Description

Book Synopsis
This is a comprehensive tutorial and reference that contains numerous practical examples using C# and VB.NET.

Table of Contents
Preface Part I. Fundamentals 1. Security Fundamentals The Need for Security Roles in Security Understanding Software Security End-to-End Security 2. Assemblies Assemblies Explained Creating Assemblies Shared Assemblies Strong Names Publisher Certificates Decompiling Explained 3. Application Domains Application Domains Explained 4. The Lifetime of a Secure Application Designing a Secure .NET Application Developing a Secure .NET Application Security Testing a .NET Application Deploying a .NET Application Executing a .NET Application Monitoring a .NET Application Part II. .NET Security 5. Introduction to Runtime Security Runtime Security Explained Introducing Role-Based Security Introducing Code-Access Security Introducing Isolated Storage 6. Evidence and Code Identity Evidence Explained Programming Evidence Extending the .NET Framework 7. Permissions Permissions Explained Programming Code-Access Security Extending the .NET Framework 8. Security Policy Security Policy Explained Programming Security Policy Extending the .NET Framework 9. Administering Code-Access Security Default Security Policy Inspecting Declarative Security Statements Using the .NET Framework Configuration Tool Using the Code-Access Security Policy Tool 10. Role-Based Security Role-Based Security Explained Programming Role-Based Security 11. Isolated Storage Isolated Storage Explained Programming Isolated Storage Administering Isolated Storage Part III. .NET Cryptography 12. Introduction to Cryptography Cryptography Explained Cryptography Is Key Management Cryptographic Attacks 13. Hashing Algorithms Hashing Algorithms Explained Programming Hashing Algorithms Keyed Hashing Algorithms Explained Programming Keyed Hashing Algorithms Extending the .NET Framework 14. Symmetric Encryption Encryption Revisited Symmetric Encryption Explained Programming Symmetrical Encryption Extending the .NET Framework 15. Asymmetric Encryption Asymmetric Encryption Explained Programming Asymmetrical Encryption Extending the .NET Framework 16. Digital Signatures Digital Signatures Explained Programming Digital Signatures Programming XML Signatures Extending the .NET Framework 17. Cryptographic Keys Cryptographic Keys Explained Programming Cryptographic Keys Extending the .NET Framework Part IV. .NET Application Frameworks 18. ASP.NET Application Security ASP.NET Security Explained Configuring the ASP.NET Worker Process Identity Authentication Authorization Impersonation ASP.NET and Code-Access Security 19. COM+ Security COM+ Security Explained Programming COM+ Security Administering COM+ Security 20. The Event Log Service The Event Log Service Explained Programming the Event Log Service Part V. API Quick Reference 21. How to Use This Quick Reference Finding a Quick-Reference Entry Reading a Quick-Reference Entry 22. Converting from C SHARP to VB Syntax General Considerations Classes Structures Interfaces Class, Structure, and Interface Members Delegates Enumerations 23. The System.Security Namespace 24. The System.Security.Cryptography Namespace 25. The System.Security.Cryptography.X509Certificates Namespace 26. The System.Security.Cryptography.Xml Namespace 27. The System.Security.Permissions Namespace 28. The System.Security.Policy Namespace 29. The System.Security.Principal Namespace Index

Programming NET Security

Product form

£29.99

Includes FREE delivery

RRP £39.99 – you save £10.00 (25%)

Order before 4pm tomorrow for delivery by Sat 17 Jan 2026.

A Paperback / softback by Adam Freeman

Out of stock


    View other formats and editions of Programming NET Security by Adam Freeman

    Publisher: O'Reilly Media
    Publication Date: 05/08/2003
    ISBN13: 9780596004422, 978-0596004422
    ISBN10: 0596004427
    Also in:
    Data encryption

    Description

    Book Synopsis
    This is a comprehensive tutorial and reference that contains numerous practical examples using C# and VB.NET.

    Table of Contents
    Preface Part I. Fundamentals 1. Security Fundamentals The Need for Security Roles in Security Understanding Software Security End-to-End Security 2. Assemblies Assemblies Explained Creating Assemblies Shared Assemblies Strong Names Publisher Certificates Decompiling Explained 3. Application Domains Application Domains Explained 4. The Lifetime of a Secure Application Designing a Secure .NET Application Developing a Secure .NET Application Security Testing a .NET Application Deploying a .NET Application Executing a .NET Application Monitoring a .NET Application Part II. .NET Security 5. Introduction to Runtime Security Runtime Security Explained Introducing Role-Based Security Introducing Code-Access Security Introducing Isolated Storage 6. Evidence and Code Identity Evidence Explained Programming Evidence Extending the .NET Framework 7. Permissions Permissions Explained Programming Code-Access Security Extending the .NET Framework 8. Security Policy Security Policy Explained Programming Security Policy Extending the .NET Framework 9. Administering Code-Access Security Default Security Policy Inspecting Declarative Security Statements Using the .NET Framework Configuration Tool Using the Code-Access Security Policy Tool 10. Role-Based Security Role-Based Security Explained Programming Role-Based Security 11. Isolated Storage Isolated Storage Explained Programming Isolated Storage Administering Isolated Storage Part III. .NET Cryptography 12. Introduction to Cryptography Cryptography Explained Cryptography Is Key Management Cryptographic Attacks 13. Hashing Algorithms Hashing Algorithms Explained Programming Hashing Algorithms Keyed Hashing Algorithms Explained Programming Keyed Hashing Algorithms Extending the .NET Framework 14. Symmetric Encryption Encryption Revisited Symmetric Encryption Explained Programming Symmetrical Encryption Extending the .NET Framework 15. Asymmetric Encryption Asymmetric Encryption Explained Programming Asymmetrical Encryption Extending the .NET Framework 16. Digital Signatures Digital Signatures Explained Programming Digital Signatures Programming XML Signatures Extending the .NET Framework 17. Cryptographic Keys Cryptographic Keys Explained Programming Cryptographic Keys Extending the .NET Framework Part IV. .NET Application Frameworks 18. ASP.NET Application Security ASP.NET Security Explained Configuring the ASP.NET Worker Process Identity Authentication Authorization Impersonation ASP.NET and Code-Access Security 19. COM+ Security COM+ Security Explained Programming COM+ Security Administering COM+ Security 20. The Event Log Service The Event Log Service Explained Programming the Event Log Service Part V. API Quick Reference 21. How to Use This Quick Reference Finding a Quick-Reference Entry Reading a Quick-Reference Entry 22. Converting from C SHARP to VB Syntax General Considerations Classes Structures Interfaces Class, Structure, and Interface Members Delegates Enumerations 23. The System.Security Namespace 24. The System.Security.Cryptography Namespace 25. The System.Security.Cryptography.X509Certificates Namespace 26. The System.Security.Cryptography.Xml Namespace 27. The System.Security.Permissions Namespace 28. The System.Security.Policy Namespace 29. The System.Security.Principal Namespace Index

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account