Ebook824 pages21 hours
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
By Bilal Haidar
Rating: 0 out of 5 stars
()
About this ebook
This book is intended for developers who are already familiarwith and have a solid understanding of ASP.NET 1.1 and ASP.NET 2.0security concepts, especially in the areas of forms authentication,page security, and website authorization. It assumes that you havea good understanding of the general functionality of Membership andRole Manager. It is also assumes that you have some familiarityworking with ASP.NET AJAX 3.5. The book aims to “peel backthe covers” of various ASP.NET security features so you cangain a deeper understanding of the security options available toyou. Explaining the new IIS 7.0 and its Integrated mode ofexecution is also included in the book.This book was written using the .NET 3.5 Framework along withthe .NET Framework SPI on both Windows Sever 2008 and WindowsVista. The sample code in the book has been verified to work with.NET 3.5 Framework and .NET 3.5 Framework SPI on Windows Vista. Torun all of the samples in the book you will need the following:Windows Server 2008 or Windows VistaInternet Information Services 7.0 (IIS 7.0)Visual Studio 2008 RTMEither SQL Server 2000 or SQL Server 2005A Window’s Sever 2008 domain running at Windows Server2008 functional levelThis book covers many topics and areas in ASP.NET 2.0 andASP.NET 3.5. It first introduces Internet Information Services 7.0(IIS 7.0). It goes on to explain in detail the new IIS 7.0Integrated mode of execution. Next, detailed coverage of howsecurity is applied when the ASP.NET application starts up and whena request is processed in the newly introduced integratedrequest-processing pipeline is discussed. After this, the bookbranches out and begins to cover security information for featuressuch as trust levels, forms authentication, page security, andsession state. This will show you how you can benefit from the IIS7.0 Integrated mode to make better use of ASP.NET features. Youwill also gain an understanding of the lesser known securityfeatures in ASP.NET 2.0 and ASP.NET 3.5.In chapter 10 the book changes direction and addresses twosecurity services in ASP.NET 2.0 and ASP.NET 3.5: Membership andRole Manager. You will learn about the provider model thatunderlies each of these features. The internals of the feature arealso discussed, as well as the SQL- and Active Directory-basedproviders included with them. The discussion of ASP.NET features iscontinued in chapter 17, which is dedicated to the ASP.NET AJAX 3.5security integration with ASP.NET 3.5; it will also show how toauthenticate and authorize users with JavaScript code written fromthe client-side.The book closes with a chapter about the best practices ASP.Netdevelopers should follow to protect their applications fromattack.Chapter 1 starts by refreshing ideas on application pools andworker processes. It later gets into the major components that makeup IIS 7.0. Chapter 2 begins by introducing the advantages of theIIS 7.0 and ASP.NET integrated mode. Chapter 3 gives you awalkthrough of the security processing that both IIS 7.0 andASP.NET perform in the integrated/unified request-processingpipeline. Chapter 4 defines what an ASP.NET trust level is and howASP.NET trust levels work to provide secure environments forrunning web applications. Chapter 5 covers the security features inthe 2.0 and 3.5 Frameworks’ configuration systems. Chapter 6explains ASP.NET 2.0 and ASP.NET 3.5 features for formsauthentication. Chapter 7 demonstrates using IIS 7.0 wildcardmappings and ASP.NET 2.0 and ASP.NET 3.5 support for wildcardmappings to share authentication and authorization information withClassic ASP applications. Chapter 8 covers security featuresand guidance for session state. Chapter 9 describes some lesserknown page security features from ASP.NET 1.1 and describes howASP.NET 2.0 and ASP.NET 3.5 options for securing viewstate andpostback events. Chapter 10 gives you an architectural overview ofthe provider model in both ASP.NET 2.0 and ASP.NET 3.5. Chapter 11talks about the Membership feature in ASP.NET 2.0
Related to Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
Related ebooks
Professional ADO.NET 3.5 with LINQ and the Entity Framework Rating: 3 out of 5 stars3/5Professional Microsoft Windows Embedded CE 6.0 Rating: 0 out of 5 stars0 ratingsProfessional BlazeDS: Creating Rich Internet Applications with Flex and Java Rating: 0 out of 5 stars0 ratingsProfessional DotNetNuke 5: Open Source Web Application Framework for ASP.NET Rating: 0 out of 5 stars0 ratingsLearning ASP.NET Core MVC Programming Rating: 5 out of 5 stars5/5Cloud Computing with the Windows Azure Platform Rating: 4 out of 5 stars4/5Beginning Oracle Application Express Rating: 0 out of 5 stars0 ratingsBeginning Database Programming Using ASP.NET Core 3: With MVC, Razor Pages, Web API, jQuery, Angular, SQL Server, and NoSQL Rating: 0 out of 5 stars0 ratings.NET Mastery: The .NET Interview Questions and Answers Rating: 0 out of 5 stars0 ratingsMastering C# Concurrency Rating: 0 out of 5 stars0 ratingsASP.NET Core for Jobseekers: Build Career in Designing Cross-Platform Web Applications Using Razor and Entity Framework Core Rating: 0 out of 5 stars0 ratingsAzure for .NET Core Developers: Implementing Microsoft Azure Solutions Using .NET Core Framework Rating: 0 out of 5 stars0 ratingsReact and React Native Rating: 0 out of 5 stars0 ratingsASP.NET Core 3 and React: Hands-On full stack web development using ASP.NET Core, React, and TypeScript 3 Rating: 0 out of 5 stars0 ratingsDeveloping Web Applications with Apache, MySQL, memcached, and Perl Rating: 0 out of 5 stars0 ratingsLearn Professional Programming in .Net Using C#, Visual Basic, and Asp.Net Rating: 0 out of 5 stars0 ratingsMastering Responsive Web Design with HTML5 and CSS3 Rating: 0 out of 5 stars0 ratingsRust for Network Programming and Automation Rating: 0 out of 5 stars0 ratings.Net Framework and Programming in ASP.NET Rating: 0 out of 5 stars0 ratingsReact Components Rating: 0 out of 5 stars0 ratingsIntegrating Serverless Architecture: Using Azure Functions, Cosmos DB, and SignalR Service Rating: 0 out of 5 stars0 ratingsDWR Java AJAX Applications Rating: 0 out of 5 stars0 ratingsPractical Microservices Architectural Patterns: Event-Based Java Microservices with Spring Boot and Spring Cloud Rating: 0 out of 5 stars0 ratingsLearning Underscore.js Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Coding For Dummies Rating: 5 out of 5 stars5/5How To Start A Podcast Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsThe Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Learn JavaScript in 24 Hours Rating: 3 out of 5 stars3/5Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsGet Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsHow to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsThe Designer's Web Handbook: What You Need to Know to Create for the Web Rating: 0 out of 5 stars0 ratings
Reviews for Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB - Bilal Haidar
2Hd book_preview_excerpt.html
Enjoying the preview?
Page 1 of 1