Skip to main content

Research Repository

Advanced Search

Security and forensic computing: software security.

Buchanan, William J

Authors



Abstract

5 ENHANCED SOFTWARE SECURITY 163
5.1 Introduction 163
5.2 Integrating security into applications 164
5.3 Good practice 165
5.4 The future of software 165
5.5 .NET environment – The Future of Security 167
5.6 Strengths of .NET 169
5.7 Global assembly cache (GAC) 170
5.8 Strong names 171
5.9 .NET security model 172
5.10 Integrating security into applications 174
5.11 Web Service security 176
5.12 .NET remoting and COM+ security 179
5.13 .NET Framework 3.0 (WinFX) 179
5.14 Tutorial 180
5.15 Software Tutorial 181
5.16 Web Page Exercises 184
5.17 On-line Exercises 184
5.18 NetworkSims exercises 184
5.19 Chapter Lecture 184
5.20 References 184

Publication Date 2011
Deposit Date Jan 11, 2011
Publicly Available Date Dec 31, 2011
Peer Reviewed Not Peer Reviewed
Keywords Software security; .Net framework; authentication; encryption; flaws; trojan; worms; applications; hardware;
Public URL http://researchrepository.napier.ac.uk/id/eprint/4061
Contract Date Jan 11, 2011

Files






You might also like



Downloadable Citations