Summary


This chapter discusses some of the more interesting security features you can access from the Win32 API. The SACL and DACL let you access and manage security information in a way that Win32 applications also understand. You’ve also discovered techniques for modifying registry security, as well as working with resources such as files. Finally, this chapter has helped you discover techniques for working with unmanaged components and controls, which is an important skill since you’re likely to need to access them for the near future.

Having a security plan in place is one of the most important things an organization can do. A plan helps everyone coordinate their efforts and makes it less likely that a hole will develop that a cracker could exploit. This book has provided you with a wealth of security information you can use to create the development portion of a security plan. Unfortunately, development security is one of the areas that many organizations fail to consider. Give your organization an edge in the security arena by planning for the security needs of your next application. This means considering the use of both managed and unmanaged techniques—the very techniques discussed in this chapter.

Congratulations! You’ve reached the last chapter of the book. If you’ve read from the beginning to the end of the book, you know that it covers a lot of ground. I encourage you to continue to use the book as a reference. However, security is a very big topic. Make sure you contact me at JMueller@mwt.net if you have any questions about this book. Also, look on my Web site at http://www.mwt.net/~jmueller/ for updates and additional information.




.Net Development Security Solutions
.NET Development Security Solutions
ISBN: 0782142664
EAN: 2147483647
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net