.NET Development Security Solutions
, by Mueller, John PaulNote: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780782142662 | 0782142664
- Cover: Paperback
- Copyright: 10/3/2003
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples-lots of them-to teach you the right techniques for most scenarios you're likely to encounter. This is not an introduction to security; it's an advanced cookbook that shows experienced programmers how to meet tough security challenges: Recognize and avoid dangerous traps-including holes in .NET Work fluently with both role-based and code access security Maximize the security advantages of policies and code groups Promote security using Active Directory Secure data with .NET cryptographic techniques Meet the toughest LAN security requirements Tackle special security issues associated with Web and wireless applications Implement Win32 API security in managed applications Uniting this instruction is a coherent, cohesive mindset that will help you take the human factor into account at every step. You'll become technically proficient with all the tools at your disposal-and, at the same time, you'll learn to make your solutions more powerful by crafting them in ways that dovetail with users' needs-and foibles-and anticipate cracker exploits.
John Mueller is a freelance author and technical editor. He has produced 55 books and over 200 articles on topics ranging from networking to database management to programming. His most recent books are Visual C# .NET Developer's Handbook and .NET Framework Solutions: In Search of the Lost Win32 API from Sybex. He's written articles for SQL Server Professional, Visual C++ Developer, and Visual Basic Developer magazines and he's editor of the .NET electronic newsletter for Pinnacle Publishing.
Introduction | xxi | ||||
Part I Introduction to .NET Security | 1 | (66) | |||
|
3 | (20) | |||
|
5 | (6) | |||
|
7 | (2) | |||
|
9 | (2) | |||
|
11 | (7) | |||
|
12 | (1) | |||
|
13 | (1) | |||
|
14 | (1) | |||
|
15 | (2) | |||
|
17 | (1) | |||
|
18 | (3) | |||
|
18 | (1) | |||
|
18 | (1) | |||
|
19 | (1) | |||
|
19 | (2) | |||
|
21 | (2) | |||
|
23 | (28) | |||
|
24 | (4) | |||
|
25 | (1) | |||
|
26 | (1) | |||
|
27 | (1) | |||
|
28 | (3) | |||
|
28 | (1) | |||
|
29 | (2) | |||
|
31 | (4) | |||
|
31 | (1) | |||
|
32 | (3) | |||
|
35 | (4) | |||
|
36 | (1) | |||
|
36 | (3) | |||
|
39 | (1) | |||
|
39 | (1) | |||
|
40 | (1) | |||
|
41 | (1) | |||
|
41 | (9) | |||
|
42 | (1) | |||
|
42 | (8) | |||
|
50 | (1) | |||
|
51 | (16) | |||
|
52 | (8) | |||
|
53 | (1) | |||
|
53 | (2) | |||
|
55 | (2) | |||
|
57 | (2) | |||
|
59 | (1) | |||
|
60 | (1) | |||
|
60 | (1) | |||
|
61 | (1) | |||
|
61 | (2) | |||
|
61 | (1) | |||
|
62 | (1) | |||
|
62 | (1) | |||
|
63 | (1) | |||
|
64 | (3) | |||
Part II Desktop and LAN Security | 67 | (164) | |||
|
69 | (38) | |||
|
70 | (13) | |||
|
71 | (4) | |||
|
75 | (2) | |||
|
77 | (4) | |||
|
81 | (2) | |||
|
83 | (4) | |||
|
87 | (5) | |||
|
88 | (2) | |||
|
90 | (1) | |||
|
91 | (1) | |||
|
92 | (1) | |||
|
92 | (1) | |||
|
93 | (1) | |||
|
93 | (5) | |||
|
94 | (3) | |||
|
97 | (1) | |||
|
98 | (8) | |||
|
98 | (5) | |||
|
103 | (3) | |||
|
106 | (1) | |||
|
107 | (40) | |||
|
108 | (10) | |||
|
109 | (2) | |||
|
111 | (2) | |||
|
113 | (3) | |||
|
116 | (1) | |||
|
117 | (1) | |||
|
118 | (1) | |||
|
118 | (21) | |||
|
119 | (1) | |||
|
120 | (8) | |||
|
128 | (11) | |||
|
139 | (6) | |||
|
140 | (2) | |||
|
142 | (1) | |||
|
143 | (2) | |||
|
145 | (2) | |||
|
147 | (24) | |||
|
148 | (1) | |||
|
149 | (11) | |||
|
150 | (1) | |||
|
151 | (1) | |||
|
152 | (4) | |||
|
156 | (3) | |||
|
159 | (1) | |||
|
160 | (4) | |||
|
160 | (3) | |||
|
163 | (1) | |||
|
164 | (5) | |||
|
165 | (2) | |||
|
167 | (2) | |||
|
169 | (2) | |||
|
171 | (32) | |||
|
172 | (12) | |||
|
173 | (6) | |||
|
179 | (5) | |||
|
184 | (3) | |||
|
185 | (1) | |||
|
186 | (1) | |||
|
187 | (9) | |||
|
187 | (2) | |||
|
189 | (6) | |||
|
195 | (1) | |||
|
196 | (3) | |||
|
199 | (1) | |||
|
200 | (3) | |||
|
203 | (28) | |||
|
205 | (7) | |||
|
205 | (4) | |||
|
209 | (1) | |||
|
210 | (2) | |||
|
212 | (1) | |||
|
213 | (7) | |||
|
214 | (2) | |||
|
216 | (1) | |||
|
217 | (3) | |||
|
220 | (1) | |||
|
220 | (9) | |||
|
221 | (2) | |||
|
223 | (2) | |||
|
225 | (4) | |||
|
229 | (2) | |||
Part III Web-based Security | 231 | (104) | |||
|
233 | (30) | |||
|
235 | (14) | |||
|
236 | (10) | |||
|
246 | (3) | |||
|
249 | (1) | |||
|
249 | (4) | |||
|
250 | (2) | |||
|
252 | (1) | |||
|
253 | (5) | |||
|
254 | (1) | |||
|
254 | (4) | |||
|
258 | (1) | |||
|
259 | (1) | |||
|
260 | (1) | |||
|
261 | (2) | |||
|
263 | (36) | |||
|
264 | (13) | |||
|
265 | (2) | |||
|
267 | (10) | |||
|
277 | (1) | |||
|
278 | (1) | |||
|
279 | (15) | |||
|
280 | (1) | |||
|
281 | (2) | |||
|
283 | (3) | |||
|
286 | (2) | |||
|
288 | (5) | |||
|
293 | (1) | |||
|
294 | (4) | |||
|
294 | (2) | |||
|
296 | (2) | |||
|
298 | (1) | |||
|
299 | (36) | |||
|
301 | (11) | |||
|
302 | (1) | |||
|
303 | (2) | |||
|
305 | (3) | |||
|
308 | (4) | |||
|
312 | (6) | |||
|
313 | (1) | |||
|
314 | (4) | |||
|
318 | (2) | |||
|
320 | (1) | |||
|
321 | (4) | |||
|
323 | (1) | |||
|
323 | (2) | |||
|
325 | (7) | |||
|
326 | (2) | |||
|
328 | (4) | |||
|
332 | (1) | |||
|
332 | (3) | |||
Part IV Other Security Topics | 335 | (104) | |||
|
337 | (26) | |||
|
338 | (5) | |||
|
339 | (3) | |||
|
342 | (1) | |||
|
343 | (2) | |||
|
345 | (8) | |||
|
345 | (1) | |||
|
346 | (7) | |||
|
353 | (9) | |||
|
353 | (1) | |||
|
354 | (3) | |||
|
357 | (5) | |||
|
362 | (1) | |||
|
363 | (26) | |||
|
365 | (9) | |||
|
365 | (2) | |||
|
367 | (2) | |||
|
369 | (5) | |||
|
374 | (6) | |||
|
375 | (1) | |||
|
376 | (4) | |||
|
380 | (1) | |||
|
381 | (1) | |||
|
382 | (4) | |||
|
383 | (1) | |||
|
384 | (2) | |||
|
386 | (3) | |||
|
389 | (24) | |||
|
391 | (4) | |||
|
391 | (1) | |||
|
392 | (3) | |||
|
395 | (4) | |||
|
399 | (2) | |||
|
399 | (1) | |||
|
400 | (1) | |||
|
401 | (2) | |||
|
403 | (2) | |||
|
405 | (3) | |||
|
408 | (3) | |||
|
411 | (2) | |||
|
413 | (26) | |||
|
414 | (4) | |||
|
418 | (7) | |||
|
418 | (5) | |||
|
423 | (1) | |||
|
424 | (1) | |||
|
425 | (1) | |||
|
426 | (3) | |||
|
429 | (3) | |||
|
432 | (5) | |||
|
432 | (2) | |||
|
434 | (1) | |||
|
435 | (1) | |||
|
436 | (1) | |||
|
437 | (2) | |||
Glossary | 439 | (16) | |||
Index | 455 |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.