Security for Microsoft® Visual Basic® .NET
Learn the techniques that every developer who works with Visual Basic .NET should know about designing, developing, and developing security-enhanced applications for Microsoft Windows® and the Web. Visual Basic .NET experts Ed Robinson and Mike Bond introduce critical security concepts using straig...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
:
Microsoft Press
2011.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627734706719 |
Tabla de Contenidos:
- ""Cover""; ""Copyright""; ""Table of Contents""; ""Introduction""; ""Part I: Development Techniques""; ""Chapter 1: Encryption""; ""Practice Files""; ""Hash Digests""; ""Private Key Encryption""; ""Keeping Private Keys Safe""; ""Public Key Encryption""; ""Hiding Unnecessary Information""; ""Encryption in the Real World""; ""Summary""; ""Chapter 2: Role-Based Authorization""; ""Role-Based Authorization Exercise""; ""Windows Integrated Security""; ""ASP.NET Authentication and Authorization""; ""Role-Based Authorization in the Real World""; ""Summary""; ""Chapter 3: Code-Access Security""
- ""How Actions Are Considered Safe or Unsafe""""What Prevents Harmful Code from Executing?""; ""It's On By Default""; ""Security Features and the Visual Basic .NET Developer""; ""Code-Access Security vs. Application Role-Based Security""; ""Code-Access Security Preempts Application Role-Based Security""; ""Run Your Code in Different Security Zones""; ""What Code-Access Security Is Meant to Protect""; ""Permissions � The Basis of What Your Code Can Do""; ""Ensuring That Your Code Will Run Safely""; ""Cooperating with the Security System""; ""Code-Access Security in the Real World""
- ""Summary""""Chapter 4: ASP NET Authentication""; ""EmployeeManagementWeb Practice Files""; ""Forms Authentication""; ""Windows Integrated Security Authentication""; ""Passport Authentication""; ""Install the Passport SDK""; ""ASP.NET Authentication in the Real World""; ""Summary""; ""Chapter 5: Securing Web Applications""; ""Secure Sockets Layer""; ""How SSL Works""; ""Securing Web Services""; ""Implementing an Audit Trail""; ""Securing Web Applications in the Real World""; ""Summary""; ""Part II: Ensuring Hack-Resistant Code""; ""Chapter 6: Application Attacks and How to Avoid Them""
- ""Denial of Service Attacks""""Defensive Techniques for DoS Attacks""; ""File-Based or Directory-Based Attacks""; ""Defensive Technique for File-Based or Directory-Based Attacks""; ""SQL-Injection Attacks""; ""Defensive Techniques for SQL-Injection Attacks""; ""Cross-Site Scripting Attacks""; ""When HTML Script Injection Becomes a Problem""; ""Defensive Techniques for Cross-Site Scripting Attacks""; ""Child-Application Attacks""; ""Defensive Technique for Child-Application Attacks""; ""Guarding Against Attacks in the Real World""; ""Summary""; ""Chapter 7: Validating Input""
- ""Working with Input Types and Validation Tools""""Direct User Input""; ""General Language Validation Tools""; ""Web Application Input""; ""Nonuser Input""; ""Input to Subroutines""; ""Summary""; ""Chapter 8: Handling Exceptions""; ""Where Exceptions Occur""; ""Exception Handling""; ""Global Exception Handlers""; ""Exception Handling in the Real World""; ""Summary""; ""Chapter 9: Testing for Attack-Resistant Code""; ""Plan of Attack � The Test Plan""; ""Brainstorm � Generate Security-Related Scenarios""; ""Get Focused � Prioritize Scenarios""; ""Generate Tests""
- ""Attack � Execute the Plan""