Programming .Net Security

( 1 )

Overview

With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure ...

See more details below
Paperback
$36.10
BN.com price
(Save 27%)$49.99 List Price
Other sellers (Paperback)
  • All (21) from $1.99   
  • New (9) from $28.50   
  • Used (12) from $1.99   
Programming .NET Security

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$22.99
BN.com price
(Save 42%)$39.99 List Price

Overview

With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security, you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to:

  • use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs , from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data.
  • use COM+ component services in a secure manner
If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.
Read More Show Less

Product Details

  • ISBN-13: 9780596004422
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 7/4/2003
  • Edition number: 1
  • Pages: 718
  • Product dimensions: 6.90 (w) x 9.10 (h) x 1.40 (d)

Meet the Author

Adam Freeman is a professional programmer and the author of two early Java books, Programming the Internet with Java and Active Java, both published by Addison Wesley, as well as Java course materials. His recent experience architecting a green-field e-commerce platform has given him an in-depth understanding of the current security challenges facing those developing large scale distributed systems. Adam has previously worked for Netscape, Sun Microsystems and the NASDAQ stock exchange.

Allen Jones has been developing Windows solutions since 1990 and working with Windows NT and Win32 since 1993. He was one of the first MCSEs to qualify anywhere in the world. For the last 3 years, Allen has been developing e-commerce and security systems for large corporations and financial institutions. He is a former employee of Microsoft in both Australia and the UK and co-author, with Adam Freeman, of C# for Java Developers and .NET XML Web Services Step by Step , both from Microsoft Press.

Read More Show Less

Table of Contents

Dedication

Preface

Part I: Fundamentals

Chapter 1: Security Fundamentals

Chapter 2: Assemblies

Chapter 3: Application Domains

Chapter 4: The Lifetime of a Secure Application

Part II: .NET Security

Chapter 5: Introduction to Runtime Security

Chapter 6: Evidence and Code Identity

Chapter 7: Permissions

Chapter 8: Security Policy

Chapter 9: Administering Code-Access Security

Chapter 10: Role-Based Security

Chapter 11: Isolated Storage

Part III: .NET Cryptography

Chapter 12: Introduction to Cryptography

Chapter 13: Hashing Algorithms

Chapter 14: Symmetric Encryption

Chapter 15: Asymmetric Encryption

Chapter 16: Digital Signatures

Chapter 17: Cryptographic Keys

Part IV: .NET Application Frameworks

Chapter 18: ASP.NET Application Security

Chapter 19: COM+ Security

Chapter 20: The Event Log Service

Part V: API Quick Reference

Chapter 21: How to Use This Quick Reference

Chapter 22: Converting from C# to VB Syntax

Chapter 23: The System.Security Namespace

Chapter 24: The System.Security.Cryptography Namespace

Chapter 25: The System.Security.Cryptography.X509Certificates Namespace

Chapter 26: The System.Security.Cryptography.Xml Namespace

Chapter 27: The System.Security.Permissions Namespace

Chapter 28: The System.Security.Policy Namespace

Chapter 29: The System.Security.Principal Namespace

Colophon

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted September 28, 2003

    ALERT - This is a must have book!!

    You really are not a true .NET Programmer until you understand the security mechanisms that are part and parcel with the framework. To program in .NET (or really any component-oriented technology) without security in mind is like parachuting without one strapped to your back. I was waiting for a book like this. Before this book I've had to scour over the internet to try to find out how to get the different areas of security in .NET to work. Now it¿s all here in one book. The theory, the explanations, the warnings, the samples. If you are a serious .NET programmer or .NET policy administrator then this is a must have book. If you don¿t know the difference between ¿host evidence¿ and ¿assembly evidence¿, then you need this book. If you don¿t know the difference between a ¿security demand¿ and a ¿permission request¿, then you are dangerous to the people you do work for. Also, make sure you know the basics already of the language and the framework since this book assumes you do. Good luck.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)