Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000

Buy

Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also, designing, building, and deploying any secure solution as a series of silos is difficult and unwise because getting the silos to talk to one another can be time-consuming and expensive.

The focal point of this book is a holistic view of how to build secure Microsoft Windows 2000-based solutions that use various Web technologies. We cover soup to nuts: from the browser to servers to middleware servers to database servers and back. As it turns out, this is a reasonably complex task to address; there are many moving parts and our goal is to make sure you understand how it all fits together. Accordingly, this book is part reference, part tutorial, and part cookbook for building secure Web applications by using Microsoft technologies. We also cover some of the trade-offs you need to make when building such end-to-end solutions. For example, choosing the appropriate authentication and identity mechanisms can have a performance impact on your solution. For this reason, it's important that you choose the correct technologies to meet your business requirements.

This book's target audience is primarily Web developers and administrators developing, deploying, supporting, and using Windows 2000-based Web applications. Web developers will learn how to build security into their applications up front rather than after the fact; adding security features at the end of the development process is an often-made mistake that almost always jeopardizes security. They'll also learn how to approach and make the trade-offs between functionality, speed, and security. Web administrators will learn how to deploy Web applications securely, how to determine whether a computer is coming under attack, and how to respond to attacks.

Any reader of this book will gain a greater understanding of the security capabilities in Windows 2000, COM+, Internet Information Services (IIS), and Microsoft SQL Server and will learn a great deal about bedrock security principles. This knowledge is invaluable beyond building and deploying Web applications; all computer-based solutions require security of some sort.

(HTML tags aren't allowed.)

iPhone: The Missing Manual
iPhone: The Missing Manual

Answers found here!

In iOS 7, Apple gave the iPhone the most radical makeover in its history. The new software is powerful, sleek, and a perfect companion to the iPhone 5s and 5c—but it’s wildly different. Fortunately, David Pogue is back with an expanded edition of his witty, full-color guide: the...

Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking)
Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking)
Once again, this now-classic textbook has been revised to keep it up-to-date with our evolving field. While the Internet and its protocols now dominate networking everywhere, we see continued evolution in the technology used to support the Internet, with switching at “layer 2” providing rich functionality and...
Near Rings, Fuzzy Ideals, and Graph Theory
Near Rings, Fuzzy Ideals, and Graph Theory

Near Rings, Fuzzy Ideals, and Graph Theory explores the relationship between near rings and fuzzy sets and between near rings and graph theory. It covers topics from recent literature along with several characterizations.

After introducing all of the necessary fundamentals of algebraic systems, the book presents...


Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Create your first turn-based multiplayer game using GameMaker Studio 2’s built-in networking functions as well as using a simple NodeJS server. This book introduces you to the complexities of network programming and communication, where the focus will be on building the game from the ground up.  You will...
Foundations of Modern Physics
Foundations of Modern Physics
In addition to his ground-breaking research, Nobel Laureate Steven Weinberg is known for a series of highly praised texts on various aspects of physics, combining exceptional physical insight with his gift for clear exposition. Describing the foundations of modern physics in their historical context and with some new derivations, Weinberg...
Mastering C# Concurrency
Mastering C# Concurrency

Create robust and scalable applications along with responsive UI using concurrency and the multi-threading infrastructure in .NET and C#

About This Book

  • Learn to combine your asynchronous operations with Task Parallel Library
  • Master C#'s asynchronous infrastructure and use...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy