did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780596004422

Programming .Net Security

by ;
  • ISBN13:

    9780596004422

  • ISBN10:

    0596004427

  • Format: Paperback
  • Copyright: 2003-06-01
  • Publisher: Oreilly & Associates Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $5.00
  • Buy New
    $48.49
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-3 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

As applications become more web-integrated, the ability to write secure code becomes an increasingly important skill for developers. New products and technologies from Microsoft contain numerous features that dramatically increase security when used correctly. Written by experts, Programming .NET Security is both a comprehensive tutorial and reference that shows developers how to benefit from the various tools available. The book contains numerous practical examples using the C# and VB.NET programming languages, and includes a unique CD that integrates the book's reference section directly into the help files of Visual Studio .NET so that users can have direct access to this information via their computer.

Author Biography

Adam Freeman is a professional programmer and the author of two early Java books, Programming the Internet with Java and Active Java, both published by Addison Wesley, as well as Java course materials. His recent experience architecting a green-field e-commerce platform has given him an in-depth understanding of the current security challenges facing those developing large scale distributed systems. Adam has previously worked for Netscape, Sun Microsystems and the NASDAQ stock exchange.

Allen Jones has been developing Windows solutions since 1990 and working with Windows NT and Win32 since 1993. He was one of the first MCSEs to qualify anywhere in the world. For the last 3 years, Allen has been developing e-commerce and security systems for large corporations and financial institutions. He is a former employee of Microsoft in both Australia and the UK and co-author, with Adam Freeman, of C# for Java Developers and .NET XML Web Services Step by Step , both from Microsoft Press.

Table of Contents

Preface
Fundamentals
Security Fundamentals The Need for Security Roles in Security Understanding Software Security End-to-End Security
Assemblies Assemblies Explained Creating Assemblies Shared Assemblies Strong Names Publisher Certificates Decompiling Explained
Application Domains Application Domains Explained
The Lifetime of a Secure Application Designing a Secure .NET Application Developing a Secure .NET Application Security Testing a .NET Application Deploying a .NET Application Executing a .NET Application Monitoring a .NET Application
NET Security
Introduction to Runtime Security Runtime Security Explained Introducing Role-Based Security Introducing Code-Access Security Introducing Isolated Storage
Evidence and Code Identity Evidence Explained Programming Evidence Extending the .NET Framework
Permissions Permissions Explained Programming Code-Access Security Extending the .NET Framework
Security Policy Security Policy Explained Programming Security Policy Extending the .NET Framework
Administering Code-Access Security Default Security Policy Inspecting Declarative Security Statements Using the .NET Framework Configuration Tool Using the Code-Access Security Policy Tool
Role-Based Security Role-Based Security Explained Programming Role-Based Security
Isolated Storage Isolated Storage Explained Programming Isolated Storage Administering Isolated Storage
NET Cryptography
Introduction to Cryptography Cryptography Explained Cryptography Is Key Management Cryptographic Attacks
Hashing Algorithms Hashing Algorithms Explained Programming Hashing Algorithms Keyed Hashing Algorithms Explained Programming Keyed Hashing Algorithms Extending the .NET Framework
Symmetric Encryption Encryption Revisited Symmetric Encryption Explained Programming Symmetrical Encryption Extending the .NET Framework
Asymmetric Encryption Asymmetric Encryption Explained Programming Asymmetrical Encryption Extending the .NET Framework
Digital Signatures Digital Signatures Explained Programming Digital Signatures Programming XML Signatures Extending the .NET Framework
Cryptographic Keys Cryptographic Keys Explained Programming Cryptographic Keys Extending the .NET Framework
NET Application Frameworks
ASP.NET Application Security ASP.NET Security Explained Configuring the ASP.NET Worker Process Identity Authentication Authorization Impersonation ASP.NET and Code-Access Security
COM+ Security COM+ Security Explained Programming COM+ Security Administering COM+ Security
The Event Log Service The Event Log Service Explained Programming the Event Log Service
API Quick Reference
How to Use This Quick Reference Finding a Quick-Reference Entry Reading a Quick-Reference Entry
Converting from C# to VB Syntax General Considerations Classes Structures Interfaces Class, Structure, and Interface Members Delegates Enumerations
The System
Security Namespace
The System
Security
Cryptography Namespace
The System.Security.Cryptography.X509Certificates Namespace
The System
Security
Cryptography
Xml Namespace
The System
Security
Permissions Namespace
The System
Security
Policy Namespace
The System
Security
Principal Namespace
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program