11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

lxiv<strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> Countermeasures●●●●Microsoft Consulting Services <strong>and</strong> Product Support Services (PSS): Ilia Fortunov(Senior Architect) for providing continuous <strong>and</strong> diligent feedback; Aaron Margosis(extensive review, script injection, <strong>and</strong> SQL Injection); Jacquelyn Schmidt; KennyJones; Wade Mascia (<strong>Web</strong> Services <strong>and</strong> Enterprise services); Aaron Barth; JackieRichards; Aaron Turner; Andy Erl<strong>and</strong>son (Director of PSS <strong>Security</strong>); JayaprakasamSiddian Thirunavukkarasu (SQL Server security); Jeremy Bostron; Jerry Bryant;Mike Leuzinger; Robert Hensing (reviewing the Securing series); Gene Ferioli;David Lawler; Jon Wall (threat modeling); Martin Born; Michael Thomassy;Michael Royster; Phil McMillan; <strong>and</strong> Steven Ramirez.Thanks to Joel Scambray; Rich Benack; Alisson Sol; Tavi Siochi (IT Audit); DonWillits (raising the quality bar); Jay N<strong>and</strong>uri (Microsoft.com) for reviewing <strong>and</strong>sharing real world experience; Devendra Tiwari <strong>and</strong> Peter Dampier, for extensivereview <strong>and</strong> sharing best IT practices; Denny Dayton; Carlos Lyons; Eric Rachner;Justin Clarke; Shawn Welch (IT Audit); Rick DeJarnette; Kent Sharkey (Hostingscenarios); Andy Oakley; Vijay Rajagopalan (Dev Lead MS Operations); GordonRitchie, Content Master Ltd; Chase Carpenter (Threat Modeling); Matt Powell(for <strong>Web</strong> Services security); Joel Yoker; Juhan Lee [MSN Operations]; Lori Woehler;Mike Sherrill; Mike Kass; Nilesh Bhide; Rebecca Hulse; Rob Oikawa (Architect);Scott Greene; Shawn N<strong>and</strong>i; Steve Riley; Mark Mortimore; Matt Priestley; <strong>and</strong>David Ross.Thanks to our editors: Sharon Smith; Kathleen Hartman (S&T OnSite); TinaBurden (Entirenet); Cindy Riskin (S&T OnSite); <strong>and</strong> Pat Collins (Entirenet) forhelping to ensure a quality experience for the reader.Finally, thanks to Naveen Yajaman; Philip Teale; Scott Densmore; Ron Jacobs;Jason Hogg; Per Vonge Nielsen; Andrew Mason; Edward Jezierski; Michael Kropp;S<strong>and</strong>y Khaund; Shaun Hayes; Mohammad Al-Sabt; Edward Lafferty; KenPerilman; <strong>and</strong> Sanjeev Garg (Satyam Computer Services).Tell Us About Your SuccessIf this guide helps you, we would like to know. Tell us by writing a short summaryof the problems you faced <strong>and</strong> how this guide helped you out. Submit yoursummary to:MyStory@Microsoft.com.SummaryIn this introduction, you were shown the structure of the guide <strong>and</strong> the basicapproach used by the guide to secure <strong>Web</strong> applications. You were also shown howto apply the guidance to your role or to specific phases of your product developmentlife cycle.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!