Description: 《为Windows Vista编写安全的代码》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base.
Table of Contents
Writing Secure Code for Windows Vista
Foreword
Introduction
Chapter 1 - Code Quality
Chapter 2 - User Account Control, Tokens, and Integrity Levels
Chapter 3 - Buffer Overrun Defenses
Chapter 4 - Networking Defenses
Chapter 5 - Creating Secure and Resilient
Chapter 6 - Internet Explorer 7 Defenses
Chapter 7 - Cryptographic Enhancements
Chapter 8 - Authentication and Authorization
Chapter 9 - Miscellaneous Defenses and Security-Related Technologies
Index
List of Figures
List of Tables
List of Sidebars
Platform: |
Size: 3192939 |
Author:zhuymgis |
Hits:
Description: MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32 digit hexadecimal number. Platform: |
Size: 35531 |
Author:chu |
Hits:
Description: 《为Windows Vista编写安全的代码》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base.
Table of Contents
Writing Secure Code for Windows Vista
Foreword
Introduction
Chapter 1 - Code Quality
Chapter 2 - User Account Control, Tokens, and Integrity Levels
Chapter 3 - Buffer Overrun Defenses
Chapter 4 - Networking Defenses
Chapter 5 - Creating Secure and Resilient
Chapter 6 - Internet Explorer 7 Defenses
Chapter 7 - Cryptographic Enhancements
Chapter 8 - Authentication and Authorization
Chapter 9 - Miscellaneous Defenses and Security-Related Technologies
Index
List of Figures
List of Tables
List of Sidebars
Platform: |
Size: 3192832 |
Author: |
Hits:
Description: MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32 digit hexadecimal number. Platform: |
Size: 3929088 |
Author:chu |
Hits:
Description: 浅谈VB.NET的密码算法及其在信息安全中的应用
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程序的方法,其中包括对称加密、非对称加密和数字签名算法的编程.-On the VB.NET password algorithm and its application of information security Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity, introduced the latest Microsoft development tools, Visual Basic 2005 (referred to as VB.NET) with the cryptographic algorithm associated System.Security.Cryptography namespace (the SSC). For example illustrates the use of SSC-type provided by the preparation of information security procedures, including symmetric encryption, asymmetric encryption and digital signature algorithm programming. Platform: |
Size: 354304 |
Author:刘皓 |
Hits:
Description: Microsoft s .NET framework has robust support for encryption in the System.Security.Cryptography namespace. Everything you need to perform encryption is available in that class, but it s difficult to understand unless you have a firm grasp of cryptographic theory. Over the last four months, I ve struggled with the concepts and theory behind encrypting and decrypting data. I ve wrapped all my derived knowledge into a class I call Encryption. This class is heavily documented, string oriented, and most of all, simple! It s ideal for learning more about encryption.-Microsoft s. NET framework has robust support for encryption in the System.Security.Cryptography namespace. Everything you need to perform encryption is available in that class, but it s difficult to understand unless you have a firm grasp of cryptographic theory. Over the last four months, I ve struggled with the concepts and theory behind encrypting and decrypting data. I ve wrapped all my derived knowledge into a class I call Encryption. This class is heavily documented, string oriented, and most of all, simple! It s ideal for learning more about encryption. Platform: |
Size: 27648 |
Author:matt |
Hits:
Description: AES加密算法分析及其安全性研究,对于使用AES密码算法来研究网络、流媒体安全的程序员有帮助-AES encryption algorithm analysis and security research, for the use of AES cryptographic algorithm to study the network, security, streaming media programmers help Platform: |
Size: 281600 |
Author:xiaolin |
Hits:
Description: this the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.-this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here. Platform: |
Size: 480256 |
Author:mana |
Hits:
Description: A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certificate status information. PKI users select one or more certificate issuers as
trust anchors, and establish security services based on certificates that may be validated
using one of their trust anchors. Platform: |
Size: 81920 |
Author:Jacky |
Hits:
Description: The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic
aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects. Platform: |
Size: 148480 |
Author:Hassan Abdelaziz |
Hits:
Description: 微软CSP实现源码。
CSP:密码服务提供者。
微软的CryptoAPI是PKI推荐使用的加密 API。其功能是为应用程序开发者提供在Win32环境下使用加密、验证等安全服务时的标准加密接口。CryptoAPI处于应用程序和CSP(cryptographic service provider)之间 。
-Microsoft CSP achieve source. CSP: Cryptographic Service Provider. Microsoft' s CryptoAPI is recommended the use of PKI encryption API. Its function is to provide application development environment in Win32 the use of encryption, authentication and other security services interface standard encryption. CryptoAPI in applications, and CSP (cryptographic service provider) between. Platform: |
Size: 541696 |
Author:eboy |
Hits:
Description: After reading this book, you will be able to
Understand the classic Orange Book approach to security, and its limitations
Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris
Learn how networking, the Web, and wireless technologies affect security
Identify software security defects, from buffer overflows to development process flaws
Understand cryptographic primitives and their use in secure systems
Use best practice techniques for authenticating people and computer systems in diverse settings
Use validation, standards, and testing to enhance confidence in a system s security
Discover the security, privacy, and trust issues arising from desktop productivity tools
Understand digital rights management, watermarking, information hiding, and policy expression
Learn principles of human-computer interaction (HCI) design for improved security
Understand the potential of emerging work in hardware-based security and trusted computing
After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing-After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing Platform: |
Size: 5532672 |
Author:chen |
Hits:
Description: 数据加密算法---3DES的C实现,效率高,安全可靠,可移植性好,能满足一般的加密安全需求。---- 3DES data encryption algorithm in C to achieve high efficiency, safety and reliability, portability is good, can hardly meet the cryptographic security requirements. Platform: |
Size: 197632 |
Author:jinmy |
Hits:
Description: Reliable communication is mission critical to Emergency and Rescue operations.
MANET technology allowing communication where fixed infrastructure is not available
is very attractive for this setting. Emergency and Rescue operations may take place in
both hostile as well as benign environment. The communication system must handle
both situations. Security attacks can be launched towards any layer of the protocol
stack. What is new with wireless ad hoc networks is the network layer routing
information as a more probable target for security attacks. A reliable network service
cannot be provided without embracing routing information security. The primary
challenge is to decide which routing information can be trusted. The answer so far is
cryptographically signed routing messages. The possession of cryptographic keys serves
as proof of trustworthiness. A proper key management service is thus a critical factor
for the success of wireless ad hoc networks. Platform: |
Size: 70656 |
Author:Rishi |
Hits:
Description: Develop a communications security architecture incorporating cryptographic security mechanisms that efficiently support the provision of required integrity, authentication, and confidentiality security services within distributed networks of resource-limited sensors
Platform: |
Size: 100352 |
Author:islam |
Hits:
Description: StreamSec2.1工具是在Borland delphi开发环境下安全的加密收集相关组件和类。该产品包括模块化的SSL / TLS的,S / MIME和X.509的实现。- StreamSec Tools 2.1 is collection of cryptographic security related components, classes and routines for the Borland (R) Delphi (TM) development environment. The product includes modular clean room implementations of SSL/TLS, S/MIME and X.509. Platform: |
Size: 4258816 |
Author:ccvcd |
Hits:
Description: Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a
provably secure and blind biometric authentication protocol, which addresses the concerns of user抯 privacy, template protection, and trust issues.
Platform: |
Size: 1581056 |
Author:prabhu |
Hits: