Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server

Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server

    • US$4.99
    • US$4.99

출판사 설명

Booklet for developers and security professionals on how to implement SSL in order to protect data transmission between .NET client and server. The guide contains examples of the client application code and certificate validations in C#.

Topics include: what is SSL certificate and how to use it to secure .NET Web Services, how to create server and client test certificates, implementing SSL in server and client applications, extra validations of server certificate on client side, and more (Article: ~3,300 words).

Table of Contents includes:
Introduction
Vulnerabilities Due To Insecure Communication
Difference between SSL and TLS
Securing Data Transmission with SSL
Different Levels of Security Provided by SSL
SSL Implementation Modes
Server Certificate Only
Server and Client Certificates
SSL Certificates
Certificate Issuing Methods
Self-Signed Certificate
Certificate Issued Using Self-Signed Root Certificate
Certificate Issued through Local Certificate Authority
Certificate Issued through Public Certificate Authority
Test Certificates
Server Test Certificates
Creating Test Certificate Authority
Creating Server Test Certificate for Specific Server Host Name
Creating Server Test Certificate for localhost
Creating Standalone Self-Signed Test Server Certificate (without CA Root)
Obtaining Test Server Certificate from Public Certificate Authority
Going to Production
Client Test Certificate
Creating Client Test Certificate using Root CA Certificate
Implementing SSL on Server
Web Server Configuration
Server Application Configuration
Server Application Code Changes
Implementing SSL on Client
Client Application Configuration
Client Application Code Changes
Additional Server Certificate Validations Performed by Client
Testing
Conclusion
Resources
About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

장르
컴퓨터 및 인터넷
출시일
2012년
4월 19일
언어
EN
영어
길이
15
페이지
출판사
Slava Gomzin
판매자
Draft2Digital, LLC
크기
506.5
KB
Pro Active Directory Certificate Services Pro Active Directory Certificate Services
2022년
Windows Server 2003 Security Infrastructures (Enhanced Edition) Windows Server 2003 Security Infrastructures (Enhanced Edition)
2004년
Demystifying Cryptography with OpenSSL 3.0 Demystifying Cryptography with OpenSSL 3.0
2022년
Practical Cisco Unified Communications Security Practical Cisco Unified Communications Security
2020년
Dr Tom Shinder's ISA Server and Beyond (Enhanced Edition) Dr Tom Shinder's ISA Server and Beyond (Enhanced Edition)
2002년
How to Cheat at Designing Security for a Windows Server 2003 Network (Enhanced Edition) How to Cheat at Designing Security for a Windows Server 2003 Network (Enhanced Edition)
2005년
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012년
Hacking Point of Sale Hacking Point of Sale
2014년
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012년
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016년
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012년
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012년