How to Use This Chapter


To get the most out of this chapter, read the following chapters before or in conjunction with this chapter:

  • Read Chapter 2, "Threats and Countermeasures." This will give you a broader and deeper understanding of potential threats and countermeasures faced by Web applications.

  • Read Chapter 4, "Design Guidelines for Secure Web Applications." In this chapter, you will learn the architecture and design challenges and guidelines for building a secure solution.

  • Read Chapter 18, "Securing Your Database Server." Read Chapter 18 to understand how the database servers are secured.

  • Read Chapter 7, "Building Secure Assemblies." The guidelines and recommendations in Chapter 7 for building secure assemblies and for developing secure managed code should also be applied to data access code.

  • Use the Assessing Chapters . To review the security of your data access at different stages of the product cycle, refer to the Web services sections in the following chapters: Chapter 5, "Architecture and Design Review for Security," Chapter 21, "Code Review," and Chapter 22, "Deployment Review."

  • Use the Checklist . "Checklist: Securing Data Access" in the Checklists section of this guide includes a checklist for easy reference. Use this task-based checklist as a summary of the recommendations in this chapter.




Improving Web Application Security. Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures
ISBN: 0735618429
EAN: 2147483647
Year: 2003
Pages: 613

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net