LEADER 01252nam0-22003731i-450- 001 990000363700403321 005 20001010 010 $a0-387-09554-3 035 $a000036370 035 $aFED01000036370 035 $a(Aleph)000036370FED01 035 $a000036370 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aCODES for boundary-value problems in ordinary differential equations. Proceedings of a working conference may 14-17, 1978$fEdited by B. Childs, M. Scott, J.W. Daniel, E. Denman and P. Nelson 210 $aBerlin$cSpringer-Verlag$d1979 215 $aV,388 p.$d24 cm 225 1 $aLecture notes in computer science$v76 676 $a519.4 702 1$aChilds,$bBart 702 1$aDaniel,$bJames W. 702 1$aDenman,$bEugene D. 702 1$aLecture Notes in Computer Science,$b76 702 1$aNelson,$bP. 702 1$aScott,$bM. 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000363700403321 952 $a04 012-82$bDIC 1211$fDINCH 959 $aDINCH 996 $aCODES for boundary-value problems in ordinary differential equations. Proceedings of a working conference may 14-17, 1978$9125986 997 $aUNINA DB $aING01 LEADER 03031oas 2201081 a 450 001 9910144063103321 005 20251106213014.0 035 $a(DE-599)ZDB2023690-6 035 $a(OCoLC)34375215 035 $a(CONSER)sn 96005266 035 $a(CKB)991042728055798 035 $a(EXLCZ)99991042728055798 100 $a19960315a19969999 uy a 101 0 $aeng 135 $aurunu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aJournal of technology law & policy 210 $aGainesville, FL $cUniversity of Florida, Levin College of Law$dİ1996- 215 $a1 online resource 300 $aRefereed/Peer-reviewed 311 08$a1087-6995 517 3 $aJournal of technology law and policy 517 3 $aJTLP 517 1 $aJ. Tech. L. & Pol'y 606 $aTechnology and law$zUnited States$vPeriodicals 606 $aInternet$xLaw and legislation$zUnited States$vPeriodicals 606 $aIntellectual property$zUnited States$vPeriodicals 606 $aTechnologie et droit$zE?tats-Unis$vPe?riodiques 606 $aInternet$xDroit$zE?tats-Unis$vPe?riodiques 606 $aProprie?te? intellectuelle$zE?tats-Unis$vPe?riodiques 606 $aIntellectual Property Law$2ebps 606 $aTechnology Law$2ebps 606 $aIntellectual property$2fast$3(OCoLC)fst00975774 606 $aInternet$xLaw and legislation$2fast$3(OCoLC)fst00977193 606 $aTechnology and law$2fast$3(OCoLC)fst01145264 607 $aUnited States$2fast$1https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq 608 $aPeriodicals.$2fast 615 0$aTechnology and law 615 0$aInternet$xLaw and legislation 615 0$aIntellectual property 615 6$aTechnologie et droit 615 6$aInternet$xDroit 615 6$aProprie?te? intellectuelle 615 7$aIntellectual Property Law. 615 7$aTechnology Law. 615 7$aIntellectual property. 615 7$aInternet$xLaw and legislation. 615 7$aTechnology and law. 712 02$aLevin College of Law. 801 0$bNSD 801 1$bNSD 801 2$bOCL 801 2$bOCLCQ 801 2$bHVL 801 2$bOCLCQ 801 2$bDLC 801 2$bOCLCQ 801 2$bDOS 801 2$bZBL 801 2$bMUQ 801 2$bOCLCS 801 2$bOCLCQ 801 2$bOCLCO 801 2$bOCLCQ 801 2$bOCLCF 801 2$bOCLCO 801 2$bOCLCQ 801 2$bGZL 801 2$bCCO 801 2$bCUS 801 2$bWT2 801 2$bOCLCQ 801 2$bWY@ 801 2$bOCLCQ 801 2$bUUM 801 2$bOCLCQ 801 2$bLND 801 2$bAU@ 801 2$bOCLCQ 801 2$bU3W 801 2$bOCLCQ 801 2$bLDP 801 2$bOCLCO 801 2$bBWN 801 2$bOCLCQ 801 2$bOCLCL 801 2$bOCLCQ 906 $aJOURNAL 912 $a9910144063103321 996 $aJournal of technology law & policy$92107410 997 $aUNINA LEADER 05940nam 22005415 450 001 9910427050303321 005 20251204105038.0 010 $a1-4842-6014-7 024 7 $a10.1007/978-1-4842-6014-2 035 $a(CKB)4100000011505164 035 $a(DE-He213)978-1-4842-6014-2 035 $a(MiAaPQ)EBC6370720 035 $a(CaSebORM)9781484260142 035 $a(PPN)272268089 035 $a(EXLCZ)994100000011505164 100 $a20201010d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced ASP.NET Core 3 Security $eUnderstanding Hacks, Attacks, and Vulnerabilities to Secure Your Website /$fby Scott Norberg 205 $a1st ed. 2020. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2020. 215 $a1 online resource (XX, 405 p. 30 illus.) 311 08$a1-4842-6016-3 311 08$a1-4842-6013-9 327 $aChapter 1: Introducing ASP.NET Core -- Chapter 2: General Security Concepts -- Chapter 3: Cryptography -- Chapter 4: Web Security Concepts -- Chapter 5: Understanding Common Attacks -- Chapter 6: Processing User Input -- Chapter 7: Authentication and Authorization -- Chapter 8: Data Access and Storage. - Chapter 9: Logging and Error Handling -- Chapter 10: Setup and Configuration -- Chapter 11: Secure Application Life Cycle Management. 330 $aIncorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and delves into security topics rarely covered elsewhere. Get ready to dive deep into ASP.NET Core 3.1 source code, clarifying how particular features work and addressing how to fix problems. For straightforward use cases, the ASP.NET Core framework does a good job in preventing certain types of attacks from happening. But for some types of attacks, or situations that are not straightforward, there is very little guidance available on how to safely implement solutions. And worse, there is a lot of bad advice online on how to implement functionality, be it encrypting unsafely hard-coded parameters that need to be generated at runtime, or articles which advocate for certain solutions that are vulnerable to obvious injection attacks. Even more concerning is the functions in ASP.NET Core that arenot as secure as they should be by default. Advanced ASP.NET Core 3 Security is designed to train developers to avoid these problems. Unlike the vast majority of security books that are targeted to network administrators, system administrators, or managers, this book is targeted specifically to ASP.NET developers. Author Scott Norberg begins by teaching developers how ASP.NET Core works behind the scenes by going directly into the framework's source code. Then he talks about how various attacks are performed using the very tools that penetration testers would use to hack into an application. He shows developers how to prevent these attacks. Finally, he covers the concepts developers need to know to do some testing on their own, without the help of a security professional. What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the framework Dig into ASP.NET Core 3.1 sourcecode to understand how the security services work Establish a baseline for understanding how to design more secure software Properly apply cryptography in software development Take a deep dive into web security concepts Validate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET Core Fix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needs Incorporate security into your software development process This book is for software developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. A basic understanding of web technologies such as HTML, JavaScript, and CSS is assumed, as is knowledge of how to create a website, and how to read and write C#. You do not need knowledge of security concepts, even those that are often covered in ASP.NET Core documentation. Scott Norberg is a web security specialist currently based in the Seattle, Washington area. He has almost 15 years of experience successfully delivering software products in a wide range of roles. As a security consultant, he has experience with many testing tools and techniques, including Dynamic (DAST) and Static (SAST) testing, as well as manual testing and reviewing source code. Along with the many websites he has designed and built with various versions of ASP.NET, he has performed security assessments for many more. While his language of choice is C#, he has also built websites, components, and other tools in F#, VB.NET, Python, R, Java, and Pascal. He holds several certifications, including Microsoft Certified Technology Specialist (MCTS), certifications for ASP.NET and SQL Server, and a Certified Information Systems Security Professional (CISSP) certification. He also has an MBA from Indiana University. 606 $aMicrosoft software 606 $aMicrosoft .NET Framework 606 $aData protection 606 $aMicrosoft 606 $aData and Information Security 615 0$aMicrosoft software. 615 0$aMicrosoft .NET Framework. 615 0$aData protection. 615 14$aMicrosoft. 615 24$aData and Information Security. 676 $a005.8 700 $aNorberg$b Scott$01058755 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910427050303321 996 $aAdvanced ASP.NET Core 3 Security$93564061 997 $aUNINA