Flylib.com
List of Listings
Previous page
Table of content
Next page
Chapter 1: Understanding .NET Security
Listing 1.1 Using the IsInRole() Method
Listing 1.2 Relying on Imperative Security for File Security
Chapter 2: .NET Framework Security Overview
Listing 2.1 Three examples of the SynchronizationAttribute attribute
Listing 2.2 Obtaining information with the SecurityManager class
Listing 2.3 Encrypting and Decrypting a File Requires Similar Code
Listing 2.4 Accessing Active Directory
Listing 2.5 The Details Form Displays Individual User Information
Chapter 3: Avoiding Common Errors and Traps
Listing 3.1 Enumerating Discontinuous Data Ranges
Listing 3.2 Detecting and Handling Data Length Errors
Listing 3.3 Avoiding Unwanted Characters in Input
Chapter 4: .NET Role-Based Security Techniques
Listing 4.1 Discovering Code Group Membership
Listing 4.2 Getting a Permission List Using a Policy
Listing 4.3 Building Evidence to Obtain Permissions
Listing 4.4 Using Declarative Security Definitions
Listing 4.5 Implementing Code Access Security for the Registry
Listing 4.6 Signed Client Example Code
Listing 4.7 Using a Component Constructor to Check Credentials
Listing 4.8 Using Reflection to Obtain Evidence
Chapter 5: Policies and Code Groups in Detail
Listing 5.1 Permission XML File Example
Listing 5.2 Specialized Code Group Component
Listing 5.3 Alternative Code Group Component
Listing 5.4 Code Group Component Testing Example
Listing 5.5 A Typical Custom Permission Assembly
Listing 5.6 Declarative Security Addition
Listing 5.7 A Custom Permission Test Component
Listing 5.8 Custom Permission Test Application
Listing 5.9 XML Generator for a Custom Permission
Listing 5.10 Obtaining a Named Permission
Chapter 6: Validation and Verification Issues
Listing 6.1 Adding Security Checks to a Client
Listing 6.2 Using Multiple AppDomain Objects to Control Access
Listing 6.3 A Simple Test Application
Listing 6.4 Domain FriendlyName Detection Component
Listing 6.5 Creating a Component from an AppDomain Object
Listing 6.6 Calling External Functions
Listing 6.7 Accessing External Programs
Listing 6.8 Using the Process.Start() Method
Chapter 7: .NET Cryptographic Techniques
Listing 7.1: Mapping an Algorithm to a Class
Listing 7.2 Mapping an OID to a Class
Listing 7.3 Encrypting Data Using Symmetric Cryptography
Listing 7.4 Creating a Key Pair
Listing 7.5 Encrypting and Decrypting Data Using Asymmetric Cryptography
Listing 7.6 Generating a Key from a Password
Listing 7.7 Reading an X.509 Certificate
Chapter 8: LAN Security Requirements
Listing 8.1 Using the SocketPermission Class
Listing 8.2 Using the CredentialCache and NetworkCredential Classes
Listing 8.3 Using Attributes in a Managed Component
Listing 8.4 Safely Calling .NET Components from Unmanaged Code
Listing 8.5 Creating Math Function Methods for the COM+ Environment
Chapter 9: Web Server Security
Listing 9.1 Using the AuthenticationManager Class for Pre-Authentication
Listing 9.2 Accessing a Secured Web Source
Listing 9.3 Using a Performance Counter Approach for Detecting DDOS
Chapter 10: Web Data Security
Listing 10.1 Using Role-Based Security to Modify Page Rendering
Listing 10.2 Setting the SQL Server Password
Listing 10.3 Getting the Password
Listing 10.4 Simple Remoting Component Example
Listing 10.5 Simple Remoting Host Example
Listing 10.6 Typical Remoting Host Configuration File
Listing 10.7 Simple Remoting Client Example
Listing 10.8 Typical Remoting Host Configuration File
Listing 10.9 Obtaining Client Certificate Information
Chapter 11: Securing XML and Web Services
Listing 11.1 A Web Service Using Security Attributes
Listing 11.2 A Web Service Using Imperative Security
Listing 11.3 Using the DiscoveryClientProtocol Class
Listing 11.4 Signing and Verifying an XML File
Listing 11.5 Logging in with Passport
Listing 11.6 Displaying the Logged In Status
Listing 11.7 The SOAP Quick Test Application
Chapter 12: Active Directory Security
Listing 12.1 Using Win32 API Calls for the Domain Controller
Listing 12.2 Accessing Active Directory
Listing 12.3 The Details Form Displays Individual User Information
Chapter 13: Wireless Device Security
Listing 13.1 Application Security Technique
Listing 13.2 Tag Changes Based on Filter Settings
Listing 13.3 Using the DeviceSpecific Property
Listing 13.4 Accessing Web Services Using SOAP
Listing 13.5 Defining the Login Page
Listing 13.6 Modifying the Web.CONFIG File
Listing 13.7 Generating Forms Authentication Statistics
Chapter 14: Win32 API Overview
Listing 14.1 Using Unsafe Code in a C# Program
Listing 14.2 Converting a SID to Human Readable Form
Listing 14.3 Gaining Access to the ACEs Means Reading the ACL
Chapter 15: Win32 API Advanced Techniques
Listing 15.1 Obtaining Permission Information
Listing 15.2 Adding a SACL Entry to an Application
Listing 15.3 An Alternative Method for Setting Security
Listing 15.4 One Technique for Accessing File Security Information
Listing 15.5 Reading a Registry Entry
Previous page
Table of content
Next page
.NET Development Security Solutions
ISBN: 0782142664
EAN: 2147483647
Year: 2003
Pages: 168
Authors:
John Paul Mueller
BUY ON AMAZON
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Internet Security Systems RealSecure
Cisco Secure IDS
Policy and Procedures
Security Business Issues
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Reliable messaging
Agnostic services
The top-down strategy
Service-oriented architecture vs. Service-oriented environment
A.1. RailCo Ltd.
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
What Is SQL*Plus?
Grouping and Summarizing
Another Approach to Headers
The DESCRIBE Command
Synonyms
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Culture and Climate
Cultural Black Holes
The China Phenomenon
Appendix A Cultural Categorization Characteristics
MPLS Configuration on Cisco IOS Software
MPLS VPN Routing Model
Command Reference
Case Study-Hub and Spoke MPLS VPN Network with Sites Using Same AS Numbers
Command Reference
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
Digital Character Animation 3 (No. 3)
Chapter Three. Rigging Characters
Mesh Deformation
Other Techniques
Conclusion
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies