.NET Development Security Solutions
von John Paul MuellerThe . NET Framework offers new, more effective ways to secure yourWeb and LAN-based applications. . NET Development Security Solutionsuses detailed, code-intensive examples--lots of them--toteach you the right techniques for most scenarios you're likely toencounter. This is not an introduction to security; it's anadvanced cookbook that shows experienced programmers how to meettough security challenges:
* Recognize and avoid dangerous traps--including holes in. NET
* Work fluently with both role-based and code accesssecurity
* Maximize the security advantages of policies and codegroups
* Promote security using Active Directory
* Secure data with . NET cryptographic techniques
* Meet the toughest LAN security requirements
* Tackle special security issues associated with Web and wirelessapplications
* Implement Win32 API security in managed applications
Uniting this instruction is a coherent, cohesive mindset thatwill help you take the human factor into account at every step. You'll become technically proficient with all the tools at yourdisposal--and, at the same time, you'll learn to make yoursolutions more powerful by crafting them in ways that dovetail withusers' needs--and foibles--and anticipate crackerexploits.
* Recognize and avoid dangerous traps--including holes in. NET
* Work fluently with both role-based and code accesssecurity
* Maximize the security advantages of policies and codegroups
* Promote security using Active Directory
* Secure data with . NET cryptographic techniques
* Meet the toughest LAN security requirements
* Tackle special security issues associated with Web and wirelessapplications
* Implement Win32 API security in managed applications
Uniting this instruction is a coherent, cohesive mindset thatwill help you take the human factor into account at every step. You'll become technically proficient with all the tools at yourdisposal--and, at the same time, you'll learn to make yoursolutions more powerful by crafting them in ways that dovetail withusers' needs--and foibles--and anticipate crackerexploits.