11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

lvi<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresPartsThis guide is divided into five parts:● Part I, Introduction to <strong>Threats</strong> <strong>and</strong> Countermeasures● Part II, Designing Secure <strong>Web</strong> <strong>Application</strong>s● Part III, Building Secure <strong>Web</strong> <strong>Application</strong>s● Part IV, Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>● Part V, Assessing Your <strong>Security</strong>Part I, Introduction to <strong>Threats</strong> <strong>and</strong> CountermeasuresThis part identifies <strong>and</strong> illustrates the various threats facing the network, host, <strong>and</strong>application layers. By using the threat modeling process, you can identify the threatsthat are relevant to your application. This sets the stage for identifying effectivecountermeasures. This part includes:● Chapter 1, “<strong>Web</strong> <strong>Application</strong> <strong>Security</strong> Fundamentals”● Chapter 2, “<strong>Threats</strong> <strong>and</strong> Countermeasures”● Chapter 3, “Threat Modeling”Part II, Designing Secure <strong>Web</strong> <strong>Application</strong>sThis part provides the guidance you need to design your <strong>Web</strong> applications securely.Even if you have an existing application, you should review this section <strong>and</strong> thenrevisit the concepts, principles, <strong>and</strong> techniques that you used during your applicationdesign. This part includes:● Chapter 4, “Design Guidelines for Secure <strong>Web</strong> <strong>Application</strong>s”● Chapter 5, “Architecture <strong>and</strong> Design Review for <strong>Security</strong>”Part III, Building Secure <strong>Web</strong> <strong>Application</strong>sThis part helps you to apply the secure design practices <strong>and</strong> principles covered inthe previous part to create a solid <strong>and</strong> secure implementation. You’ll learn defensivecoding techniques that make your code <strong>and</strong> application resilient to attack. Chapter 6presents an overview of the .NET Framework security l<strong>and</strong>scape so that you areaware of the numerous defensive options <strong>and</strong> tools that are at your disposal. Part IIIincludes:● Chapter 6, “.NET <strong>Security</strong> Fundamentals”● Chapter 7, “Building Secure Assemblies”● Chapter 8, “Code Access <strong>Security</strong> in Practice”● Chapter 9, “Using Code Access <strong>Security</strong> with ASP.NET”● Chapter 10, “Building Secure ASP.NET Pages <strong>and</strong> Controls”● Chapter 11, “Building Secure Serviced Components”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!