Commencez à lire Programming .NET Security sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
Programming .NET Security
Agrandissez cette image

Programming .NET Security [Format Kindle]

Adam Freeman , Allen Jones

Prix conseillé : EUR 30,89 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 43,22
Prix Kindle : EUR 21,62 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 21,60 (50%)


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 21,62  
Broché EUR 42,92  

Auteurs, publiez directement sur Kindle !

Via notre service de Publication Directe sur Kindle, publiez vous-même vos livres dans la boutique Kindle d'Amazon. C'est rapide, simple et totalement gratuit.

Descriptions du produit

Présentation de l'éditeur

With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security, you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to:

  • use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs , from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data.
  • use COM+ component services in a secure manner
If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 2786 KB
  • Nombre de pages de l'édition imprimée : 718 pages
  • Utilisation simultanée de l'appareil : Illimité
  • Editeur : O'Reilly Media; Édition : 1 (9 février 2009)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B0043EWTXA
  • Synthèse vocale : Activée
  • X-Ray :
  • Classement des meilleures ventes d'Amazon: n°462.433 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur (beta) 4.9 étoiles sur 5  8 commentaires
16 internautes sur 16 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 ALERT - This is a must have book!! 28 septembre 2003
Par Rex - Publié sur
You really are not a true .NET Programmer until you understand the security mechanisms that are part and parcel with the framework. To program in .NET (or really any component-oriented technology) without security in mind is like parachuting without one strapped to your back.
I was waiting for a book like this. Before this book I've had to scour over the internet to try to find out how to get the different areas of security in .NET to work. Now it's all here in one book. The theory, the explanations, the warnings, the samples. If you are a serious .NET programmer or .NET policy administrator then this is a must have book. If you don't know the difference between "host evidence" and "assembly evidence", then you need this book. If you don't know the difference between a "security demand" and a "permission request", then you are dangerous to the people you do work for.
Also, make sure you know the basics already of the language and the framework since this book assumes you do. Good luck.
13 internautes sur 13 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Best .NET security book I've seen 7 décembre 2003
Par ueberhund - Publié sur
While there is a lot of talk about .NET security, relatively little can be found in terms of documentation, which is one reason why this book is so refreshing. In addition to discussing some of the reasons behind certain security schemes, the theory is explained as well as the C# implementation. While there are some .NET specific security issues discussed (e.g. configuring worker processes), the section on cryptography should be required reading for everyone in the computer industry.
I get really excited about a book when it contains a lot of good information and I am able to actually use it to solve real-world problems. After reading this book, I was able to help solve a really tricky (and politically challenging) security issue quite quickly. If you have anything to do with your company's security systems or write any .NET code, I think this book deserves a place in your reference section. This is certainly the best book on .NET security I have read thus far.
10 internautes sur 11 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Required reading for .Net Programmers 30 septembre 2003
Par Stephen Northcutt - Publié sur
Some books are not going to be easy or approachable, one must already be familiar with either the C# and or Visual Basic language (the easy part) and the .NET programming enviornment to attempt this book. The authors are quick to jump from a discussion of the issues to meta code and sample code, but that is a feature, not a bug to the book's intended audience of very sharp, (as opposed to very basic), well educated coders. I would like to have seen more of an effort to discuss testing, validation and assessment, but at just under 700 pages this is a focused work and a serious coverage of the hooks that make it possible to secure .NET. (Of course that is assuming the underlying function calls are not riddled with buffer overflows and the like. Blaster on a .NET scale is a pretty scary prospect.)
The bottom line, we are awash in bad code and the vulnerabilities that result are the fundamental reason there are so many exploits. When you consider that in the scale of a federated system it is not a pretty thought. Someday there will be building codes for software, but in the meantime, if you are a responsible citizen of this planet and you are involved in .Net development, buy your coders this book. Invest the time to be able to quiz them and do so. Make sure they understand the issues, especially with Chapters 18 and 19, ASP.NET and COM+.
4 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Out-of-date but still useful 7 janvier 2013
Par Timmy_A - Publié sur
Format:Broché|Achat vérifié
Programming .NET Security covers 2 major topics of .NET Security: Code Access Security (CAS) and Cryptography. (CAS) was highly advertised feature of .NET when first editions of framework were released. Main goal of CAS was to provide highly configurable way how to protect your applications against malicious code. CAS as it was designed became quite complex and the book did a great job to explain how it works and how can be configured. Part 2 is mostly devoted into this technology. Unfortunately complexity of CAS forced Microsoft to change it substantially. Form .NET version 4.0 many parts of CAS are deprecated now. Especially Security Policy which was completely removed from the framework. So chapters 8 and 9 dealing about Security Policy are obsolete now. Chapter 6 Evidence and Code Identity is partly valid (Evidences are still part of .NET but because of Security Policy removal their importance is lower). Chapter 7 dealing with Permissions is mostly valid - just few methods of Permission class became obsolete. Chapters 10 and 11 (Role-Based Security, Isolated Storage) are completely valid in .NET 4.5 and provide good intro into these technologies.

Part 3 is all about Cryptography. This is the most useful part of the book covering Hashing, Symmetric and Asymmetric algorithms, Key exchange and Digital signatures. All cryptography classes presented in the book are part of latest edition of framework just few more algorithms have been added. Cryptography chapters are not useful just for their API coverage, but also because they provide excellent introduction to cryptography itself. Algorithms are presented in understandable way with nice, clean figures.

Part 4 is about security aspects of ASP.NET, COM+ and Log service. Honestly just last chapter (Log service) is useful. Coverage of ASP.NET and COM+ is just on very basic level and COM+ is now in fact dead technology. Last part is reference to all security-related classes. These chapters are not much useful. MSDN documentation is sufficient.

The book uses similar pattern in most chapters. First few pages in each one give you theoretical introduction into technology. After that, there is a presentation of corresponding .NET API and most chapters are finished with complete solution how to customize presented technology. For instance the book contains implementation of custom symmetric and asymmetric algorithms. This pattern is little bit 'dry' especially in Part 2 and 4 but very helpful in cryptography chapters where solid theoretical background is must before you can move to API.

So, I can say, that even 10 years after publication some parts of Programming .NET Security are still valuable. Especially part 3 Cryptography is perfectly valid in .NET 4.5. If you need to use cryptography in your projects, the book gives you great intro into it.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Suprising -- Great Book 20 janvier 2007
Par J. Carroll - Publié sur
When I first purchased this book, I was searching for material to shed light on the Win32 security model. After extracting what little information was available on the topic from this text, it made it's way to the book shelf.

Sometime later, I needed information on Code Access Security, and off the shelf it came. I later needed information on Assembly evidence, and down it came again. Next, was a need for .Net cryptographic and secure programing documentation -- it came down from the shelf and hasn't gone back again.

This is one of those books you need to live with for a time before you realize how great it is. I turn to it 2 or 3 times a week, and regularly carry it back and forth from the office. I've discovered embedded in it's pages are program perls, tips, and background information. It has become and invaluable refefence -- one I whole heartedly endorse.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique