Feeds

The .NET Developer's Guide to Windows Security

£10 off the hands-on guide

  • alert
  • submit to reddit

Site Offer Making applications secure has been one of the biggest priorities for Microsoft developers. However, very few books have been written for developers; most security books are aimed at administrators.

The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000.

The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion website includes the source code and examples used throughout the book.

Topics covered include:

  • Kerberos authentication
  • Access control
  • Impersonation
  • Network security
  • Constrained delegation
  • Protocol transition
  • Securing enterprise services
  • Securing remoting
  • How to run as a normal user and live a happy life
  • Programming the Security Support Provider Interface (SSPI) in Visual Studio.NET 2005

Battle-scarred and emerging developers alike will find that The .NET Developer's Guide to Windows Security offers bona-fide solutions to the everyday problems of securing Windows applications. Reg visitors can save £10.50, and get this title for just £24.49. A selection of other great new titles are featured below:

To browse or buy the other great discounted titles available to Reg readers, simply click on any of the links below:

Sign up for our monthly Merchandising Newsletter and receive exclusive discounts from our shops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.