Programming Windows Security by Keith Brown
$12.56
Shop on Better World Books

Description

Works in this series are designed to be the practical and informative sources developers need on the methods and tools for applying object-oriented technologies to real-world, large-scale applications. We will be starting with the four books following in the catalogue, and publishing more in the near future. We will be supporting the books with space advertising, author appearances at major conferences, co-marketing with DevelopMentor, and a major publicity push. -- Kerberos authentication, COM+ security extensions, Active Directory security, and more. -- Security implications of COM+, MTS, MSMQ and other key Microsoft technologies. -- Avoiding unwanted "Access Denied" messages and other problems Windows 2000/NT security can cause developers. Windows 2000 and NT offer programmers powerful security tools that few developers use to the fullest -- and many are completely unaware of. In Programming Windows Security, a top Windows security expert shows exactly how to apply them in enterprise applications. Keith Brown starts with a complete roadmap to the Windows 2000 security architecture, describing every component and how they all fit together. He reviews the "actors" in a secure system, including principals, authorities, authentication, domains, and the local security authority; and the role of trust in secure Windows 2000 applications. Developers will understand the security implications of the broader Windows 2000 environment, including logon sessions, tokens, and window stations. Next, Brown introduces Windows 2000 authorization and access control, including groups, aliases, roles, privileges, security descriptors, DACLs and SACLs - showing how to choose the best accessstrategy for any application. In Part II, he walks developers through using each of Windows 2000's security tools, presenting techniques for building more secure setup programs, using privileges at runtime, working with window stations and user profiles, and using Windows 2000's dramatically changed ACLs. Finally, Brown provides techniques and sample code for network authentication, working with the file system redirector, using RPC security, and making the most of COM/COM+ security.

logo

Better World Books

Top in Better World Books

View all
View all