Chapter 2 -- A Process for Building Secure Web Applications

[Previous] [Next]

Chapter 2

Although building secure Web applications can seem daunting, following a few simple steps will make the task a little easier. In this chapter, we'll thoroughly describe the security design process that we'll advocate and use throughout this book. Following that discussion, we'll take a look at general application design—at first divorced from security concerns—and then map the process for building secure Web applications to the application design model we've described. To tie everything together, we'll end the chapter with a fairly detailed example, tracing the development of a security solution from a particular set of business requirements through the creation of a product list for the solution. This is the example that Chapter 10, "Building a Secure Solution," will pick up again following the chapters in Part II, "Technologies and Trade-Offs," which describe the pros and cons of the Microsoft technologies and strategies you might consider using.



Designing Secure Web-Based Applications for Microsoft Windows 2000 with CDROM
Designing Secure Web-Based Applications for Microsoft Windows 2000 with CDROM
ISBN: N/A
EAN: N/A
Year: 1999
Pages: 138

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net