.Net Home

.Net Articles

.Net Books

.Net Tools

.Net Keywords



.Net

Programming .NET Security

See more Amazon Details

Contents Listing

Preface
Part I. Fundamentals
1. Security Fundamentals
The Need for Security
Roles in Security
Understanding Software Security
End-to-End Security
2. Assemblies
Assemblies Explained
Creating Assemblies
Shared Assemblies
Strong Names
Publisher Certificates
Decompiling Explained
3. Application Domains
Application Domains Explained
4. The Lifetime of a Secure Application
Designing a Secure .NET Application
Developing a Secure .NET Application
Security Testing a .NET Application
Deploying a .NET Application
Executing a .NET Application
Monitoring a .NET Application
Part II. .NET Security
5. Introduction to Runtime Security
Runtime Security Explained
Introducing Role-Based Security
Introducing Code-Access Security
Introducing Isolated Storage
6. Evidence and Code Identity
Evidence Explained
Programming Evidence
Extending the .NET Framework
7. Permissions
Permissions Explained
Programming Code-Access Security
Extending the .NET Framework
8. Security Policy
Security Policy Explained
Programming Security Policy
Extending the .NET Framework
9. Administering Code-Access Security
Default Security Policy
Inspecting Declarative Security Statements
Using the .NET Framework Configuration Tool
Using the Code-Access Security Policy Tool
10. Role-Based Security
Role-Based Security Explained
Programming Role-Based Security
11. Isolated Storage
Isolated Storage Explained
Programming Isolated Storage
Administering Isolated Storage
Part III. .NET Cryptography
12. Introduction to Cryptography
Cryptography Explained
Cryptography Is Key Management
Cryptographic Attacks
13. Hashing Algorithms
Hashing Algorithms Explained
Programming Hashing Algorithms
Keyed Hashing Algorithms Explained
Programming Keyed Hashing Algorithms
Extending the .NET Framework
14. Symmetric Encryption
Encryption Revisited
Symmetric Encryption Explained
Programming Symmetrical Encryption
Extending the .NET Framework
15. Asymmetric Encryption
Asymmetric Encryption Explained
Programming Asymmetrical Encryption
Extending the .NET Framework
16. Digital Signatures
Digital Signatures Explained
Programming Digital Signatures
Programming XML Signatures
Extending the .NET Framework
17. Cryptographic Keys
Cryptographic Keys Explained
Programming Cryptographic Keys
Extending the .NET Framework
Part IV. .NET Application Frameworks
18. ASP.NET Application Security
ASP.NET Security Explained
Configuring the ASP.NET Worker Process Identity
Authentication
Authorization
Impersonation
ASP.NET and Code-Access Security
19. COM+ Security
COM+ Security Explained
Programming COM+ Security
Administering COM+ Security
20. The Event Log Service
The Event Log Service Explained
Programming the Event Log Service
Part V. API Quick Reference
21. How to Use This Quick Reference
Finding a Quick-Reference Entry
Reading a Quick-Reference Entry
22. Converting from C# to VB Syntax
General Considerations
Classes
Structures
Interfaces
Class, Structure, and Interface Members
Delegates
Enumerations
23. The System.Security Namespace
24. The System.Security.Cryptography Namespace
25. The System.Security.Cryptography.X509Certificates Namespace
26. The System.Security.Cryptography.Xml Namespace
27. The System.Security.Permissions Namespace
28. The System.Security.Policy Namespace
29. The System.Security.Principal Namespace
Index

Google
Web www.techno.nildram.co.uk

Contents
View a contents listing.

Short
Short Description.


Keyword Pages

Keyword Bestsellers

.Net Bestsellers
The bestselling books on Amazon.

Articles

SAP and Windows Integration Move

Performance Testing Microsoft .Net Web Applications

Visit our site of the month Sarbanes-Oxley at www.sarbanesoxleyuk.co.uk
Visit our site of the month Sarbanes-Oxley at www.sarbanesoxleyuk.co.uk