Security for Microsoft® Visual Basic® .NET

Learn the techniques that every developer who works with Visual Basic .NET should know about designing, developing, and developing security-enhanced applications for Microsoft Windows® and the Web. Visual Basic .NET experts Ed Robinson and Mike Bond introduce critical security concepts using straig...

Descripción completa

Detalles Bibliográficos
Autor principal: Robinson, Ed (-)
Otros Autores: Bond, Michael James
Formato: Libro electrónico
Idioma:Inglés
Publicado: : Microsoft Press 2011.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627734706719
Tabla de Contenidos:
  • ""Cover""; ""Copyright""; ""Table of Contents""; ""Introduction""; ""Part I: Development Techniques""; ""Chapter 1: Encryption""; ""Practice Files""; ""Hash Digests""; ""Private Key Encryption""; ""Keeping Private Keys Safe""; ""Public Key Encryption""; ""Hiding Unnecessary Information""; ""Encryption in the Real World""; ""Summary""; ""Chapter 2: Role-Based Authorization""; ""Role-Based Authorization Exercise""; ""Windows Integrated Security""; ""ASP.NET Authentication and Authorization""; ""Role-Based Authorization in the Real World""; ""Summary""; ""Chapter 3: Code-Access Security""
  • ""How Actions Are Considered Safe or Unsafe""""What Prevents Harmful Code from Executing?""; ""It's On By Default""; ""Security Features and the Visual Basic .NET Developer""; ""Code-Access Security vs. Application Role-Based Security""; ""Code-Access Security Preempts Application Role-Based Security""; ""Run Your Code in Different Security Zones""; ""What Code-Access Security Is Meant to Protect""; ""Permissions â€? The Basis of What Your Code Can Do""; ""Ensuring That Your Code Will Run Safely""; ""Cooperating with the Security System""; ""Code-Access Security in the Real World""
  • ""Summary""""Chapter 4: ASP NET Authentication""; ""EmployeeManagementWeb Practice Files""; ""Forms Authentication""; ""Windows Integrated Security Authentication""; ""Passport Authentication""; ""Install the Passport SDK""; ""ASP.NET Authentication in the Real World""; ""Summary""; ""Chapter 5: Securing Web Applications""; ""Secure Sockets Layer""; ""How SSL Works""; ""Securing Web Services""; ""Implementing an Audit Trail""; ""Securing Web Applications in the Real World""; ""Summary""; ""Part II: Ensuring Hack-Resistant Code""; ""Chapter 6: Application Attacks and How to Avoid Them""
  • ""Denial of Service Attacks""""Defensive Techniques for DoS Attacks""; ""File-Based or Directory-Based Attacks""; ""Defensive Technique for File-Based or Directory-Based Attacks""; ""SQL-Injection Attacks""; ""Defensive Techniques for SQL-Injection Attacks""; ""Cross-Site Scripting Attacks""; ""When HTML Script Injection Becomes a Problem""; ""Defensive Techniques for Cross-Site Scripting Attacks""; ""Child-Application Attacks""; ""Defensive Technique for Child-Application Attacks""; ""Guarding Against Attacks in the Real World""; ""Summary""; ""Chapter 7: Validating Input""
  • ""Working with Input Types and Validation Tools""""Direct User Input""; ""General Language Validation Tools""; ""Web Application Input""; ""Nonuser Input""; ""Input to Subroutines""; ""Summary""; ""Chapter 8: Handling Exceptions""; ""Where Exceptions Occur""; ""Exception Handling""; ""Global Exception Handlers""; ""Exception Handling in the Real World""; ""Summary""; ""Chapter 9: Testing for Attack-Resistant Code""; ""Plan of Attack â€? The Test Plan""; ""Brainstorm â€? Generate Security-Related Scenarios""; ""Get Focused â€? Prioritize Scenarios""; ""Generate Tests""
  • ""Attack â€? Execute the Plan""