Research Output
Security and forensic computing: software security.
  5 ENHANCED SOFTWARE SECURITY 163
5.1 Introduction 163
5.2 Integrating security into applications 164
5.3 Good practice 165
5.4 The future of software 165
5.5 .NET environment – The Future of Security 167
5.6 Strengths of .NET 169
5.7 Global assembly cache (GAC) 170
5.8 Strong names 171
5.9 .NET security model 172
5.10 Integrating security into applications 174
5.11 Web Service security 176
5.12 .NET remoting and COM+ security 179
5.13 .NET Framework 3.0 (WinFX) 179
5.14 Tutorial 180
5.15 Software Tutorial 181
5.16 Web Page Exercises 184
5.17 On-line Exercises 184
5.18 NetworkSims exercises 184
5.19 Chapter Lecture 184
5.20 References 184

  • Date:

    30 November 2010

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2010). Security and forensic computing: software security

Authors

Keywords

Software security; .Net framework; authentication; encryption; flaws; trojan; worms; applications; hardware;

Monthly Views:

Available Documents