EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
• .NET Frameworko .NET Framework Security Policy Model• Security Policy Levels• Security Features in .NET• Key Concepts in .NET Security• Code Access Security (CAS)• Using Code Access Security in ASP.NET• Steps to use CAS in ASP.NET Applications• Evidence-Based Security• Role-Based Securityo Role-Based Security: Windows Principalo Role-Based Security: Generic principal• Declarative and Imperative Security• Cryptography• Generate Key for Encryption and Decryption• Symmetric Encryption in .Net• Asymmetric Encryption in .Net• Symmetric Decryption in .Net• Asymmetric Decryption in .Net• Protecting Client and Server Data Using Encryption Sample• Cryptographic Signatures• Writing a Signature in .Net• Verifying a Signature in .Net• Ensuring Data Integrity with Hash Codes• Hash Code Generation• Verification of Hash Code• Classes Implementing Public-key Encryption Algorithms• Security Checklist for .NET FrameworkPage 17http://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>