Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server

Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server

    • $4.99
    • $4.99

Publisher Description

Booklet for developers and security professionals on how to implement SSL in order to protect data transmission between .NET client and server. The guide contains examples of the client application code and certificate validations in C#.

Topics include: what is SSL certificate and how to use it to secure .NET Web Services, how to create server and client test certificates, implementing SSL in server and client applications, extra validations of server certificate on client side, and more (Article: ~3,300 words).

Table of Contents includes:
Introduction
Vulnerabilities Due To Insecure Communication
Difference between SSL and TLS
Securing Data Transmission with SSL
Different Levels of Security Provided by SSL
SSL Implementation Modes
Server Certificate Only
Server and Client Certificates
SSL Certificates
Certificate Issuing Methods
Self-Signed Certificate
Certificate Issued Using Self-Signed Root Certificate
Certificate Issued through Local Certificate Authority
Certificate Issued through Public Certificate Authority
Test Certificates
Server Test Certificates
Creating Test Certificate Authority
Creating Server Test Certificate for Specific Server Host Name
Creating Server Test Certificate for localhost
Creating Standalone Self-Signed Test Server Certificate (without CA Root)
Obtaining Test Server Certificate from Public Certificate Authority
Going to Production
Client Test Certificate
Creating Client Test Certificate using Root CA Certificate
Implementing SSL on Server
Web Server Configuration
Server Application Configuration
Server Application Code Changes
Implementing SSL on Client
Client Application Configuration
Client Application Code Changes
Additional Server Certificate Validations Performed by Client
Testing
Conclusion
Resources
About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

GENRE
Computers & Internet
RELEASED
2012
April 18
LANGUAGE
EN
English
LENGTH
16
Pages
PUBLISHER
Slava Gomzin
SELLER
Draft2Digital, LLC
SIZE
505.9
KB

More Books Like This

Pro Active Directory Certificate Services Pro Active Directory Certificate Services
2022
Windows Server 2003 Security Infrastructures (Enhanced Edition) Windows Server 2003 Security Infrastructures (Enhanced Edition)
2004
Demystifying Cryptography with OpenSSL 3.0 Demystifying Cryptography with OpenSSL 3.0
2022
Practical Cisco Unified Communications Security Practical Cisco Unified Communications Security
2020
SSL Remote Access VPNs (Network Security) SSL Remote Access VPNs (Network Security)
2008
Dr Tom Shinder's ISA Server and Beyond (Enhanced Edition) Dr Tom Shinder's ISA Server and Beyond (Enhanced Edition)
2002

More Books by Slava Gomzin

Hiding Web Traffic with SSH: How to Protect Your Internet Privacy Against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy Against Corporate Firewall or Insecure Wireless
2012
Hacking Point of Sale Hacking Point of Sale
2014
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012