Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro ASP.NET Web API Security: Securing ASP.NET Web API

Buy

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility, securing your code effectively needs to be a top priority. You will quickly find that the WCF security protocols you’re familiar with from .NET are less suitable than they once were in this new environment, proving themselves cumbersome and limited in terms of the standards they can work with.

Fortunately, ASP.NET Web API provides a simple, robust security solution of its own that fits neatly within the ASP.NET MVC programming model and secures your code without the need for SOAP, meaning that there is no limit to the range of devices that it can work with – if it can understand HTTP, then it can be secured by Web API. These SOAP-less security techniques are the focus of this book.

What you’ll learn

  • Identity management and cryptography
  • HTTP basic and digest authentication and Windows authentication
  • HTTP advanced concepts such as web caching, ETag, and CORS
  • Ownership factors of API keys, client X.509 certificates, and SAML tokens
  • Simple Web Token (SWT) and signed and encrypted JSON Web Token (JWT)
  • OAuth 2.0 from the ground up using JWT as the bearer token
  • OAuth 2.0 authorization codes and implicit grants using DotNetOpenAuth
  • Two-factor authentication using Google Authenticator
  • OWASP Top Ten risks for 2013

Who this book is for

No prior experience of .NET security is needed to read this book. All security related concepts will be introduced from first-principles and developed to the point where you can use them confidently in a professional environment. A good working knowledge of and experience with C# and the .NET framework are the only prerequisites to benefit from this book.

Table of Contents

  1. Welcome to ASP.NET Web API
  2. Building RESTful Services
  3. Extensibility Points
  4. HTTP Anatomy and Security
  5. Identity Management
  6. Encryption and Signing
  7. Custom STS through WIF
  8. Knowledge Factors
  9. Ownership Factors
  10. Web Tokens
  11. OAuth 2.0 Using Live Connect API
  12. OAuth 2.0 From the Ground Up 
  13. OAuth 2.0 Using DotNetOpenAuth
  14. Two-Factor Authentication
  15. Security Vulnerabilities
  16. Appendix: ASP.NET Web API Security Distilled
(HTML tags aren't allowed.)

Neonatal Cranial Ultrasonography
Neonatal Cranial Ultrasonography

An exhaustive treatment of a phenomenon that causes family tragedy worldwide, this book fills a major gap in the current literature. Despite advances in neonatal care, neonatal cerebral injury remains a major cause of morbidity, mortality and disabilities. Cranial ultrasonography provides information on brain maturation in the (preterm)...

Prince 2, Second Edition: A Practical Handbook (Computer Weekly Professional)
Prince 2, Second Edition: A Practical Handbook (Computer Weekly Professional)
PRINCE 2 is a flexible project management method, suitable for use on any type of project. It has been derived from professional Project Managers' experiences and refined over years of use in a wide variety of contexts.

Assessed as conformant with the concepts of PRINCE Version 2 by the PRINCE User Group Ltd

Fully updated
...
MORE Electronic Gadgets for the Evil Genius: 40 NEW Build-it-Yourself Projects
MORE Electronic Gadgets for the Evil Genius: 40 NEW Build-it-Yourself Projects
This much anticipated follow-up to the wildly popular cultclassic Electronic Gadgets for the Evil Genius gives basement experimenters 40 all-new projects to tinker with. Following the tried-and-true Evil Genius Series format, each project includes a detailed list of materials, sources for parts, schematics, documentation, and lots of clear,...

Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
Metaheuristics: Progress in Complex Systems Optimization (Operations Research/Computer Science Interfaces Series)
Metaheuristics: Progress in Complex Systems Optimization (Operations Research/Computer Science Interfaces Series)
Metaheuristics has grown and continues to grow steadily. Seen both from the technical point of view and from the application-oriented side, these optimization tools have established their value in a remarkable story of success. Researchers have demonstrated the ability of these methods to solve hard combinatorial problems of practical sizes within...
Unity Virtual Reality Projects: Learn Virtual Reality by developing more than 10 engaging projects with Unity 2018, 2nd Edition
Unity Virtual Reality Projects: Learn Virtual Reality by developing more than 10 engaging projects with Unity 2018, 2nd Edition

Explore the latest features of Unity 2018 to create immersive VR projects for Oculus Rift, HTC Vive, Daydream and Gear VR

Key Features

  • A project-based guide to teach you how to develop immersive and fun VR applications using Unity 3D
  • Build experiences with interactable...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy