| | | Copyright |
| | | Integrated .NET Series from Object Innovations and Prentice Hall PTR |
| | | Preface |
| | | | Organization |
| | | | Sample Programs |
| | | | Web Site |
|
| | | Acknowledgments |
| | | | Peter Thorsteinson |
| | | | G. Gnana Arun Ganesh |
|
| | | The Integrated .NET Series from Object Innovations and Prentice Hall PTR |
| | | | Introduction |
| | | | .NET Programming Books |
| | | | .NET Applications and Technology |
| | | | .NET Interoperability and Migration |
|
| | | Chapter One. .NET Cryptography and Security |
| | | | The Nature of This Book |
| | | | The Nature of Cryptography and Security |
| | | | Windows Security Comes of Age |
| | | | The .NET Framework and the CLR |
| | | | .NET Cryptography Programming |
| | | | .NET Security Programming |
| | | | Summary |
|
| | | Chapter Two. Fundamentals of Cryptography |
| | | | Security and Keeping Secrets |
| | | | Steganography |
| | | | Modern Ciphers |
| | | | Cryptanalytic Attacks |
| | | | Issues in Human Interaction and Trust |
| | | | Summary |
|
| | | Chapter Three. Symmetric Cryptography |
| | | | Symmetric Ciphers |
| | | | Programming with .NET Symmetric Cryptography |
| | | | Key Exchange Issues |
| | | | Summary |
|
| | | Chapter Four. Asymmetric Cryptography |
| | | | Problems with Symmetric Algorithms |
| | | | The Idea Behind Asymmetric Cryptography |
| | | | Existing Asymmetric Algorithms |
| | | | RSA: The Most Used Asymmetric Algorithm |
| | | | Caveat: Provability Issues |
| | | | Programming with .NET Asymmetric Cryptography |
| | | | Digital Certificates |
| | | | Summary |
|
| | | Chapter Five. Digital Signatures |
| | | | Hash Algorithms |
| | | | How Digital Signatures Work |
| | | | RSA Used as a Digital Signature Algorithm |
| | | | The Digital Signature Algorithm |
| | | | The Asymmetric AlgorithmHierarchy Class Hierarchy |
| | | | Summary |
|
| | | Chapter Six. XML Cryptography |
| | | | XML Encryption |
| | | | XML Signatures |
| | | | Combining XML Signing and XML Encryption |
| | | | Summary |
|
| | | Chapter Seven. .NET User-Based Security |
| | | | Authentication and Authorization |
| | | | .NET Security Model |
| | | | Administrating Windows Security |
| | | | Administrating .NET Security |
| | | | Permissions |
| | | | User-Based Security |
| | | | Two Approaches to User-Based Security |
| | | | Credentials |
| | | | Security Discipline |
| | | | Summary |
|
| | | Chapter Eight. .NET Code Access Security |
| | | | The Need for Code Access Security |
| | | | Security, Managed Code, and the CLR |
| | | | How CAS Is Used |
| | | | Managing Security Policy with Code Groups |
| | | | Imperative Versus Declarative CAS |
| | | | Evidence-Based Security |
| | | | Code Access Permissions |
| | | | Declarative Code Access Permissions |
| | | | Permission Requests |
| | | | Permission Sets |
| | | | Summary |
|
| | | Chapter Nine. ASP.NET Security |
| | | | Fundamental Security Mechanisms |
| | | | Implementing ASP.NET Authentication |
| | | | ASP.NET Configuration |
| | | | Forms Authentication |
| | | | Forms Authentication Classes |
| | | | Passport Authentication |
| | | | Windows Authentication |
| | | | Implementing ASP.NET Authorization |
| | | | Implementing ASP.NET Impersonation |
| | | | Summary |
|
| | | Chapter Ten. Web Services Security |
| | | | Basic Techniques in Securing Web Services |
| | | | Authenticate Web Service Using SOAPHEADER |
| | | | Summary |
|
| | | Appendix A. A Security Attack Example: The Stack Overrun |
| | | Appendix B. How the RSA Cipher Works |
| | | | Modular Arithmetic |
| | | | The BigRSA Example Program |
| | | | The CrackRSAWorkFactorDemo Example Program |
|
| | | Appendix C. Using the GNU GMP Library |
| | | | Installing Cygwin |
| | | | Testing Your Cygwin Installation |
| | | | Installing GMP |
| | | | Uninstalling Cygwin |
|
| | | Appendix D. Cryptography and Security Resources |
| | | | Background Knowledge and Conceptual Books |
| | | | Cryptographic Mathematics Books |
| | | | Implementing Security Guide Books |
| | | | Human Interest Books on Cryptography |
| | | | Cryptography News Groups |
| | | | Useful Cryptographic and Security Web Sites |
|
| | | Appendix E. Exploring Web Services |
| | | | Motivation for Web Services |
| | | | Web Services Definition |
| | | | Backbones of Web Services |
| | | | Next Generation of Distributed Computing: Web Services |
| | | | Code Model for Web Services |
| | | | Developing a Simple Concatenate Web Service |
| | | | Protocols |
| | | | Accessing a Web Service |
| | | | Asynchronous Programming in Web Services |
| | | | Creating an ASP.NET Calculator Web Service |
| | | | Web Services Are Still Evolving |
| | | | Summary |
|