| 
 .Net Home 
 .Net Articles 
.Net Books 
.Net Tools 
.Net Keywords 
  
  
 | 
.Net
Programming .NET Security
| 
 | 
 |  
| 
	
 
See more Amazon Details
 
 | 
	
 | 	
 
| 
 Contents Listing
  Preface 
 Part I. Fundamentals
 1. Security Fundamentals
       The Need for Security 
       Roles in Security 
       Understanding Software Security 
       End-to-End Security 
 2. Assemblies
       Assemblies Explained 
       Creating Assemblies 
       Shared Assemblies 
       Strong Names 
       Publisher Certificates 
       Decompiling Explained 
 3. Application Domains
       Application Domains Explained 
 4. The Lifetime of a Secure Application
       Designing a Secure .NET Application 
       Developing a Secure .NET Application 
       Security Testing a .NET Application 
       Deploying a .NET Application 
       Executing a .NET Application 
       Monitoring a .NET Application 
 Part II. .NET Security
 5. Introduction to Runtime Security
       Runtime Security Explained 
       Introducing Role-Based Security 
       Introducing Code-Access Security 
       Introducing Isolated Storage 
 6. Evidence and Code Identity
       Evidence Explained 
       Programming Evidence 
       Extending the .NET Framework 
 7. Permissions
       Permissions Explained 
       Programming Code-Access Security 
       Extending the .NET Framework 
 8. Security Policy
       Security Policy Explained 
       Programming Security Policy 
       Extending the .NET Framework 
 9. Administering Code-Access Security
       Default Security Policy 
       Inspecting Declarative Security Statements 
       Using the .NET Framework Configuration Tool 
       Using the Code-Access Security Policy Tool 
 10. Role-Based Security
       Role-Based Security Explained 
       Programming Role-Based Security 
 11. Isolated Storage
       Isolated Storage Explained 
       Programming Isolated Storage 
       Administering Isolated Storage 
 Part III. .NET Cryptography
 12. Introduction to Cryptography
       Cryptography Explained 
       Cryptography Is Key Management 
       Cryptographic Attacks 
 13. Hashing Algorithms
       Hashing Algorithms Explained 
       Programming Hashing Algorithms 
       Keyed Hashing Algorithms Explained 
       Programming Keyed Hashing Algorithms 
       Extending the .NET Framework 
 14. Symmetric Encryption
       Encryption Revisited 
       Symmetric Encryption Explained 
       Programming Symmetrical Encryption 
       Extending the .NET Framework 
 15. Asymmetric Encryption
       Asymmetric Encryption Explained 
       Programming Asymmetrical Encryption 
       Extending the .NET Framework 
 16. Digital Signatures
       Digital Signatures Explained 
       Programming Digital Signatures 
       Programming XML Signatures 
       Extending the .NET Framework 
 17. Cryptographic Keys
       Cryptographic Keys Explained 
       Programming Cryptographic Keys 
       Extending the .NET Framework 
 Part IV. .NET Application Frameworks
 18. ASP.NET Application Security
       ASP.NET Security Explained 
       Configuring the ASP.NET Worker Process Identity 
       Authentication 
       Authorization 
       Impersonation 
       ASP.NET and Code-Access Security 
 19. COM+ Security
       COM+ Security Explained 
       Programming COM+ Security 
       Administering COM+ Security 
 20. The Event Log Service
       The Event Log Service Explained 
       Programming the Event Log Service 
 Part V. API Quick Reference
 21. How to Use This Quick Reference
       Finding a Quick-Reference Entry 
       Reading a Quick-Reference Entry 
 22. Converting from C# to VB Syntax
       General Considerations 
       Classes 
       Structures 
       Interfaces 
       Class, Structure, and Interface Members 
       Delegates 
       Enumerations 
 23. The System.Security Namespace
 24. The System.Security.Cryptography Namespace
 25. The System.Security.Cryptography.X509Certificates Namespace
 26. The System.Security.Cryptography.Xml Namespace
 27. The System.Security.Permissions Namespace
 28. The System.Security.Policy Namespace
 29. The System.Security.Principal Namespace
 Index 
 | 
 
 
 | 
 Contents
 View a contents listing.
 
 Short
 Short Description.
 	
 
 Keyword Pages
 	
Keyword Bestsellers
 
.Net Bestsellers The bestselling books on Amazon. 
Articles 	
 SAP and Windows Integration Move 
 Performance Testing Microsoft .Net Web Applications 
Visit our site of the month Sarbanes-Oxley at www.sarbanesoxleyuk.co.uk
 |