Flylib.com
.NET Security and Cryptography
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Peter Thorsteinson
,
G. Gnana Arun Ganesh
BUY ON AMAZON
Main Page
Table of content
Copyright
Integrated .NET Series from Object Innovations and Prentice Hall PTR
Preface
Organization
Sample Programs
Web Site
Acknowledgments
Peter Thorsteinson
G. Gnana Arun Ganesh
The Integrated .NET Series from Object Innovations and Prentice Hall PTR
Introduction
.NET Programming Books
.NET Applications and Technology
.NET Interoperability and Migration
Chapter One. .NET Cryptography and Security
The Nature of This Book
The Nature of Cryptography and Security
Windows Security Comes of Age
The .NET Framework and the CLR
.NET Cryptography Programming
.NET Security Programming
Summary
Chapter Two. Fundamentals of Cryptography
Security and Keeping Secrets
Steganography
Modern Ciphers
Cryptanalytic Attacks
Issues in Human Interaction and Trust
Summary
Chapter Three. Symmetric Cryptography
Symmetric Ciphers
Programming with .NET Symmetric Cryptography
Key Exchange Issues
Summary
Chapter Four. Asymmetric Cryptography
Problems with Symmetric Algorithms
The Idea Behind Asymmetric Cryptography
Existing Asymmetric Algorithms
RSA: The Most Used Asymmetric Algorithm
Caveat: Provability Issues
Programming with .NET Asymmetric Cryptography
Digital Certificates
Summary
Chapter Five. Digital Signatures
Hash Algorithms
How Digital Signatures Work
RSA Used as a Digital Signature Algorithm
The Digital Signature Algorithm
The Asymmetric AlgorithmHierarchy Class Hierarchy
Summary
Chapter Six. XML Cryptography
XML Encryption
XML Signatures
Combining XML Signing and XML Encryption
Summary
Chapter Seven. .NET User-Based Security
Authentication and Authorization
.NET Security Model
Administrating Windows Security
Administrating .NET Security
Permissions
User-Based Security
Two Approaches to User-Based Security
Credentials
Security Discipline
Summary
Chapter Eight. .NET Code Access Security
The Need for Code Access Security
Security, Managed Code, and the CLR
How CAS Is Used
Managing Security Policy with Code Groups
Imperative Versus Declarative CAS
Evidence-Based Security
Code Access Permissions
Declarative Code Access Permissions
Permission Requests
Permission Sets
Summary
Chapter Nine. ASP.NET Security
Fundamental Security Mechanisms
Implementing ASP.NET Authentication
ASP.NET Configuration
Forms Authentication
Forms Authentication Classes
Passport Authentication
Windows Authentication
Implementing ASP.NET Authorization
Implementing ASP.NET Impersonation
Summary
Chapter Ten. Web Services Security
Basic Techniques in Securing Web Services
Authenticate Web Service Using SOAPHEADER
Summary
Appendix A. A Security Attack Example: The Stack Overrun
Appendix B. How the RSA Cipher Works
Modular Arithmetic
The BigRSA Example Program
The CrackRSAWorkFactorDemo Example Program
Appendix C. Using the GNU GMP Library
Installing Cygwin
Testing Your Cygwin Installation
Installing GMP
Uninstalling Cygwin
Appendix D. Cryptography and Security Resources
Background Knowledge and Conceptual Books
Cryptographic Mathematics Books
Implementing Security Guide Books
Human Interest Books on Cryptography
Cryptography News Groups
Useful Cryptographic and Security Web Sites
Appendix E. Exploring Web Services
Motivation for Web Services
Web Services Definition
Backbones of Web Services
Next Generation of Distributed Computing: Web Services
Code Model for Web Services
Developing a Simple Concatenate Web Service
Protocols
Accessing a Web Service
Asynchronous Programming in Web Services
Creating an ASP.NET Calculator Web Service
Web Services Are Still Evolving
Summary
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Peter Thorsteinson
,
G. Gnana Arun Ganesh
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
IT Project+ Study Guide
Other Planning Processes
Comprehensive Project Plan
Project Closure
Appendix A Systems Development Life Cycle
Interprocess Communications in Linux: The Nooks and Crannies
System Calls
The u Area
Introduction
The /proc Filesystem
Executing Remote Commands at a System Level
Java How to Program (6th Edition) (How to Program (Deitel))
Wrap-Up
Introduction
Introduction
Exception-Handling Overview
Raw Types
Cisco CallManager Fundamentals (2nd Edition)
International Numbering Plans
Computer Telephony Interface (CTI) Devices
VoIP Gateway Security
Summary
Summary
PMP Practice Questions Exam Cram 2
Answers and Explanations
Exam Prep Questions
Project Execution
Answers and Explanations
Answers and Explanations
File System Forensic Analysis
BSD Partitions
Multiple Disk Volumes
Summary
Content Category
UFS1 Group Descriptor
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies