .NET Framework | |
Administering Code-Access Security Default Security Policy Inspecting Declarative Security Statements Using the .NET Framework Configuration Tool Using the Code-Access Security Policy Tool | |
Role-Based Security Role-Based Security Explained Programming Role-Based Security | |
Isolated Storage Isolated Storage Explained Programming Isolated Storage Administering Isolated Storage | |
NET Cryptography | |
Introduction to Cryptography Cryptography Explained Cryptography Is Key Management Cryptographic Attacks | |
Hashing Algorithms Hashing Algorithms Explained Programming Hashing Algorithms Keyed Hashing Algorithms Explained Programming Keyed Hashing Algorithms Extending the .NET Framework | |
Symmetric Encryption Encryption Revisited Symmetric Encryption Explained Programming Symmetrical Encryption Extending the .NET Framework | |
Asymmetric Encryption Asymmetric Encryption Explained Programming Asymmetrical Encryption Extending the .NET Framework | |
Digital Signatures Digital Signatures Explained Programming Digital Signatures Programming XML Signatures Extending the .NET Framework | |
Cryptographic Keys Cryptographic Keys Explained Programming Cryptographic Keys Extending the .NET Framework | |
NET Application Frameworks | |
ASP.NET Application Security ASP.NET Security Explained Configuring the ASP.NET Worker Process Identity Authentication Authorization Impersonation ASP.NET and Code-Access Security | |
COM+ Security COM+ Security Explained Programming COM+ Security Administering COM+ Security | |
The Event Log Service The Event Log Service Explained Programming the Event Log Service | |
API Quick Reference | |
How to Use This Quick Reference Finding a Quick-Reference Entry Reading a Quick-Reference Entry | |
Converting from C# to VB Syntax General Considerations Classes Structures Interfaces Class, Structure, and Interface Members Delegates Enumerations | |
The System | |
Security Namespace | |
The System | |
Security | |
Cryptography Namespace | |
The System.Security.Cryptography.X509Certificates Namespace | |
The System | |
Security | |
Cryptography | |
Xml Namespace | |
The System | |
Security | |
Permissions Namespace | |
The System | |
Security | |
Policy Namespace | |
The System | |
Security | |
Principal Namespace | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.