Flylib.com
.NET Security and Cryptography
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Peter Thorsteinson
,
G. Gnana Arun Ganesh
BUY ON AMAZON
Main Page
Table of content
Copyright
Integrated .NET Series from Object Innovations and Prentice Hall PTR
Preface
Organization
Sample Programs
Web Site
Acknowledgments
Peter Thorsteinson
G. Gnana Arun Ganesh
The Integrated .NET Series from Object Innovations and Prentice Hall PTR
Introduction
.NET Programming Books
.NET Applications and Technology
.NET Interoperability and Migration
Chapter One. .NET Cryptography and Security
The Nature of This Book
The Nature of Cryptography and Security
Windows Security Comes of Age
The .NET Framework and the CLR
.NET Cryptography Programming
.NET Security Programming
Summary
Chapter Two. Fundamentals of Cryptography
Security and Keeping Secrets
Steganography
Modern Ciphers
Cryptanalytic Attacks
Issues in Human Interaction and Trust
Summary
Chapter Three. Symmetric Cryptography
Symmetric Ciphers
Programming with .NET Symmetric Cryptography
Key Exchange Issues
Summary
Chapter Four. Asymmetric Cryptography
Problems with Symmetric Algorithms
The Idea Behind Asymmetric Cryptography
Existing Asymmetric Algorithms
RSA: The Most Used Asymmetric Algorithm
Caveat: Provability Issues
Programming with .NET Asymmetric Cryptography
Digital Certificates
Summary
Chapter Five. Digital Signatures
Hash Algorithms
How Digital Signatures Work
RSA Used as a Digital Signature Algorithm
The Digital Signature Algorithm
The Asymmetric AlgorithmHierarchy Class Hierarchy
Summary
Chapter Six. XML Cryptography
XML Encryption
XML Signatures
Combining XML Signing and XML Encryption
Summary
Chapter Seven. .NET User-Based Security
Authentication and Authorization
.NET Security Model
Administrating Windows Security
Administrating .NET Security
Permissions
User-Based Security
Two Approaches to User-Based Security
Credentials
Security Discipline
Summary
Chapter Eight. .NET Code Access Security
The Need for Code Access Security
Security, Managed Code, and the CLR
How CAS Is Used
Managing Security Policy with Code Groups
Imperative Versus Declarative CAS
Evidence-Based Security
Code Access Permissions
Declarative Code Access Permissions
Permission Requests
Permission Sets
Summary
Chapter Nine. ASP.NET Security
Fundamental Security Mechanisms
Implementing ASP.NET Authentication
ASP.NET Configuration
Forms Authentication
Forms Authentication Classes
Passport Authentication
Windows Authentication
Implementing ASP.NET Authorization
Implementing ASP.NET Impersonation
Summary
Chapter Ten. Web Services Security
Basic Techniques in Securing Web Services
Authenticate Web Service Using SOAPHEADER
Summary
Appendix A. A Security Attack Example: The Stack Overrun
Appendix B. How the RSA Cipher Works
Modular Arithmetic
The BigRSA Example Program
The CrackRSAWorkFactorDemo Example Program
Appendix C. Using the GNU GMP Library
Installing Cygwin
Testing Your Cygwin Installation
Installing GMP
Uninstalling Cygwin
Appendix D. Cryptography and Security Resources
Background Knowledge and Conceptual Books
Cryptographic Mathematics Books
Implementing Security Guide Books
Human Interest Books on Cryptography
Cryptography News Groups
Useful Cryptographic and Security Web Sites
Appendix E. Exploring Web Services
Motivation for Web Services
Web Services Definition
Backbones of Web Services
Next Generation of Distributed Computing: Web Services
Code Model for Web Services
Developing a Simple Concatenate Web Service
Protocols
Accessing a Web Service
Asynchronous Programming in Web Services
Creating an ASP.NET Calculator Web Service
Web Services Are Still Evolving
Summary
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Peter Thorsteinson
,
G. Gnana Arun Ganesh
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
The Policy Framework
Risk-Assessment Methodologies
What Do Attackers Do?
How to Respond to an Attack
Tools Used for Assessments and Evaluations
MySQL Clustering
Using Multiple Management Nodes
Backup and Recovery
Performance
Physical Factors
Logging Commands
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
An SOA timeline (from XML to Web services to SOA)
Common principles of service-orientation
How service-orientation principles inter-relate
Service-Oriented Analysis (Part II: Service Modeling)
A.1. RailCo Ltd.
Extending and Embedding PHP
Returning Values
Summary
Accessing Streams
Wrapper Operations
Summary
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Running Operating System Commands
Accessing the File System
Accessing the Network
MPLS Configuration on Cisco IOS Software
MPLS Overview
Overview of MPLS Forwarding
MPLS VPN Basic Configuration
Case Study-Multi-Homed Inter-AS Provider Network
Virtual Private LAN Service (VPLS)
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies