Designing secure web-based applications for Microsoft Windows 2000 / Michael Howard; Marc Levy; Richard Waymire
Material type: TextPublication details: Redmond, Wash. : Microsoft Press, 2000.Description: xvii, 504 pages : illustrations ; 24 cm + 1 CD-ROM (4 3/4 in.)ISBN:- 7356099950
- TK5105.888 .H66 2000
Item type | Home library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Media Collections | Al-Ghazali Library | Media Collections | TK5105.888.H66 2000 (Browse shelf(Opens below)) | Available | |||
Open Shelf Books | Al-Ghazali Library | Books | TK5105.888.H66 2000 (Browse shelf(Opens below)) | Available | 012509 |
Browsing Al-Ghazali Library shelves, Shelving location: Media Collections Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | ||||||
TK5105.875.I6.J351 2009 Building web applications with Microsoft Office Sharepoint Designer 2007 : | TK5105.875.I6.P187 2009 Internet / | TK5105.882.N469 1996 Netspcace navigator 2.0 | TK5105.888.H66 2000 Designing secure web-based applications for Microsoft Windows 2000 / | TK5105.888.P187 2009 Web designing : | TK5105.8883.L484 2009 Microsoft Expression Web 2 step by step / | TK5105.8885.D74.L6975 2006 Macromedia Dreamweaver 8 recipes : |
Ch. 1. Security 101. Why Build Secure Applications? Security Defined. Why is Security Difficult? The Golden Rules (and Some Others). Threats, Safeguards, Vulnerabilities, and Attacks --
Ch. 2. A Process for Building Secure Web Applications. A Security Design Process. Application Design. An Example --
Ch. 3. Windows 2000 Security Overview. The Impact of Active Directory. Authenticated Logon. Authentication. Privileges. User Accounts and Groups. Domains and Workgroups. DOMAIN/Account Names and User Principal Names. Managing Accounts. Security Identifiers (SIDs). Tokens. Access Control Lists. Impersonation. Delegation. Miscellaneous Windows 2000 Security Features --
Ch. 4. Internet Explorer Security Overview. Privacy.