Beginning Information Cards and CardSpace
Title | Beginning Information Cards and CardSpace PDF eBook |
Author | Marc Mercuri |
Publisher | Apress |
Pages | 440 |
Release | 2007-10-18 |
Genre | Computers |
ISBN | 1430202041 |
If you work with identity solutions or structures, you will find Beginning Windows CardSpace: From Novice to Professional essential to understanding and successfully implementing CardSpace solutions. Topics range from a fundamental discussion of identity to comprehensive coverage of Windows CardSpace. You'll learn what CardSpace is all about, where you can and should use it, and how you would implement it. Additionally, multiple case studies showcase different scenarios where the technology is employed. The book also includes high-quality demos with universal themes that are applicable to your own work.
Computer and Information Sciences II
Title | Computer and Information Sciences II PDF eBook |
Author | Erol Gelenbe |
Publisher | Springer Science & Business Media |
Pages | 526 |
Release | 2011-09-30 |
Genre | Technology & Engineering |
ISBN | 1447121554 |
Information technology is the enabling foundation for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 26th International Symposium on Computer and Information Systems, held at the Royal Society in London on 26th to 28th September 2011. Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.
Beginning ASP.NET Security
Title | Beginning ASP.NET Security PDF eBook |
Author | Barry Dorrans |
Publisher | John Wiley & Sons |
Pages | 443 |
Release | 2010-04-27 |
Genre | Computers |
ISBN | 0470970154 |
Programmers: protect and defend your Web apps against attack! You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and security breaches. You'll start with a thorough look at ASP.NET 3.5 basics and see happens when you don't implement security, including some amazing examples. The book then delves into the development of a Web application, walking you through the vulnerable points at every phase. Learn to factor security in from the ground up, discover a wealth of tips and industry best practices, and explore code libraries and more resources provided by Microsoft and others. Shows you step by step how to implement the very latest security techniques Reveals the secrets of secret-keeping—encryption, hashing, and not leaking information to begin with Delves into authentication, authorizing, and securing sessions Explains how to secure Web servers and Web services, including WCF and ASMX Walks you through threat modeling, so you can anticipate problems Offers best practices, techniques, and industry trends you can put to use right away Defend and secure your ASP.NET 3.5 framework Web sites with this must-have guide.
Public Key Infrastructures, Services and Applications
Title | Public Key Infrastructures, Services and Applications PDF eBook |
Author | Svetla Petkova-Nikova |
Publisher | Springer |
Pages | 218 |
Release | 2012-05-12 |
Genre | Computers |
ISBN | 3642298044 |
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.
Data and Applications Security and Privacy XXV
Title | Data and Applications Security and Privacy XXV PDF eBook |
Author | Yingjiu Li |
Publisher | Springer |
Pages | 319 |
Release | 2011-06-29 |
Genre | Computers |
ISBN | 3642223486 |
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
Beginning Web Development, Silverlight, and ASP.NET AJAX
Title | Beginning Web Development, Silverlight, and ASP.NET AJAX PDF eBook |
Author | Laurence Moroney |
Publisher | Apress |
Pages | 433 |
Release | 2008-06-25 |
Genre | Computers |
ISBN | 1430205822 |
There has been a huge surge in interest in ‘Web 2.0’ technologies over the last couple of years. Microsoft’s contribution to this area has been the ASP.NET AJAX and Silverlight technologies, coupled to a supporting framework of ancillary tools. This book aims to be a no nonsense introduction to these technologies for the rapidly growing number of people who are realizing that they need Microsoft-based ‘Web 2.0’ skills on their CV. It gives people a grounding in the core concepts of the technologies and shows how they can be used together to produce the results that people need. The author has unparalleled experience of introducing people to these technologies.
Policies and Research in Identity Management
Title | Policies and Research in Identity Management PDF eBook |
Author | Elisabeth de Leeuw |
Publisher | Springer |
Pages | 153 |
Release | 2010-11-18 |
Genre | Computers |
ISBN | 3642173039 |
This book constitutes the refereed proceedings of the Second IFIP WG 11.6 Working Conference on Policies and Research in Identity Management, IDMAN 2010, held in Oslo, Norway, in November 2010. The 10 thoroughly refereed papers presented were selected from numerous submissions. They focus on identity management in general and surveillance and monitoring in particular.