The .NET Developer's Guide to Windows Security
Keith Brown
- 出版商: Addison Wesley
- 出版日期: 2004-10-07
- 售價: $2,010
- 貴賓價: 9.5 折 $1,910
- 語言: 英文
- 頁數: 408
- 裝訂: Paperback
- ISBN: 0321228359
- ISBN-13: 9780321228352
-
相關分類:
.NET、資訊安全
已過版
買這商品的人也買了...
-
$680$537 -
$880$695 -
$650$553 -
$650$514 -
$580$458 -
$590$466 -
$1,270$1,207 -
$750$675 -
$560$504 -
$720$569 -
$490$417 -
$850$723 -
$750$593 -
$780$616 -
$780$663 -
$590$460 -
$680$537 -
$890$703 -
$990$782 -
$780$616 -
$480$408 -
$650$514 -
$780$663 -
$580$522 -
$2,170$2,062
相關主題
商品描述
Table of Contents:
Preface.
Acknowledgments.
I: THE BIG PICTURE.
Item 1: What Is Secure Code?
Item 2: What Is a Countermeasure?
Item 3: What is threat Modeling?
Item 4: What Is the Principle of Least Privilege?
Item 5: What Is the Principle of Defense in Depth?
Item 6: What Is Authentication?
Item 7: What Is a Luring Attack?
Item 8: What Is a Nonprivileged User?
Item 9: How to Develop Code as a Non-Admin.
Item 10: How to Enable Auditing.
Item 11: How to Audit Access to Files.
II: SECURITY CONTEXT.
Item 12: What Is a Security Principal?
Item 13: What Is a SID?
Item 14: How to Program with SIDs.
Item 15: What Is Security Context?
Item 16: What Is a Token?
Item 17: What Is a Logon Session?
Item 18: What Is a Window Station?
Item 19: What Is a User Profile?
Item 20: What Is a Group?
Item 21: What Is a Privilege?
Item 22: How to Use a Privilege.
Item 23: How to Grant or Revoke Privileges via Security Policy.
Item 24: What Are WindowsIdentity and WindowsPrincipal?
Item 25: How to Create a WindowsPrincipal Given a Token.
Item 26: How to Get a Token for a User.
Item 27: What Is a Daemon?
Item 28: How to Choose an Identity for a Daemon.
Item 29: How to Display a User Interface from a Daemon.
Item 30: How to Run a Program as Another User.
Item 31: What Is Impersonation?
Item 32: How to Impersonate a User Given Her Token.
Item 33: What is Thread.CurrentPrincipal?
Item 34: How to Track Client Identity Using Thread.CurrentPrincipal.
Item 35: What Is a Null Session?
Item 36: What Is a Guest Logon?
Item 37: How to Deal with Unauthenticated Clients.
III: ACCESS CONTROL.
Item 38: What Is Role-Based Security?
Item 39: What Is ACL-Based Security?
Item 40: What Is Discretionary Access Control?
Item 41: What Is Ownership?
Item 42: What Is a Security Descriptor?
Item 43: What Is an Access Control List?
Item 44: What Is a Permission?
Item 45: What Is ACL Inheritance?
Item 46: How to Take Ownership of an Object.
Item 47: How to Program ACLs.
Item 48: How to Persist a Security Descriptor.
Item 49: What Is Authorization Manager?
IV: COM(+) AND ENTERPRISESERVICES.
Item 50: What Is the COM(+) Authentication Level?
Item 51: What Is the COM(+) Impersonation Level?
Item 52: What Is CoInitializeSecurity?
Item 53: How to Configure Security for a COM(+) Client.
Item 54: How to Configure the Authentication and Impersonation Levels for a COM+ Application.
Item 55: How to Configure the Authentication and Impersonation Level for an ASP.NET Application.
Item 56: How to Implement Role-Based Security for an Enterprise Services Application.
Item 57: How to Configure Process Identity for a COM(+) Server Application.
V: NETWORK SECURITY.
Item 58: What Is CIA?
Item 59: What Is Kerberos?
Item 60: What Is a Service Principal Name (SPN)?
Item 61: How to Use Service Principal Names.
Item 62: What Is Delegation?
Item 63: What Is Protocol Transition?
Item 64: How to Configure Delegation via Security Policy.
Item 65: What Is SSPI?
Item 66: How to Add CIA to a Socket-Based App Using SSPI.
Item 67: How to Add CIA to .NET Remoting.
Item 68: What Is IPSEC?
Item 69: How to Use IPSEC to Protect Your Network.
VI: MISCELLANEOUS.
Item 70: How to Store Secrets on a Machine.
Item 71: How to Prompt for a Password.
Item 72: How to Programmatically Lock the Console.
Item 73: How to Programmatically Log Off or Reboot the Machine.
Item 74: What Is Group Policy?
Item 75: How to Deploy Software Securely via Group Policy.
Bibliography.
Index.