Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
5 ENHANCED SOFTWARE SECURITY 163
5.1 Introduction 163
5.2 Integrating security into applications 164
5.3 Good practice 165
5.4 The future of software 165
5.5 .NET environment – The Future of Security 167
5.6 Strengths of .NET 169
5.7 Global assembly cache (GAC) 170
5.8 Strong names 171
5.9 .NET security model 172
5.10 Integrating security into applications 174
5.11 Web Service security 176
5.12 .NET remoting and COM+ security 179
5.13 .NET Framework 3.0 (WinFX) 179
5.14 Tutorial 180
5.15 Software Tutorial 181
5.16 Web Page Exercises 184
5.17 On-line Exercises 184
5.18 NetworkSims exercises 184
5.19 Chapter Lecture 184
5.20 References 184
Buchanan, W. J. (2011). Security and forensic computing: software security
Publication Date | 2011 |
---|---|
Deposit Date | Jan 11, 2011 |
Publicly Available Date | Dec 31, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Software security; .Net framework; authentication; encryption; flaws; trojan; worms; applications; hardware; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4061 |
Contract Date | Jan 11, 2011 |
unit07_software_security.pdf
(8.2 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
sfc_unit05.html
(519 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
An omnidirectional approach to touch-based continuous authentication
(2023)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search