. NET development security solution Application Programming

Source: Internet
Author: User
Tags domain hosting
Work introduction:

The. NET Framework provides new and more effective methods to ensure the security of your Web applications and LAN-based applications. The book uses a large number of detailed sample code to help readers learn how to use the correct skills to handle the various situations most likely to encounter. I am not introducing security, instead, the content is organized in the form of "recipes", so that experienced programmers can easily cope with severe security challenges:
· Aware of and avoiding dangerous traps-including. NET Vulnerabilities
· Flexible use of role-based and code access security
· Maximize the security advantages of policies and code groups
· Use. NET encryption techniques to protect data
· Meet the most demanding LAN security requirements
· A comprehensive solution to special security issues related to Web and wireless applications
· Implement Win32 API security in managed applications
Readers will understand that human factors must be taken into account in every step of security, and will be familiar with various tools to develop powerful solutions that meet user needs and overcome their weaknesses.

File directory:

Article 1. NET Security
Chapter 2. NET Security
. NET Framework enhancement Overview
. NET security issues that cannot be blocked
. NET Framework security architecture considerations
Summary
Chapter 2. NET Framework Security Overview
Find the required security information
Learn more about System. Runtime. Remoting. Contexts namespaces.
Measure the test taker's knowledge about the System. Security namespace.
Understanding System. Security. Cryptography namespaces
Learn more about the Systern. Security. Permissions namespace
Understanding System. Security. Policy namespace
Learn more about Systern. Security. Principal namespace
Understand the System. Web. Security namespace
Understanding System. DirectoryServices namespaces
Summary
Chapter 1 Avoiding common errors and traps
Prevent data input errors
Block Buffer Overflow
Access Control
Eliminate standard representation issues
Summary

Article 2 desktop and LAN security
Chapter 2. NET role-based security technology
Measure the test taker's knowledge about the role-based security of. NET.
Use Permission viewing tools
Use the. NET Framework Configuration Tool
Define valid declarative Security
Define Valid Force security
Protect registry Security
Develop a Secure Desktop Application for Installation
Summary
Chapter 4 detailed policies and code groups
Use code access security policy tools
Use code group
Use Policy Object
Summary
Chapter 2 Confirmation and Verification
Ensures credibility in managed environments
Verification Code
Use AppDomain for managed code
Extends AppDomain to unmanaged code
Summary
Chapter 2. NET encryption technology
Manage Encryption Settings
Learn about supported encryption methods
Encrypt and decrypt files
Use System. Secudty. Cryptography. X509Certificates namespace
Use the hash function
Summary
Chapter 4 LAN security requirements
Use SOCKET
Understanding RPC Security
Use DCOM
Development-secure server application installation
Use COM +
Summary

Article 3 Web-based security
Chapter 2 Web server security
Keep the server secure
Manage servers
Avoids Distilbuted Denial Of Service (DDOS) attacks
Resolve apparent communication errors
Web application testing skills
Develop a secure Web application for Installation
Summary
Chapter 2 Web Data Security
Define database connection
Curb Information Leakage trends
Implement Data Encryption
Learn about remote communication and data encryption
Use SSL exchange certificate
Summary
Chapter 1 Security of XML and Web services
Protect Web Services
Use System. SecurityCryptography. Xml namespace
Use WS-Security
XACML)
Use the Visual Studio. NET Passport feature
Use the Web service features of COM + 1.5
Summary

Article 4 other security topics
Chapter 4 ActiveDirectory Security
Monitor Active Directory
Use Active Directory to replace the Registry
Understanding domain hosting relationships
Manage Directory Services
Summary
Chapter 2 wireless device security
. NET Compact Framework security considerations
Two environments of wireless programs
Effect of security policies on mobile apps
Component call limitations
Use the System. Web. Security namespace
Summary
Chapter 2 Win32 API Overview
Know when to use Win32 API
Learn more about Windows Security APIs
Consider Win32 API access
Use the ram Editor
Use Security Configuration Editor
Use SID
Directly access an ACE
Summary
Chapter 2 Win32API Advanced Technology
Use DACL
Use SACL
Protection controls and components
Protect files
Use the RegGetKeySecurity () and RegSetKeySecurity () Functions
Use Remote unmanaged Components
Summary
Vocabulary

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.