Flylib.com
.NET Security and Cryptography
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Peter Thorsteinson
,
G. Gnana Arun Ganesh
BUY ON AMAZON
Main Page
Table of content
Copyright
Integrated .NET Series from Object Innovations and Prentice Hall PTR
Preface
Organization
Sample Programs
Web Site
Acknowledgments
Peter Thorsteinson
G. Gnana Arun Ganesh
The Integrated .NET Series from Object Innovations and Prentice Hall PTR
Introduction
.NET Programming Books
.NET Applications and Technology
.NET Interoperability and Migration
Chapter One. .NET Cryptography and Security
The Nature of This Book
The Nature of Cryptography and Security
Windows Security Comes of Age
The .NET Framework and the CLR
.NET Cryptography Programming
.NET Security Programming
Summary
Chapter Two. Fundamentals of Cryptography
Security and Keeping Secrets
Steganography
Modern Ciphers
Cryptanalytic Attacks
Issues in Human Interaction and Trust
Summary
Chapter Three. Symmetric Cryptography
Symmetric Ciphers
Programming with .NET Symmetric Cryptography
Key Exchange Issues
Summary
Chapter Four. Asymmetric Cryptography
Problems with Symmetric Algorithms
The Idea Behind Asymmetric Cryptography
Existing Asymmetric Algorithms
RSA: The Most Used Asymmetric Algorithm
Caveat: Provability Issues
Programming with .NET Asymmetric Cryptography
Digital Certificates
Summary
Chapter Five. Digital Signatures
Hash Algorithms
How Digital Signatures Work
RSA Used as a Digital Signature Algorithm
The Digital Signature Algorithm
The Asymmetric AlgorithmHierarchy Class Hierarchy
Summary
Chapter Six. XML Cryptography
XML Encryption
XML Signatures
Combining XML Signing and XML Encryption
Summary
Chapter Seven. .NET User-Based Security
Authentication and Authorization
.NET Security Model
Administrating Windows Security
Administrating .NET Security
Permissions
User-Based Security
Two Approaches to User-Based Security
Credentials
Security Discipline
Summary
Chapter Eight. .NET Code Access Security
The Need for Code Access Security
Security, Managed Code, and the CLR
How CAS Is Used
Managing Security Policy with Code Groups
Imperative Versus Declarative CAS
Evidence-Based Security
Code Access Permissions
Declarative Code Access Permissions
Permission Requests
Permission Sets
Summary
Chapter Nine. ASP.NET Security
Fundamental Security Mechanisms
Implementing ASP.NET Authentication
ASP.NET Configuration
Forms Authentication
Forms Authentication Classes
Passport Authentication
Windows Authentication
Implementing ASP.NET Authorization
Implementing ASP.NET Impersonation
Summary
Chapter Ten. Web Services Security
Basic Techniques in Securing Web Services
Authenticate Web Service Using SOAPHEADER
Summary
Appendix A. A Security Attack Example: The Stack Overrun
Appendix B. How the RSA Cipher Works
Modular Arithmetic
The BigRSA Example Program
The CrackRSAWorkFactorDemo Example Program
Appendix C. Using the GNU GMP Library
Installing Cygwin
Testing Your Cygwin Installation
Installing GMP
Uninstalling Cygwin
Appendix D. Cryptography and Security Resources
Background Knowledge and Conceptual Books
Cryptographic Mathematics Books
Implementing Security Guide Books
Human Interest Books on Cryptography
Cryptography News Groups
Useful Cryptographic and Security Web Sites
Appendix E. Exploring Web Services
Motivation for Web Services
Web Services Definition
Backbones of Web Services
Next Generation of Distributed Computing: Web Services
Code Model for Web Services
Developing a Simple Concatenate Web Service
Protocols
Accessing a Web Service
Asynchronous Programming in Web Services
Creating an ASP.NET Calculator Web Service
Web Services Are Still Evolving
Summary
.NET Security and Cryptography
ISBN: 013100851X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
Peter Thorsteinson
,
G. Gnana Arun Ganesh
BUY ON AMAZON
Java I/O
Print Versus Write
Formattable
Compaction
Duplication
Describing Devices
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Client 2An Interactive Query Processor
Localization
Requirements
Changing the Cluster Topology (Re-mastering and Failover)
Using Full-text Search
Competency-Based Human Resource Management
An Overview of Competency-Based HR Management Practices
Competency-Based HR Planning
Competency-Based Employee Training
Competency-Based Employee Rewards
Appendix D Employee Development and Succession Management
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Orchestration service layer
Service layer configuration scenarios
SOA Delivery Strategies
SOAP language basics
Considerations for choosing SOA extensions
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 340 Underground Feeder and Branch-Circuit Cable Type UF
Article 404: Switches
Annex C. Conduit and Tubing Fill Tables for Conductors and Fixture Wires of the Same Size
Example No. D5(b) Optional Calculation for Multifamily Dwelling Served at 208Y/120 Volts, Three Phase
Example No. D8 Motor Circuit Conductors, Overload Protection, and Short-Circuit and Ground-Fault Protection
Special Edition Using Crystal Reports 10
Using the Formula Workshop
Using the Workshop Formula Editor
Custom Calculations and Advanced Data Analysis
Introducing the Crystal Enterprise Ad-Hoc Reporting Application
Scheduling Reports
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies