28.12.2013 Views

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

Building Secure ASP.NET Applications - People Search Directory

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1: Introduction 3<br />

How You Should Read This Guide<br />

The guide has been developed to be modular. This allows you to pick and choose<br />

which chapters to read. For example, if you are interested in learning about the<br />

in-depth security features provided by a specific technology, you can jump straight<br />

to Part III of the guide (Chapters 8 through 12), which contains in-depth material<br />

covering <strong>ASP</strong>.<strong>NET</strong>, Enterprise Services, Web Services, .<strong>NET</strong> Remoting, and data<br />

access.<br />

However, you are encouraged to read the early chapters (Chapters 1 through 4) in<br />

Part I of the guide first, because these will help you understand the security model<br />

and identify the core technologies and security services at your disposal. Application<br />

architects should make sure they read Chapter 3, which provides some key<br />

insights into designing an authentication and authorization strategy that spans the<br />

tiers of your Web application. Part I will provide you with the foundation materials<br />

which will allow you to extract maximum benefit from the remainder of the guide.<br />

The intranet, extranet, and Internet chapters (Chapters 5 through 7) in Part II of the<br />

guide will show you how to secure specific application scenarios. If you know the<br />

architecture and deployment pattern that is or will be adopted by your application,<br />

use this part of the guide to understand the security issues involved and the basic<br />

configuration steps required to secure specific scenarios.<br />

Finally, additional information and reference material in Part IV of the guide will<br />

help further your understanding of specific technology areas. It also contains a<br />

library of How To articles which enable you to develop working security solutions<br />

in the shortest possible time.<br />

Organization of the Guide<br />

The guide is divided into four parts. The aim is to provide a logical partitioning,<br />

which will help you to more easily digest the content.<br />

Part I, Security Models<br />

Part 1 of the guide provides a foundation for the rest of the guide. Familiarity with<br />

the concepts, principles, and technologies introduced in Part 1 will enable you to<br />

extract maximum value from the remainder of the guide. Part 1 contains the following<br />

chapters.<br />

● Chapter 1, “Introduction”<br />

● Chapter 2, “Security Model for <strong>ASP</strong>.<strong>NET</strong> <strong>Applications</strong> “<br />

●<br />

●<br />

Chapter 3, “Authentication and Authorization”<br />

Chapter 4, “<strong>Secure</strong> Communication”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!