
.NET Security and Cryptography
by Thorsteinson, Peter; Ganesh, G. Gnana ArunRent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
Summary
Author Biography
Table of Contents
Preface | p. xiii |
Acknowledgments | p. xvii |
About This Series | p. xviii |
.NET Cryptography and Security | p. 1 |
The Nature of This Book | p. 2 |
The Nature of Cryptography and Security | p. 5 |
Windows Security Comes of Age | p. 12 |
The .NET Framework and the CLR | p. 14 |
.NET Cryptography Programming | p. 17 |
.NET Security Programming | p. 18 |
Summary | p. 19 |
Fundamentals of Cryptography | p. 21 |
Security and Keeping Secrets | p. 22 |
Steganography | p. 47 |
Modern Ciphers | p. 49 |
Cryptanalytic Attacks | p. 60 |
Issues in Human Interaction and Trust | p. 61 |
Summary | p. 63 |
Symmetric Cryptography | p. 65 |
Symmetric Ciphers | p. 65 |
Programming with .NET Symmetric Cryptography | p. 79 |
Key Exchange Issues | p. 92 |
Summary | p. 98 |
Asymmetric Cryptography | p. 99 |
Problems with Symmetric Algorithms | p. 99 |
The Idea Behind Asymmetric Cryptography | p. 102 |
Existing Asymmetric Algorithms | p. 108 |
RSA: The Most Used Asymmetric Algorithm | p. 109 |
Caveat: Provability Issues | p. 113 |
Programming with .NET Asymmetric Cryptography | p. 114 |
Digital Certificates | p. 124 |
Summary | p. 125 |
Digital Signatures | p. 127 |
Hash Algorithms | p. 127 |
How Digital Signatures Work | p. 135 |
RSA Used as a Digital Signature Algorithm | p. 137 |
The Digital Signature Algorithm | p. 141 |
The Asymmetric AlgorithmHierarchy Class Hierarchy | p. 147 |
Summary | p. 152 |
XML Cryptography | p. 153 |
XML Encryption | p. 154 |
XML Signatures | p. 178 |
Combining XML Signing and XML Encryption | p. 190 |
Summary | p. 191 |
.NET User-Based Security | p. 193 |
Authentication and Authorization | p. 194 |
.NET Security Model | p. 195 |
Administrating Windows Security | p. 196 |
Administrating .NET Security | p. 201 |
Permissions | p. 202 |
User-Based Security | p. 208 |
Two Approaches to User-Based Security | p. 218 |
Credentials | p. 226 |
Security Discipline | p. 228 |
Summary | p. 228 |
NET Code Access Security | p. 229 |
The Need for Code Access Security | p. 229 |
Security, Managed Code, and the CLR | p. 235 |
How CAS Is Used | p. 237 |
Managing Security Policy with Code Groups | p. 239 |
Imperative Versus Declarative CAS | p. 257 |
Evidence-Based Security | p. 258 |
Code Access Permissions | p. 271 |
Declarative Code Access Permissions | p. 284 |
Permission Requests | p. 287 |
Permission Sets | p. 289 |
Summary | p. 300 |
ASP.NET Security | p. 301 |
Fundamental Security Mechanisms | p. 302 |
Implementing ASP.NET Authentication | p. 303 |
ASP.NET Configuration | p. 304 |
Forms Authentication | p. 312 |
Forms Authentication Classes | p. 322 |
Passport Authentication | p. 325 |
Implementing ASP.NET Authorization | p. 336 |
Implementing ASP.NET Impersonation | p. 339 |
Summary | p. 339 |
Web Services Security | p. 341 |
Basic Techniques in Securing Web Services | p. 342 |
Authenticate Web Service Using Soapheader | p. 350 |
Summary | p. 379 |
A Security Attack Example: The Stack Overrun | p. 381 |
How the RSA Cipher Works | p. 387 |
Modular Arithmetic | p. 387 |
The BigRSA Example Program | p. 388 |
The CrackRSAWorkFactorDemo Example Program | p. 391 |
Using the GNU GMP Library | p. 395 |
Installing Cygwin | p. 395 |
Testing Your Cygwin Installation | p. 401 |
Installing GMP | p. 403 |
Uninstalling Cygwin | p. 406 |
Cryptography and Security Resources | p. 407 |
Background Knowledge and Conceptual Books | p. 407 |
Cryptographic Mathematics Books | p. 408 |
Implementing Security Guide Books | p. 409 |
Human Interest Books on Cryptography | p. 410 |
Cryptography News Groups | p. 410 |
Useful Cryptographic and Security Web Sites | p. 411 |
Exploring Web Services | p. 413 |
Motivation for Web Services | p. 414 |
Web Services Definition | p. 415 |
Backbones of Web Services | p. 415 |
Next Generation of Distributed Computing: Web Services | p. 416 |
Code Model for Web Services | p. 420 |
Developing a Simple Concatenate Web Service | p. 420 |
Protocols | p. 433 |
Accessing a Web Service | p. 434 |
Asynchronous Programming in Web Services | p. 437 |
Creating an ASP.NET Calculator Web Service | p. 438 |
Web Services Are Still Evolving | p. 442 |
Summary | p. 442 |
Index | p. 443 |
Table of Contents provided by Ingram. All Rights Reserved. |
Excerpts
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.