Designing secure web-based applications for microsoft windows 2000
Résumé
Web server, component-level, and database security features and considerations. Designing Secure Web-Based Applications For
Microsoft® Windows® 2000 offers an integrated, authoritative, pragmatic, end-to-end view of Windows 2000 security topics. The book starts
by providing a solid foundation in Windows 2000 security theory and concepts, explains the key software design considerations for various
categories and levels of security, and shows how isolated security "islands" interact. It explains core security issues such as risk analysis, threats,
authentication, authorization, and privacy, and then discusses ways to apply the appropriate security to an application to mitigate risk. It covers a
range of security technologies such as NTLM authentication, Kerberos authentication, SSL/TLS, CryptoAPI, ACLs, Active Directory, Certificates,
Web security capabilities, and COM+ security. Finally, the author uses Web services, certificates, components, and database access to build a
complex Web-based application (included on a companion CD) to show how Windows 2000 security features work in concert to protect applications
and data.
Key Book Benefits:
- Discover the in-depth architecture as well as the
theory and concepts behind major security services in
Windows 2000
- Don't buy separate books about Windows 2000 security
services-they're all covered here!
- Learn how to actually build a secure, sophisticated Web-based application with the accompanying CD and sample code
Today, businesses use networks consisting of intranets,
Internet sites, and extranets, all of which extend the
network, requiring increased system
security. In addition, confidential information may be
stored on mobile computing devices, which are subject to
theft and loss.
Windows 2000 provides end-to-end security that lets
organizations integrate systems both inside and outside the
corporate network boundaries,
while providing complete access control and data
protection. Security features include advanced techniques
for identifying who is accessing the
system, including the use of digital "keys" to access
selected data, and a single ID that permits users to access
not only their own computer, but also
other shared resources (such as printers or files) on the
corporate network, the Internet, or even a business
partner's network
L'auteur - Michael Howard
Michael Howard, currently a program manager on the Windows 2000 security team, has been at Microsoft for 8 years. Prior to working on Windows 2000 he was the security program manager for Internet Information Server 4.0 and 5.0. Michael has spoken about security-related issues at many events such as Microsoft TechEd, Microsoft Professional Developer's Conferences and numerous industry gatherings. He hails from New Zealand, where he worked with banking and government clients helping them design, develop and deploy Windows NT-based security solutions. Currently, Michael lives 10 miles from the Microsoft Redmond campus in sunny Bellevue with his wife, Cheryl and two Yorkshire Terriers; Squirt and Major.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Microsoft Press |
Auteur(s) | Michael Howard |
Parution | 15/09/2000 |
Nb. de pages | 504 |
Format | 18,7 x 23,5 |
Couverture | Broché |
Poids | 1090g |
Intérieur | Noir et Blanc |
EAN13 | 9780735609952 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse