Flylib.com
.NET Security and Cryptography
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Peter Thorsteinson
,
G. Gnana Arun Ganesh
BUY ON AMAZON
Main Page
Table of content
Copyright
Integrated .NET Series from Object Innovations and Prentice Hall PTR
Preface
Organization
Sample Programs
Web Site
Acknowledgments
Peter Thorsteinson
G. Gnana Arun Ganesh
The Integrated .NET Series from Object Innovations and Prentice Hall PTR
Introduction
.NET Programming Books
.NET Applications and Technology
.NET Interoperability and Migration
Chapter One. .NET Cryptography and Security
The Nature of This Book
The Nature of Cryptography and Security
Windows Security Comes of Age
The .NET Framework and the CLR
.NET Cryptography Programming
.NET Security Programming
Summary
Chapter Two. Fundamentals of Cryptography
Security and Keeping Secrets
Steganography
Modern Ciphers
Cryptanalytic Attacks
Issues in Human Interaction and Trust
Summary
Chapter Three. Symmetric Cryptography
Symmetric Ciphers
Programming with .NET Symmetric Cryptography
Key Exchange Issues
Summary
Chapter Four. Asymmetric Cryptography
Problems with Symmetric Algorithms
The Idea Behind Asymmetric Cryptography
Existing Asymmetric Algorithms
RSA: The Most Used Asymmetric Algorithm
Caveat: Provability Issues
Programming with .NET Asymmetric Cryptography
Digital Certificates
Summary
Chapter Five. Digital Signatures
Hash Algorithms
How Digital Signatures Work
RSA Used as a Digital Signature Algorithm
The Digital Signature Algorithm
The Asymmetric AlgorithmHierarchy Class Hierarchy
Summary
Chapter Six. XML Cryptography
XML Encryption
XML Signatures
Combining XML Signing and XML Encryption
Summary
Chapter Seven. .NET User-Based Security
Authentication and Authorization
.NET Security Model
Administrating Windows Security
Administrating .NET Security
Permissions
User-Based Security
Two Approaches to User-Based Security
Credentials
Security Discipline
Summary
Chapter Eight. .NET Code Access Security
The Need for Code Access Security
Security, Managed Code, and the CLR
How CAS Is Used
Managing Security Policy with Code Groups
Imperative Versus Declarative CAS
Evidence-Based Security
Code Access Permissions
Declarative Code Access Permissions
Permission Requests
Permission Sets
Summary
Chapter Nine. ASP.NET Security
Fundamental Security Mechanisms
Implementing ASP.NET Authentication
ASP.NET Configuration
Forms Authentication
Forms Authentication Classes
Passport Authentication
Windows Authentication
Implementing ASP.NET Authorization
Implementing ASP.NET Impersonation
Summary
Chapter Ten. Web Services Security
Basic Techniques in Securing Web Services
Authenticate Web Service Using SOAPHEADER
Summary
Appendix A. A Security Attack Example: The Stack Overrun
Appendix B. How the RSA Cipher Works
Modular Arithmetic
The BigRSA Example Program
The CrackRSAWorkFactorDemo Example Program
Appendix C. Using the GNU GMP Library
Installing Cygwin
Testing Your Cygwin Installation
Installing GMP
Uninstalling Cygwin
Appendix D. Cryptography and Security Resources
Background Knowledge and Conceptual Books
Cryptographic Mathematics Books
Implementing Security Guide Books
Human Interest Books on Cryptography
Cryptography News Groups
Useful Cryptographic and Security Web Sites
Appendix E. Exploring Web Services
Motivation for Web Services
Web Services Definition
Backbones of Web Services
Next Generation of Distributed Computing: Web Services
Code Model for Web Services
Developing a Simple Concatenate Web Service
Protocols
Accessing a Web Service
Asynchronous Programming in Web Services
Creating an ASP.NET Calculator Web Service
Web Services Are Still Evolving
Summary
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Peter Thorsteinson
,
G. Gnana Arun Ganesh
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix C Using the Bouncy Castle API for Elliptic Curve
SQL Hacks
Hack 35. Tally Results into a Chart
Locking and Performance
Hack 85. Traverse a Simple Tree
Hack 91. Export and Import Table Definitions
Hack 95. Issue Automatic Updates
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Why Office Programming?
Working with the Workbook Object
Introduction to the Actions Pane
Deploying Policy to User Machines
An End-to-End Scenario
Java Concurrency in Practice
Summary
Other Liveness Hazards
Using Condition Queues
Hardware Support for Concurrency
The Java Memory Model
.NET-A Complete Development Cycle
Visual Studio.NET: Platform of Choice
The Photo Editor Application
Design of the Advanced GDI+ Extensions
Software Maintenance
Wrap-Up
Comparing, Designing, and Deploying VPNs
A Detailed Examination of MPLS Layer 3 VPNs
Deploying MPLS Layer 3 VPNs
Deploying Site-to-Site IPsec VPNs
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies