Flylib.com
Programming .Net Security
Programming .Net Security
ISBN: 0596004427
EAN: 2147483647
Year: 2005
Pages: 346
Authors:
Adam Freeman
,
Allen Jones
BUY ON AMAZON
Main Page
Table of content
Copyright
Dedication
Preface
How This Book Is Organized
Who Should Read This Book
Assumptions This Book Makes
Conventions Used in This Book
How to Contact Us
Part I: Fundamentals
Chapter 1. Security Fundamentals
1.1 The Need for Security
1.2 Roles in Security
1.3 Understanding Software Security
1.4 End-to-End Security
Chapter 2. Assemblies
2.1 Assemblies Explained
2.2 Creating Assemblies
2.3 Shared Assemblies
2.4 Strong Names
2.5 Publisher Certificates
2.6 Decompiling Explained
Chapter 3. Application Domains
3.1 Application Domains Explained
Chapter 4. The Lifetime of a Secure Application
4.1 Designing a Secure .NET Application
4.2 Developing a Secure .NET Application
4.3 Security Testing a .NET Application
4.4 Deploying a .NET Application
4.5 Executing a .NET Application
4.6 Monitoring a .NET Application
Part II: .NET Security
Chapter 5. Introduction to Runtime Security
5.1 Runtime Security Explained
5.2 Introducing Role-Based Security
5.3 Introducing Code-Access Security
5.4 Introducing Isolated Storage
Chapter 6. Evidence and Code Identity
6.1 Evidence Explained
6.2 Programming Evidence
6.3 Extending the .NET Framework
Chapter 7. Permissions
7.1 Permissions Explained
7.2 Programming Code-Access Security
7.3 Extending the .NET Framework
Chapter 8. Security Policy
8.1 Security Policy Explained
8.2 Programming Security Policy
8.3 Extending the .NET Framework
Chapter 9. Administering Code-Access Security
9.1 Default Security Policy
9.2 Inspecting Declarative Security Statements
9.3 Using the .NET Framework Configuration Tool
9.4 Using the Code-Access Security Policy Tool
Chapter 10. Role-Based Security
10.1 Role-Based Security Explained
10.2 Programming Role-Based Security
Chapter 11. Isolated Storage
11.1 Isolated Storage Explained
11.2 Programming Isolated Storage
11.3 Administering Isolated Storage
Part III: .NET Cryptography
Chapter 12. Introduction to Cryptography
12.1 Cryptography Explained
12.2 Cryptography Is Key Management
12.3 Cryptographic Attacks
Chapter 13. Hashing Algorithms
13.1 Hashing Algorithms Explained
13.2 Programming Hashing Algorithms
13.3 Keyed Hashing Algorithms Explained
13.4 Programming Keyed Hashing Algorithms
13.5 Extending the .NET Framework
Chapter 14. Symmetric Encryption
14.1 Encryption Revisited
14.2 Symmetric Encryption Explained
14.3 Programming Symmetrical Encryption
14.4 Extending the .NET Framework
Chapter 15. Asymmetric Encryption
15.1 Asymmetric Encryption Explained
15.2 Programming Asymmetrical Encryption
15.3 Extending the .NET Framework
Chapter 16. Digital Signatures
16.1 Digital Signatures Explained
16.2 Programming Digital Signatures
16.3 Programming XML Signatures
16.4 Extending the .NET Framework
Chapter 17. Cryptographic Keys
17.1 Cryptographic Keys Explained
17.2 Programming Cryptographic Keys
17.3 Extending the .NET Framework
Part IV: .NET Application Frameworks
Chapter 18. ASP.NET Application Security
18.1 ASP.NET Security Explained
18.2 Configuring the ASP.NET Worker Process Identity
18.3 Authentication
18.4 Authorization
18.5 Impersonation
18.6 ASP.NET and Code-Access Security
Chapter 19. COM Security
19.1 COM Security Explained
19.2 Programming COM Security
19.3 Administering COM Security
Chapter 20. The Event Log Service
20.1 The Event Log Service Explained
20.2 Programming the Event Log Service
Part V: API Quick Reference
Chapter 21. How to Use This Quick Reference
21.1 Finding a Quick-Reference Entry
21.2 Reading a Quick-Reference Entry
Chapter 22. Converting from C to VB Syntax
22.1 General Considerations
22.2 Classes
22.3 Structures
22.4 Interfaces
22.5 Class, Structure, and Interface Members
22.6 Delegates
22.7 Enumerations
Chapter 23. The System.Security Namespace
AllowPartiallyTrustedCallersAttribute
CodeAccessPermission
IEvidenceFactory
IPermission
ISecurityEncodable
ISecurityPolicyEncodable
IStackWalk
NamedPermissionSet
PermissionSet
PolicyLevelType
SecurityElement
SecurityException
SecurityManager
SecurityZone
SuppressUnmanagedCodeSecurityAttribute
UnverifiableCodeAttribute
VerificationException
XmlSyntaxException
Chapter 24. The System.Security.Cryptography Namespace
AsymmetricAlgorithm
AsymmetricKeyExchangeDeformatter
AsymmetricKeyExchangeFormatter
AsymmetricSignatureDeformatter
AsymmetricSignatureFormatter
CipherMode
CryptoAPITransform
CryptoConfig
CryptographicException
CryptographicUnexpectedOperationException
CryptoStream
CryptoStreamMode
CspParameters
CspProviderFlags
DeriveBytes
DES
DESCryptoServiceProvider
DSA
DSACryptoServiceProvider
DSAParameters
DSASignatureDeformatter
DSASignatureFormatter
FromBase64Transform
FromBase64TransformMode
HashAlgorithm
HMACSHA1
ICryptoTransform
KeyedHashAlgorithm
KeySizes
MACTripleDES
MaskGenerationMethod
MD5
MD5CryptoServiceProvider
PaddingMode
PasswordDeriveBytes
PKCS1MaskGenerationMethod
RandomNumberGenerator
RC2
RC2CryptoServiceProvider
Rijndael
RijndaelManaged
RNGCryptoServiceProvider
RSA
RSACryptoServiceProvider
RSAOAEPKeyExchangeDeformatter
RSAOAEPKeyExchangeFormatter
RSAParameters
RSAPKCS1KeyExchangeDeformatter
RSAPKCS1KeyExchangeFormatter
RSAPKCS1SignatureDeformatter
RSAPKCS1SignatureFormatter
SHA1
SHA1CryptoServiceProvider
SHA1Managed
SHA256
SHA256Managed
SHA384
SHA384Managed
SHA512
SHA512Managed
SignatureDescription
SymmetricAlgorithm
ToBase64Transform
TripleDES
TripleDESCryptoServiceProvider
Chapter 25. The System.Security.Cryptography.X509Certificates Namespace
X509Certificate
X509CertificateCollection
X509CertificateCollection.X509CertificateEnumerator
Chapter 26. The System.Security.Cryptography.Xml Namespace
DataObject
DSAKeyValue
KeyInfo
KeyInfoClause
KeyInfoName
KeyInfoNode
KeyInfoRetrievalMethod
KeyInfoX509Data
Reference
RSAKeyValue
Signature
SignedInfo
SignedXml
Transform
TransformChain
XmlDsigBase64Transform
XmlDsigC14NTransform
XmlDsigC14NWithCommentsTransform
XmlDsigEnvelopedSignatureTransform
XmlDsigXPathTransform
XmlDsigXsltTransform
Chapter 27. The System.Security.Permissions Namespace
CodeAccessSecurityAttribute
EnvironmentPermission
EnvironmentPermissionAccess
EnvironmentPermissionAttribute
FileDialogPermission
FileDialogPermissionAccess
FileDialogPermissionAttribute
FileIOPermission
FileIOPermissionAccess
FileIOPermissionAttribute
IsolatedStorageContainment
IsolatedStorageFilePermission
IsolatedStorageFilePermissionAttribute
IsolatedStoragePermission
IsolatedStoragePermissionAttribute
IUnrestrictedPermission
PermissionSetAttribute
PermissionState
PrincipalPermission
PrincipalPermissionAttribute
PublisherIdentityPermission
PublisherIdentityPermissionAttribute
ReflectionPermission
ReflectionPermissionAttribute
ReflectionPermissionFlag
RegistryPermission
RegistryPermissionAccess
RegistryPermissionAttribute
ResourcePermissionBase
ResourcePermissionBaseEntry
SecurityAction
SecurityAttribute
SecurityPermission
SecurityPermissionAttribute
SecurityPermissionFlag
SiteIdentityPermission
SiteIdentityPermissionAttribute
StrongNameIdentityPermission
StrongNameIdentityPermissionAttribute
StrongNamePublicKeyBlob
UIPermission
UIPermissionAttribute
UIPermissionClipboard
UIPermissionWindow
UrlIdentityPermission
UrlIdentityPermissionAttribute
ZoneIdentityPermission
ZoneIdentityPermissionAttribute
Chapter 28. The System.Security.Policy Namespace
AllMembershipCondition
ApplicationDirectory
ApplicationDirectoryMembershipCondition
CodeGroup
Evidence
FileCodeGroup
FirstMatchCodeGroup
Hash
HashMembershipCondition
IIdentityPermissionFactory
IMembershipCondition
NetCodeGroup
PermissionRequestEvidence
PolicyException
PolicyLevel
PolicyStatement
PolicyStatementAttribute
Publisher
PublisherMembershipCondition
Site
SiteMembershipCondition
StrongName
StrongNameMembershipCondition
UnionCodeGroup
Url
UrlMembershipCondition
Zone
ZoneMembershipCondition
Chapter 29. The System.Security.Principal Namespace
GenericIdentity
GenericPrincipal
IIdentity
IPrincipal
PrincipalPolicy
WindowsAccountType
WindowsBuiltInRole
WindowsIdentity
WindowsImpersonationContext
WindowsPrincipal
Colophon
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Programming .Net Security
ISBN: 0596004427
EAN: 2147483647
Year: 2005
Pages: 346
Authors:
Adam Freeman
,
Allen Jones
BUY ON AMAZON
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Presenting InfoPath 2003 SP-1
Formatting Forms
Validating Form Data
Connecting Forms to Databases
Designing InfoPath Web Service Clients
The Complete Cisco VPN Configuration Guide
Summary
Encryption
IPsec Traffic and Networks
Summary
PIX and ASA Feature and Product Overview
An Introduction to Design Patterns in C++ with Qt 4
Reference Variables
Processing Command-Line Arguments
Storage Class
Appendix C. The Development Environment
C++ References
Special Edition Using FileMaker 8
Working with Multiple Files
Showing/Hiding Layout Elements
Filtered Portals
Troubleshooting in Specific Areas: Performance, Context, Connectivity, and Globals
Publishing FileMaker Data as XML
Comparing, Designing, and Deploying VPNs
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Summary
Review Questions
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Understanding the Operation of SSL Remote Access VPNs
Understanding Digital Signal Processing (2nd Edition)
AN INTRODUCTION TO INFINITE IMPULSE RESPONSE FILTERS
FAST MULTIPLICATION OF COMPLEX NUMBERS
Section E.1. USING LOGARITHMS TO DETERMINE RELATIVE SIGNAL POWER
Section E.2. SOME USEFUL DECIBEL NUMBERS
Section G.4. MULTISECTION COMPLEX FSF FREQUENCY RESPONSE
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies