Low Price Guarantee
We Take School POs
Programming .Net Security: Writing Secure Applications Using C# or Visual Basic .Net
Contributor(s): Freeman, Adam (Author), Jones, Allen (Author)

View larger image

ISBN: 0596004427     ISBN-13: 9780596004422
Publisher: O'Reilly Media
Retail: $49.99OUR PRICE: $36.49  
  Buy 25 or more:OUR PRICE: $33.49   Save More!
  Buy 100 or more:OUR PRICE: $31.99   Save More!


  WE WILL NOT BE UNDERSOLD!   Click here for our low price guarantee

Binding Type: Paperback - See All Available Formats & Editions
Published: August 2003
Qty:

Annotation: With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, "Programming .NET Security shows you how the various tools will help you write secure applications.

The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With "Programming .NET Security, you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to:

use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs, from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data.

use COM+ component services in a secure manner

If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.

Authors Adam Freeman and Allen Jones, early .NET adoptersand long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.

Additional Information
BISAC Categories:
- Computers | Programming - Microsoft
- Computers | Security - Networking
- Computers | Networking - General
Dewey: 005.8
LCCN: 2004297357
Physical Information: 1.4" H x 6.9" W x 9.1" L (2.50 lbs) 714 pages
Features: Index, Price on Product
Review Citations: Scitech Book News 12/01/2004 pg. 153
 
Descriptions, Reviews, Etc.
Publisher Description:

With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security, you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to:

  • use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs, from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data.
  • use COM+ component services in a secure manner
If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an end-to-end security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.

Contributor Bio(s): Freeman, Adam: -

Adam Freeman is a professional programmer and the author of two early Java books, Programming the Internet with Java and Active Java, both published by Addison Wesley, as well as Java course materials. His recent experience architecting a green-field e-commerce platform has given him an in-depth understanding of the current security challenges facing those developing large scale distributed systems. Adam has previously worked for Netscape, Sun Microsystems and the NASDAQ stock exchange.

Jones, Allen: -

Allen Jones has been developing Windows solutions since 1990 and working with Windows NT and Win32 since 1993. He was one of the first MCSEs to qualify anywhere in the world. For the last 3 years, Allen has been developing e-commerce and security systems for large corporations and financial institutions. He is a former employee of Microsoft in both Australia and the UK and co-author, with Adam Freeman, of C# for Java Developers and .NET XML Web Services Step by Step, both from Microsoft Press.


 
Customer ReviewsSubmit your own review
 
To tell a friend about this book, you must Sign In First!