Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Windows Identity Foundation Cookbook

Buy
I still remember sitting down with my brand new copy of Writing Secure Code by Michael Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web reports, (before the term "Bl" came to embody what at the time we thought was an incredibly innovative way to display call center metrics for managing credit card operations) I found myself in a development lead position responsible for building a web portal for managing the collections process for JP Morgan Chase's auto and home business. The portal interfaced with a number of internal assets, such as SQL Server, Oracle, and IBM Mainframes via Terminal 3270 emulation, as well as external partners, such as Experian and Equifax.

In addition to the learning curve of moving from Classic Active Server pages to production- worthy .NET Framework 1.1 and ASP.NET Web Services, we were just beginning to dramatically disrupt the enterprise as a way to minimize the friction between systems while increasing the reusability of these integration investments. As a fledgling new lead, building the portal to stop world hunger and to cure cancer (as all the intranet portals promised to do in those days). I was keenly aware that the solution had to be secure, because after all. "All Input Is Evil", and working in the financial services industry, no security breach or personal information leak goes unpunished, no matter how trivial.

For weeks I skimmed through the 600 page volume, incrementally building confidence that I was doing my due diligence in implementing a trusted subsystem, identifying and authenticating my users, applying the least privilege, and preventing the SQL injection attacks. Things were significantly simpler in 2003. All of my users were in Active Directory, and as long as I didn't need them to do multiple hops, NTLM was just fine, thank you very much. I put a lot of thought into the roles and proudly remember showing my manager how the new users would automatically have access to the portal as soon as their account was created (provided IT assigned them to the right group! :).

Well, it turns out this "Web Services" thing was real, and what they did for the enterprise a decade ago pales in comparison to how service orientation has transformed the way users expect to be able to interact with software today. The proliferation of modern web applications and mobility demand a completely new perspective when designing modern applications. Whether you are building Web, desktop, or mobile solutions that reside on-premise, on the cloud, or are a hybrid thereof, identity and access control have never been more important.
(HTML tags aren't allowed.)

Agile UX Storytelling: Crafting Stories for Better Software Development
Agile UX Storytelling: Crafting Stories for Better Software Development

Learn how to use stories throughout the agile software development lifecycle. Through lessons and examples, Agile UX Storytelling demonstrates to product owners, customers, scrum masters, software developers, and designers how to craft stories to facilitate communication, identify problems and patterns, refine collaborative...

Socio-Emotional Relationship Therapy: Bridging Emotion, Societal Context, and Couple Interaction (AFTA SpringerBriefs in Family Therapy)
Socio-Emotional Relationship Therapy: Bridging Emotion, Societal Context, and Couple Interaction (AFTA SpringerBriefs in Family Therapy)

This path-breaking volume introduces Socio-Emotional Relationship Therapy for clinical work with troubled couples. Practice-focused and engaging, it integrates real-world knowledge of the intersections of gender, culture, power, and identity in relationships with empirical findings on the neurobiology of attraction. Case examples detail the...

The iPad for Photographers: Master the Newest Tool in Your Camera Bag
The iPad for Photographers: Master the Newest Tool in Your Camera Bag
Photographers carry gear. It doesn’t matter whether you’re a pro with multiple camera bodies and lenses or a casual shooter with an ever-present point-and-shoot camera—there’s always stuff to pack along. And if you’re traveling or away from your office or studio, part of that gear typically...

The ARTEMIS Mission
The ARTEMIS Mission

The ARTEMIS mission was initiated by skillfully moving the two outermost Earth-orbiting THEMIS spacecraft into lunar orbit to conduct unprecedented dual spacecraft observations of the lunar environment. ARTEMIS stands for Acceleration, Reconnection, Turbulence and Electrodynamics of the Moon's Interaction with the Sun. Indeed, this volume...

Forensic Art (Crime Scene Investigations)
Forensic Art (Crime Scene Investigations)

The popularity of crime scene and investigative crime shows on television has come as a surprise to many who work in the field. The main surprise is the concept that crime scene analysts are the true crime solvers, when in truth, it takes dozens of people, doing many different jobs, to solve a crime. Often, the crime scene analyst’s...

Digital Audio Editing Fundamentals
Digital Audio Editing Fundamentals

This book is a new media mini-book covering concepts central to digital audio editing using the Audacity 2.1.1 open source software package which also apply to all of the professional audio editing packages. The book builds upon the foundational concepts of MIDI, synthesis (artificially created digital audio), and sampled waveforms (analog...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy