LEADER 02857nam 2200565 a 450 001 9910452949403321 005 20200520144314.0 010 $a1-60406-333-5 035 $a(CKB)2550000001041040 035 $a(EBL)1250440 035 $a(SSID)ssj0000821972 035 $a(PQKBManifestationID)11456250 035 $a(PQKBTitleCode)TC0000821972 035 $a(PQKBWorkID)10755738 035 $a(PQKB)11739773 035 $a(MiAaPQ)EBC1250440 035 $a(Au-PeEL)EBL1250440 035 $a(CaPaEBR)ebr10658148 035 $a(CaONFJC)MIL337199 035 $a(OCoLC)852758513 035 $a(EXLCZ)992550000001041040 100 $a20110510d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aRadcases genitourinary imaging$b[electronic resource] /$fedited by Shailendra Chopra 210 $aNew York $cThieme$dc2012 215 $a1 online resource (223 p.) 225 0$aRadCases 300 $aDescription based upon print version of record. 311 $a1-60406-324-6 320 $aIncludes bibliographical references (p. 201-204) and index. 327 $aRadCases Genitourinary Imaging; Title Page; Copyright; Dedication; RadCases Series Preface; Preface; Acknowledgments; Media Center Information; Case 1; Case 2; Case 3; Case 4; Case 5; Case 6; Case 7; Case 8; Case 9; Case 10; Case 11; Case 12; Case 13; Case 14; Case 15; Case 16; Case 17; Case 18; Case 19; Case 20; Case 21; Case 22; Case 23; Case 24; Case 25; Case 26; Case 27; Case 28; Case 29; Case 30; Case 31; Case 32; Case 33; Case 34; Case 35; Case 36; Case 37; Case 38; Case 39; Case 40; Case 41; Case 42; Case 43; Case 44; Case 45; Case 46; Case 47; Case 48; Case 49; Case 50; Case 51 327 $aCase 52Case 53; Case 54; Case 55; Case 56; Case 57; Case 58; Case 59; Case 60; Case 61; Case 62; Case 63; Case 64; Case 65; Case 66; Case 67; Case 68; Case 69; Case 70; Case 71; Case 72; Case 73; Case 74; Case 75; Case 76; Case 77; Case 78; Case 79; Case 80; Case 81; Case 82; Case 83; Case 84; Case 85; Case 86; Case 87; Case 88; Case 89; Case 90; Case 91; Case 92; Case 93; Case 94; Case 95; Case 96; Case 97; Case 98; Case 99; Case 100; Further Readings; Index 330 $aGenitourinary Imaging will enable you to diagnose the full range of cases involving the genitourinary system. _x000D__x000D_Features of Genitourinary Imaging:_x000D_Nearly 400 ... 410 0$aRadCases 606 $aGenitourinary organs$xImaging$vCase studies 608 $aElectronic books. 615 0$aGenitourinary organs$xImaging 676 $a616.6/07572 701 $aChopra$b Shailendra$0926847 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452949403321 996 $aRadcases genitourinary imaging$92082070 997 $aUNINA LEADER 05940nam 22005415 450 001 9910427050303321 005 20251204105038.0 010 $a1-4842-6014-7 024 7 $a10.1007/978-1-4842-6014-2 035 $a(CKB)4100000011505164 035 $a(DE-He213)978-1-4842-6014-2 035 $a(MiAaPQ)EBC6370720 035 $a(CaSebORM)9781484260142 035 $a(PPN)272268089 035 $a(EXLCZ)994100000011505164 100 $a20201010d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced ASP.NET Core 3 Security $eUnderstanding Hacks, Attacks, and Vulnerabilities to Secure Your Website /$fby Scott Norberg 205 $a1st ed. 2020. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2020. 215 $a1 online resource (XX, 405 p. 30 illus.) 311 08$a1-4842-6016-3 311 08$a1-4842-6013-9 327 $aChapter 1: Introducing ASP.NET Core -- Chapter 2: General Security Concepts -- Chapter 3: Cryptography -- Chapter 4: Web Security Concepts -- Chapter 5: Understanding Common Attacks -- Chapter 6: Processing User Input -- Chapter 7: Authentication and Authorization -- Chapter 8: Data Access and Storage. - Chapter 9: Logging and Error Handling -- Chapter 10: Setup and Configuration -- Chapter 11: Secure Application Life Cycle Management. 330 $aIncorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and delves into security topics rarely covered elsewhere. Get ready to dive deep into ASP.NET Core 3.1 source code, clarifying how particular features work and addressing how to fix problems. For straightforward use cases, the ASP.NET Core framework does a good job in preventing certain types of attacks from happening. But for some types of attacks, or situations that are not straightforward, there is very little guidance available on how to safely implement solutions. And worse, there is a lot of bad advice online on how to implement functionality, be it encrypting unsafely hard-coded parameters that need to be generated at runtime, or articles which advocate for certain solutions that are vulnerable to obvious injection attacks. Even more concerning is the functions in ASP.NET Core that arenot as secure as they should be by default. Advanced ASP.NET Core 3 Security is designed to train developers to avoid these problems. Unlike the vast majority of security books that are targeted to network administrators, system administrators, or managers, this book is targeted specifically to ASP.NET developers. Author Scott Norberg begins by teaching developers how ASP.NET Core works behind the scenes by going directly into the framework's source code. Then he talks about how various attacks are performed using the very tools that penetration testers would use to hack into an application. He shows developers how to prevent these attacks. Finally, he covers the concepts developers need to know to do some testing on their own, without the help of a security professional. What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the framework Dig into ASP.NET Core 3.1 sourcecode to understand how the security services work Establish a baseline for understanding how to design more secure software Properly apply cryptography in software development Take a deep dive into web security concepts Validate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET Core Fix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needs Incorporate security into your software development process This book is for software developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. A basic understanding of web technologies such as HTML, JavaScript, and CSS is assumed, as is knowledge of how to create a website, and how to read and write C#. You do not need knowledge of security concepts, even those that are often covered in ASP.NET Core documentation. Scott Norberg is a web security specialist currently based in the Seattle, Washington area. He has almost 15 years of experience successfully delivering software products in a wide range of roles. As a security consultant, he has experience with many testing tools and techniques, including Dynamic (DAST) and Static (SAST) testing, as well as manual testing and reviewing source code. Along with the many websites he has designed and built with various versions of ASP.NET, he has performed security assessments for many more. While his language of choice is C#, he has also built websites, components, and other tools in F#, VB.NET, Python, R, Java, and Pascal. He holds several certifications, including Microsoft Certified Technology Specialist (MCTS), certifications for ASP.NET and SQL Server, and a Certified Information Systems Security Professional (CISSP) certification. He also has an MBA from Indiana University. 606 $aMicrosoft software 606 $aMicrosoft .NET Framework 606 $aData protection 606 $aMicrosoft 606 $aData and Information Security 615 0$aMicrosoft software. 615 0$aMicrosoft .NET Framework. 615 0$aData protection. 615 14$aMicrosoft. 615 24$aData and Information Security. 676 $a005.8 700 $aNorberg$b Scott$01058755 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910427050303321 996 $aAdvanced ASP.NET Core 3 Security$93564061 997 $aUNINA