Designing secure web-based applications for Microsoft Windows 2000 / Michael Howard; Marc Levy; Richard Waymire
Material type: TextPublication details: Redmond, Wash. : Microsoft Press, 2000.Description: xvii, 504 pages : illustrations ; 24 cm + 1 CD-ROM (4 3/4 in.)ISBN:- 7356099950
- TK5105.888 .H66 2000
Item type | Home library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Media Collections | Al-Ghazali Library | Media Collections | TK5105.888.H66 2000 (Browse shelf(Opens below)) | Available | |||
Open Shelf Books | Al-Ghazali Library | Books | TK5105.888.H66 2000 (Browse shelf(Opens below)) | Available | 012509 |
Browsing Al-Ghazali Library shelves, Shelving location: Available to Loan Close shelf browser (Hides shelf browser)
TK5105.888.C273 2012 New perspectives HTML and CSS comprehensive / | TK5105.888.G476 2009 Flexible web design : | TK5105.888 H233 2012 Multimodal communication of corporate website design / | TK5105.888.H66 2000 Designing secure web-based applications for Microsoft Windows 2000 / | TK5105.888 .M533 2013 Membina laman web menggunakan CMS / | TK5105.888 .M533 2013 Membina laman web menggunakan CMS / | TK5105.888 .M622 2014 Foundations of Web design : |
Ch. 1. Security 101. Why Build Secure Applications? Security Defined. Why is Security Difficult? The Golden Rules (and Some Others). Threats, Safeguards, Vulnerabilities, and Attacks --
Ch. 2. A Process for Building Secure Web Applications. A Security Design Process. Application Design. An Example --
Ch. 3. Windows 2000 Security Overview. The Impact of Active Directory. Authenticated Logon. Authentication. Privileges. User Accounts and Groups. Domains and Workgroups. DOMAIN/Account Names and User Principal Names. Managing Accounts. Security Identifiers (SIDs). Tokens. Access Control Lists. Impersonation. Delegation. Miscellaneous Windows 2000 Security Features --
Ch. 4. Internet Explorer Security Overview. Privacy.