11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

366 Part III: Building Secure <strong>Web</strong> <strong>Application</strong>sAdditional ResourcesFor more information, see the following resources:●●●For a printable checklist, see “Checklist: Securing Remoting” in the “Checklists”section of this guide.For information on how to host a remoted component in a Windows service,see “How To: Host a Remote Object in a Windows Service” in the “How To”section of “Microsoft patterns & practices Volume I, Building Secure ASP.NET<strong>Application</strong>s: Authentication, Authorization, <strong>and</strong> Secure Communication”at http://msdn.microsoft.com/library/en-us/dnnetsec/html/SecNetHT15.asp.For more information about how to create a custom authentication solutionthat uses SSPI, see MSDN article, “.NET Remoting <strong>Security</strong> Solution, Part 1:Microsoft.Samples.<strong>Security</strong>.SSPI Assembly,” at http://msdn.microsoft.com/library/en-us/dndotnet/html/remsspi.asp.Note The implementation in this article is a sample <strong>and</strong> not a product tested <strong>and</strong> supported byMicrosoft.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!