11.07.2015 Views

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• .NET Frameworko .NET Framework Security Policy Model• Security Policy Levels• Security Features in .NET• Key Concepts in .NET Security• Code Access Security (CAS)• Using Code Access Security in ASP.NET• Steps to use CAS in ASP.NET Applications• Evidence-Based Security• Role-Based Securityo Role-Based Security: Windows Principalo Role-Based Security: Generic principal• Declarative and Imperative Security• Cryptography• Generate Key for Encryption and Decryption• Symmetric Encryption in .Net• Asymmetric Encryption in .Net• Symmetric Decryption in .Net• Asymmetric Decryption in .Net• Protecting Client and Server Data Using Encryption Sample• Cryptographic Signatures• Writing a Signature in .Net• Verifying a Signature in .Net• Ensuring Data Integrity with Hash Codes• Hash Code Generation• Verification of Hash Code• Classes Implementing Public-key Encryption Algorithms• Security Checklist for .NET FrameworkPage 17http://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!