Flylib.com
List of Listings
Previous page
Table of content
Next page
Chapter 1: Understanding .NET Security
Listing 1.1 Using the IsInRole() Method
Listing 1.2 Relying on Imperative Security for File Security
Chapter 2: .NET Framework Security Overview
Listing 2.1 Three examples of the SynchronizationAttribute attribute
Listing 2.2 Obtaining information with the SecurityManager class
Listing 2.3 Encrypting and Decrypting a File Requires Similar Code
Listing 2.4 Accessing Active Directory
Listing 2.5 The Details Form Displays Individual User Information
Chapter 3: Avoiding Common Errors and Traps
Listing 3.1 Enumerating Discontinuous Data Ranges
Listing 3.2 Detecting and Handling Data Length Errors
Listing 3.3 Avoiding Unwanted Characters in Input
Chapter 4: .NET Role-Based Security Techniques
Listing 4.1 Discovering Code Group Membership
Listing 4.2 Getting a Permission List Using a Policy
Listing 4.3 Building Evidence to Obtain Permissions
Listing 4.4 Using Declarative Security Definitions
Listing 4.5 Implementing Code Access Security for the Registry
Listing 4.6 Signed Client Example Code
Listing 4.7 Using a Component Constructor to Check Credentials
Listing 4.8 Using Reflection to Obtain Evidence
Chapter 5: Policies and Code Groups in Detail
Listing 5.1 Permission XML File Example
Listing 5.2 Specialized Code Group Component
Listing 5.3 Alternative Code Group Component
Listing 5.4 Code Group Component Testing Example
Listing 5.5 A Typical Custom Permission Assembly
Listing 5.6 Declarative Security Addition
Listing 5.7 A Custom Permission Test Component
Listing 5.8 Custom Permission Test Application
Listing 5.9 XML Generator for a Custom Permission
Listing 5.10 Obtaining a Named Permission
Chapter 6: Validation and Verification Issues
Listing 6.1 Adding Security Checks to a Client
Listing 6.2 Using Multiple AppDomain Objects to Control Access
Listing 6.3 A Simple Test Application
Listing 6.4 Domain FriendlyName Detection Component
Listing 6.5 Creating a Component from an AppDomain Object
Listing 6.6 Calling External Functions
Listing 6.7 Accessing External Programs
Listing 6.8 Using the Process.Start() Method
Chapter 7: .NET Cryptographic Techniques
Listing 7.1: Mapping an Algorithm to a Class
Listing 7.2 Mapping an OID to a Class
Listing 7.3 Encrypting Data Using Symmetric Cryptography
Listing 7.4 Creating a Key Pair
Listing 7.5 Encrypting and Decrypting Data Using Asymmetric Cryptography
Listing 7.6 Generating a Key from a Password
Listing 7.7 Reading an X.509 Certificate
Chapter 8: LAN Security Requirements
Listing 8.1 Using the SocketPermission Class
Listing 8.2 Using the CredentialCache and NetworkCredential Classes
Listing 8.3 Using Attributes in a Managed Component
Listing 8.4 Safely Calling .NET Components from Unmanaged Code
Listing 8.5 Creating Math Function Methods for the COM+ Environment
Chapter 9: Web Server Security
Listing 9.1 Using the AuthenticationManager Class for Pre-Authentication
Listing 9.2 Accessing a Secured Web Source
Listing 9.3 Using a Performance Counter Approach for Detecting DDOS
Chapter 10: Web Data Security
Listing 10.1 Using Role-Based Security to Modify Page Rendering
Listing 10.2 Setting the SQL Server Password
Listing 10.3 Getting the Password
Listing 10.4 Simple Remoting Component Example
Listing 10.5 Simple Remoting Host Example
Listing 10.6 Typical Remoting Host Configuration File
Listing 10.7 Simple Remoting Client Example
Listing 10.8 Typical Remoting Host Configuration File
Listing 10.9 Obtaining Client Certificate Information
Chapter 11: Securing XML and Web Services
Listing 11.1 A Web Service Using Security Attributes
Listing 11.2 A Web Service Using Imperative Security
Listing 11.3 Using the DiscoveryClientProtocol Class
Listing 11.4 Signing and Verifying an XML File
Listing 11.5 Logging in with Passport
Listing 11.6 Displaying the Logged In Status
Listing 11.7 The SOAP Quick Test Application
Chapter 12: Active Directory Security
Listing 12.1 Using Win32 API Calls for the Domain Controller
Listing 12.2 Accessing Active Directory
Listing 12.3 The Details Form Displays Individual User Information
Chapter 13: Wireless Device Security
Listing 13.1 Application Security Technique
Listing 13.2 Tag Changes Based on Filter Settings
Listing 13.3 Using the DeviceSpecific Property
Listing 13.4 Accessing Web Services Using SOAP
Listing 13.5 Defining the Login Page
Listing 13.6 Modifying the Web.CONFIG File
Listing 13.7 Generating Forms Authentication Statistics
Chapter 14: Win32 API Overview
Listing 14.1 Using Unsafe Code in a C# Program
Listing 14.2 Converting a SID to Human Readable Form
Listing 14.3 Gaining Access to the ACEs Means Reading the ACL
Chapter 15: Win32 API Advanced Techniques
Listing 15.1 Obtaining Permission Information
Listing 15.2 Adding a SACL Entry to an Application
Listing 15.3 An Alternative Method for Setting Security
Listing 15.4 One Technique for Accessing File Security Information
Listing 15.5 Reading a Registry Entry
Previous page
Table of content
Next page
.NET Development Security Solutions
ISBN: 0782142664
EAN: 2147483647
Year: 2003
Pages: 168
Authors:
John Paul Mueller
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Exporting the Results of a Query to an Array
Checking for Concurrency Violations
Synchronizing a DataSet with an XML Document
Creating an XML File That Shows Changes Made to a DataSet
Listing Installed OLE DB Providers
High-Speed Signal Propagation[c] Advanced Black Magic
Rules of Scaling
Ideal Transmission Line
The Future of On-Chip Interconnections
Finished Core Specifications
Daisy-Chain Clock Distribution
MySQL Clustering
Auto-discovery of Databases
Obtaining, Installing, and Configuring MySQL Cluster on Other Platforms
Using Multiple Management Nodes
Running MySQL in a Chrooted Environment
What to Look for When Something Goes Wrong
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Five Stimulating Interest
Chapter Six Defining Pain or Critical Business Issue
Chapter Eleven Gaining Access to People with Power
Chapter Twelve Controlling the Buying Process
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
ILS
Monitoring and Troubleshooting Failovers
Additional IPS Features
Monitoring and Troubleshooting Cisco Remote Access VPN
System Clock
Java All-In-One Desk Reference For Dummies
Making Choices
Programming Threads
Book VI - Swing
Creating Applets
Animation and Game Programming
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies