Amazon cover image
Image from Amazon.com
Image from Coce

Designing secure web-based applications for Microsoft Windows 2000 / Michael Howard; Marc Levy; Richard Waymire

By: Contributor(s): Material type: TextTextPublication details: Redmond, Wash. : Microsoft Press, 2000.Description: xvii, 504 pages : illustrations ; 24 cm + 1 CD-ROM (4 3/4 in.)ISBN:
  • 7356099950
Subject(s): LOC classification:
  • TK5105.888 .H66 2000
Contents:
Ch. 1. Security 101. Why Build Secure Applications? Security Defined. Why is Security Difficult? The Golden Rules (and Some Others). Threats, Safeguards, Vulnerabilities, and Attacks -- Ch. 2. A Process for Building Secure Web Applications. A Security Design Process. Application Design. An Example -- Ch. 3. Windows 2000 Security Overview. The Impact of Active Directory. Authenticated Logon. Authentication. Privileges. User Accounts and Groups. Domains and Workgroups. DOMAIN/Account Names and User Principal Names. Managing Accounts. Security Identifiers (SIDs). Tokens. Access Control Lists. Impersonation. Delegation. Miscellaneous Windows 2000 Security Features -- Ch. 4. Internet Explorer Security Overview. Privacy.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Status Date due Barcode
Media Collections Media Collections Al-Ghazali Library Media Collections TK5105.888.H66 2000 (Browse shelf(Opens below)) Available
Open Shelf Books Open Shelf Books Al-Ghazali Library Books TK5105.888.H66 2000 (Browse shelf(Opens below)) Available 012509

Ch. 1. Security 101. Why Build Secure Applications? Security Defined. Why is Security Difficult? The Golden Rules (and Some Others). Threats, Safeguards, Vulnerabilities, and Attacks --
Ch. 2. A Process for Building Secure Web Applications. A Security Design Process. Application Design. An Example --
Ch. 3. Windows 2000 Security Overview. The Impact of Active Directory. Authenticated Logon. Authentication. Privileges. User Accounts and Groups. Domains and Workgroups. DOMAIN/Account Names and User Principal Names. Managing Accounts. Security Identifiers (SIDs). Tokens. Access Control Lists. Impersonation. Delegation. Miscellaneous Windows 2000 Security Features --
Ch. 4. Internet Explorer Security Overview. Privacy.