We Need Diverse Ya Sale
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Q&A | June 5, 2015

    Chip Kidd: IMG Powell's Q&A: Chip Kidd



    Describe your latest book. Judge This is a book that evolved out of discussions with the TED Books team, chiefly my editor Michelle Quint. It is a... Continue »
    1. $11.89 Sale Hardcover add to wish list

      Judge This

      Chip Kidd 9781476784786

    spacer

This item may be
out of stock.

Click on the button below to search for this title in other formats.


Check for Availability
Add to Wishlist

Building Secure Microsoft ASP.Net Applications (Pro-Developer)

Building Secure Microsoft ASP.Net Applications (Pro-Developer) Cover

 

Synopses & Reviews

Publisher Comments:

Building secure distributed Web applications can be challenging. It usually involves integrating several different technologies and products—yet your complete application will only be as secure as its weakest link. This guide presents a practical, scenario-driven approach to designing and building security-enhanced ASP.NET applications for Microsoft Windows 2000 and version 1.1 of the Microsoft .NET Framework. It focuses on the key elements of authentication, authorization, and secure communication within and across the tiers of distributed .NET Web applications.
This guide focuses on:
  • Authentication—to identify the clients of your application
  • Authorization—to provide access controls for those clients
  • Secure communication—to help ensure that messages remain private and are not altered by unauthorized parties

Who should read this guide:
Middleware developers and architects who build or plan to build .NET Web applications using ASP.NET, XML Web Services, Enterprise Services (COM+), .NET Remoting, or Microsoft ADO.NET
About “Patterns and Practices”:
Patterns & Practices contain specific recommendations illustrating how to design, build, deploy, and operate architecturally sound solutions to challenging business and technical scenarios. The technical guidance is reviewed and approved by Microsoft engineering teams, consultants, and Product Support Services, and by partners and customers.
Note: Includes complete sample on the Web.

Synopsis:

This title presents a scenario-based approach to designing and building secure applications that are based on ASP.NET technology. It identifies exactly where and how developers should perform authentication and authorization, and it demonstrates both how and when to use security techniques in establishing communication within and across the tiers of distributed Microsoft .NET Web applications. (Computer Books - Languages/Programming)

Synopsis:

Building secure distributed Web applications can be challenging. It usually involves integrating several different technologies and products--yet your complete application will only be as secure as its weakest link. This guide presents a practical, scenario-driven approach to designing and building security-enhanced ASP.NET applications for Microsoft(R) Windows(R) 2000 and version 1.1 of the Microsoft .NET Framework. It focuses on the key elements of authentication, authorization, and secure communication within and across the tiers of distributed .NET Web applications.

This guide focuses on: Authentication--to identify the clients of your application Authorization--to provide access controls for those clients Secure communication--to help ensure that messages remain private and are not altered by unauthorized parties

Who should read this guide:

Middleware developers and architects who build or plan to build .NET Web applications using ASP.NET, XML Web Services, Enterprise Services (COM+), .NET Remoting, or Microsoft ADO.NET

About Patterns and Practices:

Patterns & Practices contain specific recommendations illustrating how to design, build, deploy, and operate architecturally sound solutions to challenging business and technical scenarios. The technical guidance is reviewed and approved by Microsoft engineering teams, consultants, and Product Support Services, and by partners and customers.

Note: Includes complete sample on the Web.

About the Author

Founded in 1975, Microsoft is the worldwide leader in software, services, and solutions that help people and businesses realize their full potential. Since 1988, Microsoft has been building accessibility options right into its products to enable everyone to personalize their PCs to make them easier and more comfortable to see, hear, and use.

Table of Contents

AcknowledgementsPrefaceChapter 1: IntroductionChapter 2: Security Model for ASP.NET ApplicationsChapter 3: Authentication and Authorization DesignChapter 4: Secure CommunicationChapter 5: Intranet SecurityChapter 6: Extranet SecurityChapter 7: Internet SecurityChapter 8: ASP.NET SecurityChapter 9: Enterprise Services SecurityChapter 10: Web Services SecurityChapter 11: .NET Remoting SecurityChapter 12: Data Access SecurityChapter 13: Troubleshooting Security IssuesAppendix : Index of How TosAppendix : How To: Create a Custom Account to Run ASP.NETAppendix : How To: Use Forms Authentication with Active DirectoryAppendix : How To: Use Forms Authentication with SQL Server 2000Appendix : How To: Create GenericPrincipal Objects with Forms AuthenticationAppendix : How To: Implement Kerberos Delegation for Windows 2000Appendix : How To: Implement IPrincipalAppendix : How To: Create a DPAPI LibraryAppendix : How To: Use DPAPI (Machine Store) from ASP.NETAppendix : How To: Use DPAPI (User Store) from ASP.NET with Enterprise ServicesAppendix : How To: Create an Encryption LibraryAppendix : How To: Store an Encrypted Connection String in the RegistryAppendix : How To: Use Role-based Security with Enterprise ServicesAppendix : How To: Call a Web Service Using Client Certificates from ASP.NETAppendix : How To: Call a Web Service Using SSLAppendix : How To: Host a Remote Object in a Windows ServiceAppendix : How To: Set Up SSL on a Web ServerAppendix : How To: Set Up Client CertificatesAppendix : How To: Use IPSec to Provide Secure Communication Between Two ServersAppendix : How To: Use SSL to Secure Communication with SQL Server 2000Appendix : Base ConfigurationAppendix : Configuration Stores and ToolsAppendix : Reference HubAppendix : How Does It Work?Appendix : ASP.NET Identity MatrixAppendix : Cryptography and CertificatesAppendix : .NET Web Application SecurityGlossaryAppendix : Microsoft® patterns & practices

Product Details

ISBN:
9780735618909
Publisher:
Microsoft Press
Location:
Redmond, Wash.
Author:
Voeller Bird, Danielle
Author:
Microsoft Corporation, CJ
Author:
Microsoft Corporation
Author:
CJ Microsoft Corporation
Author:
Bird, Drew
Subject:
Programming - General
Subject:
Design
Subject:
Web sites
Subject:
Web site development
Subject:
Active server pages
Subject:
Microsoft .NET
Subject:
Web sites -- Design.
Subject:
Software Engineering - Programming and Languages
Subject:
Internet - General
Copyright:
Edition Description:
Trade Paper
Series:
Developer Reference
Series Volume:
158
Publication Date:
20030122
Binding:
Paperback
Language:
English
Illustrations:
Yes
Pages:
624
Dimensions:
9 x 7.38 x 1.33 in 2.32 lb

Related Subjects

Computers and Internet » Internet » Active Server Pages
Computers and Internet » Software Engineering » Programming and Languages

Building Secure Microsoft ASP.Net Applications (Pro-Developer)
0 stars - 0 reviews
$ In Stock
Product details 624 pages Microsoft Press - English 9780735618909 Reviews:
"Synopsis" by ,
This title presents a scenario-based approach to designing and building secure applications that are based on ASP.NET technology. It identifies exactly where and how developers should perform authentication and authorization, and it demonstrates both how and when to use security techniques in establishing communication within and across the tiers of distributed Microsoft .NET Web applications. (Computer Books - Languages/Programming)
"Synopsis" by , Building secure distributed Web applications can be challenging. It usually involves integrating several different technologies and products--yet your complete application will only be as secure as its weakest link. This guide presents a practical, scenario-driven approach to designing and building security-enhanced ASP.NET applications for Microsoft(R) Windows(R) 2000 and version 1.1 of the Microsoft .NET Framework. It focuses on the key elements of authentication, authorization, and secure communication within and across the tiers of distributed .NET Web applications.

This guide focuses on: Authentication--to identify the clients of your application Authorization--to provide access controls for those clients Secure communication--to help ensure that messages remain private and are not altered by unauthorized parties

Who should read this guide:

Middleware developers and architects who build or plan to build .NET Web applications using ASP.NET, XML Web Services, Enterprise Services (COM+), .NET Remoting, or Microsoft ADO.NET

About Patterns and Practices:

Patterns & Practices contain specific recommendations illustrating how to design, build, deploy, and operate architecturally sound solutions to challenging business and technical scenarios. The technical guidance is reviewed and approved by Microsoft engineering teams, consultants, and Product Support Services, and by partners and customers.

Note: Includes complete sample on the Web.

spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.