Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Table of Contents BackCover Security for Microsoft Visual Basic .NET Introduction
How to Use the Code Samples A Final Word Corrections, Comments, and Help Acknowledgments
Part I: Development Techniques
Chapter 1: Encryption
Practice Files Hash Digests Private Key Encryption Public Key Encryption Hiding Unnecessary Information Encryption in the Real World Summary
Chapter 2: Role-Based Authorization
Role-Based Authorization Exercise Windows Integrated Security ASP.NET Authentication and Authorization Role-Based Authorization in the Real World Summary
Chapter 3: Code-Access Security
How Actions Are Considered Safe or Unsafe What Prevents Harmful Code from Executing? It's On By Default Security Features and the Visual Basic .NET Developer Code-Access Security vs. Application Role-Based Security Run Your Code in Different Security Zones Code-Access Security in the Real World Summary
Chapter 4: ASP.NET Authentication
Employee ManagementWeb Practice Files Forms Authentication Windows Integrated Security Authentication Passport Authentication ASP.NET Authentication in the Real World Summary
Chapter 5: Securing Web Applications
Secure Sockets Layer Securing Web Services Implementing an Audit Trail Securing Web Applications in the Real World Summary
Part II: Ensuring Hack- Resistant Code
Chapter 6: Application Attacks and How to Avoid Them
Denial of Service Attacks File-Based or Directory-Based Attacks SQL-Injection Attacks Cross-Site Scripting Attacks Child-Application Attacks Guarding Against Attacks in the Real World Summary
Chapter 7: Validating Input
Working with Input Types and Validation Tools Summary
Chapter 8: Handling Exceptions
Where Exceptions Occur Exception Handling Global Exception Handlers Exception Handling in the Real World Summary
Chapter 9: Testing for Attack- Resistant Code
Plan of Attack - The Test Plan Attack - Execute the Plan Common Testing Mistakes Testing in the Real World Summary
Part III: Deployment and Configuration
Chapter 10: Securing Your Application for Deployment
Deployment Techniques Code-Access Security and Deployment Certificates and Signing Deploying .NET Security Policy Updates Protecting Your Code - Obfuscation Deployment Checklist Deployment in the Real World Summary
Chapter 11: Locking Down Windows, Internet Information Services, and .NET
" I'm Already Protected. I'm Using a Firewall. " Fundamental Lockdown Principles Automated Tools Locking Down Windows Clients Locking Down Windows Servers Locking Down IIS Locking Down .NET Summary
Chapter 12: Securing Databases
Core Database Security Concepts SQL Server Authentication SQL Server Authorization Microsoft Access Authentication and Authorization Locking Down Microsoft Access Locking Down SQL Server Summary
Part IV: Enterprise-Level Security
Chapter 13: Ten Steps to Designing a Secure Enterprise System
Design Challenges Step 1: Believe You Will Be Attacked Step 2: Design and Implement Security at the Beginning Step 3: Educate the Team Step 4: Design a Secure Architecture Step 5: Threat-Model the Vulnerabilities Step 6: Use Windows Security Features Step 7: Design for Simplicity and Usability Step 8: No Back Doors Step 9: Secure the Network with a Firewall Step 10: Design for Maintenance Summary
Chapter 14: Threats - Analyze, Prevent, Detect, and Respond
Analyze for Threats and Vulnerabilities Prevent Attacks by Mitigating Threats Detection Respond to an Attack Security Threats in the Real World Summary
Chapter 15: Threat Analysis Exercise
Analyze for Threats Respond to Threats Summary
Chapter 16: Future Trends
The Arms Race of Hacking What Happens Next? Responding to Security Threats Summary
Appendix A: Guide to the Code Samples
Employee Management System Employee Management Web Encryption Demo TogglePassport Environment utility Employee Database Structure Migrating the Employee Database to SQL Server 2000
Appendix B: Contents of SecurityLibrary.vb
Private Key Encryption DPAPI Encryption Public Key Encryption Logging Exceptions Role-Based Security Validating Input
Index
Index_A Index_B Index_C Index_D Index_E Index_F Index_G Index_H Index_I Index_J-K Index_L Index_M Index_N Index_O Index_P Index_Q-R Index_S Index_T Index_U Index_V Index_W Index_X Index_Z
List of Figures List of Tables List of Sidebars
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion