TY - BOOK AU - Howard,Michael AU - Levy, Marc AU - Waymire, Richard TI - Designing secure web-based applications for Microsoft Windows 2000 SN - 7356099950 AV - TK5105.888 .H66 2000 PY - 2000/// CY - Redmond, Wash. : PB - Microsoft Press, KW - Microsoft Windows (Computer file) KW - World Wide Web KW - Security measures. KW - Web sites KW - Security measures N1 - Ch. 1. Security 101. Why Build Secure Applications? Security Defined. Why is Security Difficult? The Golden Rules (and Some Others). Threats, Safeguards, Vulnerabilities, and Attacks -- Ch. 2. A Process for Building Secure Web Applications. A Security Design Process. Application Design. An Example -- Ch. 3. Windows 2000 Security Overview. The Impact of Active Directory. Authenticated Logon. Authentication. Privileges. User Accounts and Groups. Domains and Workgroups. DOMAIN/Account Names and User Principal Names. Managing Accounts. Security Identifiers (SIDs). Tokens. Access Control Lists. Impersonation. Delegation. Miscellaneous Windows 2000 Security Features -- Ch. 4. Internet Explorer Security Overview. Privacy ER -