Toggle navigation
Home
Programming
.NET Programming security
Part I: Fundamentals
Chapter 1. Security Fundamentals
1.1 The Need for Security
1.2 Roles in Security
1.3 Understanding Software Security
1.4 End-to-End Security
Chapter 2. Assemblies
2.1 Assemblies Explained
2.2 Creating Assemblies
2.3 Shared Assemblies
2.4 Strong Names
2.5 Publisher Certificates
2.6 Decompiling Explained
Chapter 3. Application Domains
3.1 Application Domains Explained
Chapter 4. The Lifetime of a Secure Application
4.1 Designing a Secure .NET Application
4.2 Developing a Secure .NET Application
4.3 Security Testing a .NET Application
4.4 Deploying a .NET Application
4.5 Executing a .NET Application
4.6 Monitoring a .NET Application
Part II: .NET Security
Chapter 5. Introduction to Runtime Security
5.1 Runtime Security Explained
5.2 Introducing Role-Based Security
5.3 Introducing Code-Access Security
5.4 Introducing Isolated Storage
Chapter 6. Evidence and Code Identity
6.1 Evidence Explained
6.2 Programming Evidence
6.3 Extending the .NET Framework
Chapter 7. Permissions
7.1 Permissions Explained
7.2 Programming Code-Access Security
7.3 Extending the .NET Framework
Chapter 8. Security Policy
8.1 Security Policy Explained
8.2 Programming Security Policy
8.3 Extending the .NET Framework
Chapter 9. Administering Code-Access Security
9.1 Default Security Policy
9.2 Inspecting Declarative Security Statements
9.3 Using the .NET Framework Configuration Tool
9.4 Using the Code-Access Security Policy Tool
Chapter 10. Role-Based Security
10.1 Role-Based Security Explained
10.2 Programming Role-Based Security
Chapter 11. Isolated Storage
11.1 Isolated Storage Explained
11.2 Programming Isolated Storage
11.3 Administering Isolated Storage
Part III: .NET Cryptography
Chapter 12. Introduction to Cryptography
12.1 Cryptography Explained
12.2 Cryptography Is Key Management
12.3 Cryptographic Attacks
Chapter 13. Hashing Algorithms
13.1 Hashing Algorithms Explained
13.2 Programming Hashing Algorithms
13.3 Keyed Hashing Algorithms Explained
13.4 Programming Keyed Hashing Algorithms
13.5 Extending the .NET Framework
Chapter 14. Symmetric Encryption
14.1 Encryption Revisited
14.2 Symmetric Encryption Explained
14.3 Programming Symmetrical Encryption
14.4 Extending the .NET Framework
Chapter 15. Asymmetric Encryption
15.1 Asymmetric Encryption Explained
15.2 Programming Asymmetrical Encryption
15.3 Extending the .NET Framework
Chapter 16. Digital Signatures
16.1 Digital Signatures Explained
16.2 Programming Digital Signatures
16.3 Programming XML Signatures
16.4 Extending the .NET Framework
Chapter 17. Cryptographic Keys
17.1 Cryptographic Keys Explained
17.2 Programming Cryptographic Keys
17.3 Extending the .NET Framework
Part IV: .NET Application Frameworks
Chapter 18. ASP.NET Application Security
18.1 ASP.NET Security Explained
18.2 Configuring the ASP.NET Worker Process Identity
18.3 Authentication
18.4 Authorization
18.5 Impersonation
18.6 ASP.NET and Code-Access Security
Chapter 19. COM+ Security
19.1 COM+ Security Explained
19.2 Programming COM+ Security
19.3 Administering COM+ Security
Chapter 20. The Event Log Service
20.1 The Event Log Service Explained
20.2 Programming the Event Log Service
Part V: API Quick Reference
Chapter 21. How to Use This Quick Reference
21.1 Finding a Quick-Reference Entry
21.2 Reading a Quick-Reference Entry
Chapter 22. Converting from C# to VB Syntax
22.1 General Considerations
22.2 Classes
22.3 Structures
22.4 Interfaces
22.5 Class, Structure, and Interface Members
22.6 Delegates
22.7 Enumerations
Chapter 23. The System.Security Namespace
AllowPartiallyTrustedCallersAttribute
CodeAccessPermission
IEvidenceFactory
IPermission
ISecurityEncodable
ISecurityPolicyEncodable
IStackWalk
NamedPermissionSet
PermissionSet
PolicyLevelType
SecurityElement
SecurityException
SecurityManager
SecurityZone
SuppressUnmanagedCodeSecurityAttribute
UnverifiableCodeAttribute
VerificationException
XmlSyntaxException
Chapter 24. The System.Security.Cryptography Namespace
AsymmetricAlgorithm
AsymmetricKeyExchangeDeformatter
AsymmetricKeyExchangeFormatter
AsymmetricSignatureDeformatter
AsymmetricSignatureFormatter
CipherMode
CryptoAPITransform
CryptoConfig
CryptographicException
CryptographicUnexpectedOperationException
CryptoStream
CryptoStreamMode
CspParameters
CspProviderFlags
DeriveBytes
DES
DESCryptoServiceProvider
DSA
DSACryptoServiceProvider
DSAParameters
DSASignatureDeformatter
DSASignatureFormatter
FromBase64Transform
FromBase64TransformMode
HashAlgorithm
HMACSHA1
ICryptoTransform
KeyedHashAlgorithm
KeySizes
MACTripleDES
MaskGenerationMethod
MD5
MD5CryptoServiceProvider
PaddingMode
PasswordDeriveBytes
PKCS1MaskGenerationMethod
RandomNumberGenerator
RC2
RC2CryptoServiceProvider
Rijndael
RijndaelManaged
RNGCryptoServiceProvider
RSA
RSACryptoServiceProvider
RSAOAEPKeyExchangeDeformatter
RSAOAEPKeyExchangeFormatter
RSAParameters
RSAPKCS1KeyExchangeDeformatter
RSAPKCS1KeyExchangeFormatter
RSAPKCS1SignatureDeformatter
RSAPKCS1SignatureFormatter
SHA1
SHA1CryptoServiceProvider
SHA1Managed
SHA256
SHA256Managed
SHA384
SHA384Managed
SHA512
SHA512Managed
SignatureDescription
SymmetricAlgorithm
ToBase64Transform
TripleDES
TripleDESCryptoServiceProvider
Chapter 25. The System.Security.Cryptography.X509Certificates Namespace
X509Certificate
X509CertificateCollection
X509CertificateCollection.X509CertificateEnumerator
Chapter 26. The System.Security.Cryptography.Xml Namespace
DataObject
DSAKeyValue
KeyInfo
KeyInfoClause
KeyInfoName
KeyInfoNode
KeyInfoRetrievalMethod
KeyInfoX509Data
Reference
RSAKeyValue
Signature
SignedInfo
SignedXml
Transform
TransformChain
XmlDsigBase64Transform
XmlDsigC14NTransform
XmlDsigC14NWithCommentsTransform
XmlDsigEnvelopedSignatureTransform
XmlDsigXPathTransform
XmlDsigXsltTransform
Chapter 27. The System.Security.Permissions Namespace
CodeAccessSecurityAttribute
EnvironmentPermission
EnvironmentPermissionAccess
EnvironmentPermissionAttribute
FileDialogPermission
FileDialogPermissionAccess
FileDialogPermissionAttribute
FileIOPermission
FileIOPermissionAccess
FileIOPermissionAttribute
IsolatedStorageContainment
IsolatedStorageFilePermission
IsolatedStorageFilePermissionAttribute
IsolatedStoragePermission
IsolatedStoragePermissionAttribute
IUnrestrictedPermission
PermissionSetAttribute
PermissionState
PrincipalPermission
PrincipalPermissionAttribute
PublisherIdentityPermission
PublisherIdentityPermissionAttribute
ReflectionPermission
ReflectionPermissionAttribute
ReflectionPermissionFlag
RegistryPermission
RegistryPermissionAccess
RegistryPermissionAttribute
ResourcePermissionBase
ResourcePermissionBaseEntry
SecurityAction
SecurityAttribute
SecurityPermission
SecurityPermissionAttribute
SecurityPermissionFlag
SiteIdentityPermission
SiteIdentityPermissionAttribute
StrongNameIdentityPermission
StrongNameIdentityPermissionAttribute
StrongNamePublicKeyBlob
UIPermission
UIPermissionAttribute
UIPermissionClipboard
UIPermissionWindow
UrlIdentityPermission
UrlIdentityPermissionAttribute
ZoneIdentityPermission
ZoneIdentityPermissionAttribute
Chapter 28. The System.Security.Policy Namespace
AllMembershipCondition
ApplicationDirectory
ApplicationDirectoryMembershipCondition
CodeGroup
Evidence
FileCodeGroup
FirstMatchCodeGroup
Hash
HashMembershipCondition
IIdentityPermissionFactory
IMembershipCondition
NetCodeGroup
PermissionRequestEvidence
PolicyException
PolicyLevel
PolicyStatement
PolicyStatementAttribute
Publisher
PublisherMembershipCondition
Site
SiteMembershipCondition
StrongName
StrongNameMembershipCondition
UnionCodeGroup
Url
UrlMembershipCondition
Zone
ZoneMembershipCondition
Chapter 29. The System.Security.Principal Namespace
GenericIdentity
GenericPrincipal
IIdentity
IPrincipal
PrincipalPolicy
WindowsAccountType
WindowsBuiltInRole
WindowsIdentity
WindowsImpersonationContext
WindowsPrincipal
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.