
Programming .Net Security
by Freeman, Adam; Jones, AllenBuy New
Rent Book
Rent Digital
Used Book
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Adam Freeman is a professional programmer and the author of two early Java books, Programming the Internet with Java and Active Java, both published by Addison Wesley, as well as Java course materials. His recent experience architecting a green-field e-commerce platform has given him an in-depth understanding of the current security challenges facing those developing large scale distributed systems. Adam has previously worked for Netscape, Sun Microsystems and the NASDAQ stock exchange.
Allen Jones has been developing Windows solutions since 1990 and working with Windows NT and Win32 since 1993. He was one of the first MCSEs to qualify anywhere in the world. For the last 3 years, Allen has been developing e-commerce and security systems for large corporations and financial institutions. He is a former employee of Microsoft in both Australia and the UK and co-author, with Adam Freeman, of C# for Java Developers and .NET XML Web Services Step by Step , both from Microsoft Press.
Table of Contents
Preface | |
Fundamentals | |
Security Fundamentals The Need for Security Roles in Security Understanding Software Security End-to-End Security | |
Assemblies Assemblies Explained Creating Assemblies Shared Assemblies Strong Names Publisher Certificates Decompiling Explained | |
Application Domains Application Domains Explained | |
The Lifetime of a Secure Application Designing a Secure .NET Application Developing a Secure .NET Application Security Testing a .NET Application Deploying a .NET Application Executing a .NET Application Monitoring a .NET Application | |
NET Security | |
Introduction to Runtime Security Runtime Security Explained Introducing Role-Based Security Introducing Code-Access Security Introducing Isolated Storage | |
Evidence and Code Identity Evidence Explained Programming Evidence Extending the .NET Framework | |
Permissions Permissions Explained Programming Code-Access Security Extending the .NET Framework | |
Security Policy Security Policy Explained Programming Security Policy Extending the .NET Framework | |
Administering Code-Access Security Default Security Policy Inspecting Declarative Security Statements Using the .NET Framework Configuration Tool Using the Code-Access Security Policy Tool | |
Role-Based Security Role-Based Security Explained Programming Role-Based Security | |
Isolated Storage Isolated Storage Explained Programming Isolated Storage Administering Isolated Storage | |
NET Cryptography | |
Introduction to Cryptography Cryptography Explained Cryptography Is Key Management Cryptographic Attacks | |
Hashing Algorithms Hashing Algorithms Explained Programming Hashing Algorithms Keyed Hashing Algorithms Explained Programming Keyed Hashing Algorithms Extending the .NET Framework | |
Symmetric Encryption Encryption Revisited Symmetric Encryption Explained Programming Symmetrical Encryption Extending the .NET Framework | |
Asymmetric Encryption Asymmetric Encryption Explained Programming Asymmetrical Encryption Extending the .NET Framework | |
Digital Signatures Digital Signatures Explained Programming Digital Signatures Programming XML Signatures Extending the .NET Framework | |
Cryptographic Keys Cryptographic Keys Explained Programming Cryptographic Keys Extending the .NET Framework | |
NET Application Frameworks | |
ASP.NET Application Security ASP.NET Security Explained Configuring the ASP.NET Worker Process Identity Authentication Authorization Impersonation ASP.NET and Code-Access Security | |
COM+ Security COM+ Security Explained Programming COM+ Security Administering COM+ Security | |
The Event Log Service The Event Log Service Explained Programming the Event Log Service | |
API Quick Reference | |
How to Use This Quick Reference Finding a Quick-Reference Entry Reading a Quick-Reference Entry | |
Converting from C# to VB Syntax General Considerations Classes Structures Interfaces Class, Structure, and Interface Members Delegates Enumerations | |
The System | |
Security Namespace | |
The System | |
Security | |
Cryptography Namespace | |
The System.Security.Cryptography.X509Certificates Namespace | |
The System | |
Security | |
Cryptography | |
Xml Namespace | |
The System | |
Security | |
Permissions Namespace | |
The System | |
Security | |
Policy Namespace | |
The System | |
Security | |
Principal Namespace | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.