Books & Videos

Table of Contents

  1. Fundamentals

    1. Chapter 1 Security Fundamentals

      1. The Need for Security
      2. Roles in Security
      3. Understanding Software Security
      4. End-to-End Security
    2. Chapter 2 Assemblies

      1. Assemblies Explained
      2. Creating Assemblies
      3. Shared Assemblies
      4. Strong Names
      5. Publisher Certificates
      6. Decompiling Explained
    3. Chapter 3 Application Domains

      1. Application Domains Explained
    4. Chapter 4 The Lifetime of a Secure Application

      1. Designing a Secure .NET Application
      2. Developing a Secure .NET Application
      3. Security Testing a .NET Application
      4. Deploying a .NET Application
      5. Executing a .NET Application
      6. Monitoring a .NET Application
  2. .NET Security

    1. Chapter 5 Introduction to Runtime Security

      1. Runtime Security Explained
      2. Introducing Role-Based Security
      3. Introducing Code-Access Security
      4. Introducing Isolated Storage
    2. Chapter 6 Evidence and Code Identity

      1. Evidence Explained
      2. Programming Evidence
      3. Extending the .NET Framework
    3. Chapter 7 Permissions

      1. Permissions Explained
      2. Programming Code-Access Security
      3. Extending the .NET Framework
    4. Chapter 8 Security Policy

      1. Security Policy Explained
      2. Programming Security Policy
      3. Extending the .NET Framework
    5. Chapter 9 Administering Code-Access Security

      1. Default Security Policy
      2. Inspecting Declarative Security Statements
      3. Using the .NET Framework Configuration Tool
      4. Using the Code-Access Security Policy Tool
    6. Chapter 10 Role-Based Security

      1. Role-Based Security Explained
      2. Programming Role-Based Security
    7. Chapter 11 Isolated Storage

      1. Isolated Storage Explained
      2. Programming Isolated Storage
      3. Administering Isolated Storage
  3. .NET Cryptography

    1. Chapter 12 Introduction to Cryptography

      1. Cryptography Explained
      2. Cryptography Is Key Management
      3. Cryptographic Attacks
    2. Chapter 13 Hashing Algorithms

      1. Hashing Algorithms Explained
      2. Programming Hashing Algorithms
      3. Keyed Hashing Algorithms Explained
      4. Programming Keyed Hashing Algorithms
      5. Extending the .NET Framework
    3. Chapter 14 Symmetric Encryption

      1. Encryption Revisited
      2. Symmetric Encryption Explained
      3. Programming Symmetrical Encryption
      4. Extending the .NET Framework
    4. Chapter 15 Asymmetric Encryption

      1. Asymmetric Encryption Explained
      2. Programming Asymmetrical Encryption
      3. Extending the .NET Framework
    5. Chapter 16 Digital Signatures

      1. Digital Signatures Explained
      2. Programming Digital Signatures
      3. Programming XML Signatures
      4. Extending the .NET Framework
    6. Chapter 17 Cryptographic Keys

      1. Cryptographic Keys Explained
      2. Programming Cryptographic Keys
      3. Extending the .NET Framework
  4. .NET Application Frameworks

    1. Chapter 18 ASP.NET Application Security

      1. ASP.NET Security Explained
      2. Configuring the ASP.NET Worker Process Identity
      3. Authentication
      4. Authorization
      5. Impersonation
      6. ASP.NET and Code-Access Security
    2. Chapter 19 COM+ Security

      1. COM+ Security Explained
      2. Programming COM+ Security
      3. Administering COM+ Security
    3. Chapter 20 The Event Log Service

      1. The Event Log Service Explained
      2. Programming the Event Log Service
  5. API Quick Reference

    1. Chapter 21 How to Use This Quick Reference

      1. Finding a Quick-Reference Entry
      2. Reading a Quick-Reference Entry
    2. Chapter 22 Converting from C# to VB Syntax

      1. General Considerations
      2. Classes
      3. Structures
      4. Interfaces
      5. Class, Structure, and Interface Members
      6. Delegates
      7. Enumerations
    3. Chapter 23 The System.Security Namespace

    4. Chapter 24 The System.Security.Cryptography Namespace

    5. Chapter 25 The System.Security.Cryptography.X509Certificates Namespace

    6. Chapter 26 The System.Security.Cryptography.Xml Namespace

    7. Chapter 27 The System.Security.Permissions Namespace

    8. Chapter 28 The System.Security.Policy Namespace

    9. Chapter 29 The System.Security.Principal Namespace

  1. Colophon