|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm54116506 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
040130s2003 caua ob 001 0 eng d |
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d UMC
|d CEF
|d OCLCQ
|d CUSER
|d OCLCE
|d VLB
|d AZU
|d NHM
|d N$T
|d EBLCP
|d OCLCQ
|d OCLCO
|d OCLCF
|d DEBSZ
|d OCLCQ
|d OCLCA
|d OCLCQ
|d IDEBK
|d OCLCO
|d YDXCP
|d OCLCQ
|d E7B
|d OCLCQ
|d OCL
|d COO
|d FEM
|d OCLCQ
|d OCLCA
|d OCL
|d WYU
|d VT2
|d OCLCQ
|d UAB
|d CNCEN
|d RDF
|d UKAHL
|d UKBTH
|d TOH
|d CZL
|d INARC
|d OCLCO
|d FZL
|d OCLCQ
|d TAC
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBA3Y1018
|2 bnb
|
019 |
|
|
|a 326797355
|a 606988928
|a 607801891
|a 729549165
|a 748105376
|a 759520849
|a 774401985
|a 809686363
|a 861530413
|a 966184242
|a 968113229
|a 968994013
|a 1056349483
|a 1060864210
|a 1062910296
|a 1100901370
|a 1103265160
|a 1104494032
|a 1159638464
|a 1202552736
|a 1224592769
|a 1240530320
|a 1256488293
|a 1295603551
|a 1351580085
|a 1355687130
|a 1380767336
|
020 |
|
|
|a 9780596516536
|q (electronic bk.)
|
020 |
|
|
|a 0596516533
|q (electronic bk.)
|
020 |
|
|
|a 9780596552275
|
020 |
|
|
|a 0596552270
|
020 |
|
|
|z 0596004427
|q (pbk.)
|
020 |
|
|
|z 9780596004422
|q (pbk.)
|
024 |
8 |
|
|a 0596004427
|
029 |
1 |
|
|a AU@
|b 000054925423
|
029 |
1 |
|
|a AU@
|b 000066233211
|
029 |
1 |
|
|a AU@
|b 000067099848
|
029 |
1 |
|
|a AU@
|b 000069242444
|
029 |
1 |
|
|a DEBSZ
|b 396386423
|
035 |
|
|
|a (OCoLC)54116506
|z (OCoLC)326797355
|z (OCoLC)606988928
|z (OCoLC)607801891
|z (OCoLC)729549165
|z (OCoLC)748105376
|z (OCoLC)759520849
|z (OCoLC)774401985
|z (OCoLC)809686363
|z (OCoLC)861530413
|z (OCoLC)966184242
|z (OCoLC)968113229
|z (OCoLC)968994013
|z (OCoLC)1056349483
|z (OCoLC)1060864210
|z (OCoLC)1062910296
|z (OCoLC)1100901370
|z (OCoLC)1103265160
|z (OCoLC)1104494032
|z (OCoLC)1159638464
|z (OCoLC)1202552736
|z (OCoLC)1224592769
|z (OCoLC)1240530320
|z (OCoLC)1256488293
|z (OCoLC)1295603551
|z (OCoLC)1351580085
|z (OCoLC)1355687130
|z (OCoLC)1380767336
|
037 |
|
|
|a 3457947503125216241
|b TotalBoox
|f Ebook only
|n www.totalboox.com
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK5105.59
|b .F68 2003
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Freeman, Adam.
|
245 |
1 |
0 |
|a Programming .NET security /
|c Adam Freeman and Allen Jones.
|
260 |
|
|
|a Sebastopol, CA ;
|a Farnham :
|b O'Reilly,
|c 2003.
|
300 |
|
|
|a 1 online resource (xviii, 693 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a "Writing secure applications using C♯ or Visual Basic .NET"--Cover
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
520 |
|
|
|a With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications. The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C♯ and VB.NET languages. With Programming .NET Security, you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to: use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs, from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data. use COM+ component services in a secure mannerIf you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution. Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be
|
542 |
|
|
|f Copyright © O'Reilly Media, Incorporated
|g 2003
|
505 |
0 |
|
|a Programming .NET Security; Part II: .NET Security; Part III: .NET Cryptography; Part IV: .NET Applications Frameworks; Part V: API Quick Reference; Who Should Read This Book; Assumptions This Book Makes; Conventions Used in This Book; How to Contact Us; I. Fundamentals; 1.2. Roles in Security; 1.2.2. The Architect; 1.2.3. The Programmer; 1.2.4. The Security Tester; 1.2.5. The System Administrator; 1.2.6. The User; 1.2.7. The Hacker/Cracker; 1.3. Understanding Software Security; 1.3.2. Trust; 1.3.3. Secrets; 1.3.3.2. Protecting secrets; 1.4. End-to-End Security; 1.4.2. Side Channels
|
505 |
8 |
|
|a 1.4.3. Physical Security1.4.4. Third-Party Software; 2. Assemblies; 2.2. Creating Assemblies; 2.2.2. Creating a Multifile Assembly; 2.3. Shared Assemblies; 2.4. Strong Names; 2.4.2. Creating an Assembly Strong Name; 2.4.2.2. Specifying the key pair; 2.4.2.3. Creating the strong name; 2.4.2.4. Creating a strong name for a multifile assembly; 2.4.3. Delayed Signing; 2.4.4. Verifying a Strong Name; 2.5. Publisher Certificates; 2.6. Decompiling Explained; 2.6.2. Protecting Against Decompilation; 2.6.2.2. Native compilation; 3. Application Domains; 3.1.2. Application Domain and Assembly Management
|
505 |
8 |
|
|a 3.1.3. Assembly Isolation with Application Domains3.1.4. Application Domains and Runtime Security; 3.1.4.2. Application domain evidence and identity; 3.1.4.3. Application domains and security policy; 3.1.4.4. Role-based security; 3.1.4.5. Application domains and isolated storage; 3.1.5. Application Domains and Application Configuration; 4. The Lifetime of a Secure Application; 4.1.2. Identifying Trust; 4.1.3. Identifying Secrets; 4.1.4. Failing Gracefully; 4.2. Developing a Secure .NET Application; 4.3. Security Testing a .NET Application; 4.4. Deploying a .NET Application
|
505 |
8 |
|
|a 4.5. Executing a .NET Application4.6. Monitoring a .NET Application; II. .NET Security; 5.2. Introducing Role-Based Security; 5.3. Introducing Code-Access Security; 5.3.2. Windows Security and Code-Access Security; 5.4. Introducing Isolated Storage; 6. Evidence and Code Identity; 6.1.1.2. Assembly evidence; 6.2. Programming Evidence; 6.2.2. Using the Evidence Class; 6.2.3. Using the Standard Evidence Classes; 6.2.3.2. The Hash class; 6.2.3.3. The Publisher class; 6.2.3.4. The Site class; 6.2.3.5. The StrongName class; 6.2.3.6. The Url class; 6.2.3.7. The Zone class; 6.2.4. Viewing Evidence
|
505 |
8 |
|
|a 6.2.5. Assigning Evidence to Assemblies6.2.6. Assigning Evidence to Application Domains; 6.3. Extending the .NET Framework; 6.3.1.2. Using the SecurityElement Class; 6.3.1.3. Building the Author evidence class; 6.3.2. Using Custom Evidence; 6.3.2.2. Serializing evidence; 6.3.2.3. Embedding evidence in an assembly; 6.3.3. The Next Steps in Customization; 7. Permissions; 7.1.2. Requesting Permissions; 7.1.3. Permission Types; 7.1.3.2. Identity permissions; 7.1.4. Enforcing Code-Access Security; 7.2. Programming Code-Access Security; 7.2.1.2. Declarative security statements
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft .NET Framework.
|
630 |
0 |
7 |
|a Microsoft .NET Framework
|2 fast
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
653 |
|
|
|a Microsoft
|
700 |
1 |
|
|a Jones, Allen.
|
776 |
0 |
8 |
|i Print version:
|a Freeman, Adam.
|t Programming .NET security.
|d Sebastopol, CA ; Farnham : O'Reilly, 2003
|z 0596004427
|w (OCoLC)51964623
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0596004427/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL540503
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 415478
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7427862
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3179814
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26837831
|
938 |
|
|
|a Internet Archive
|b INAR
|n programmingnetse0000free
|
994 |
|
|
|a 92
|b IZTAP
|