Search - Articles
DevASP.NET for ASP.NET, VB.NET, XML and C# (C-Sharp) Developers Tuesday, March 03, 2009
Dev Articles
Search Directory
ASP.NET
VB.Net
C-Sharp
SQL Server
 


Home >Search > Support WebCasts > ASP.NET > Security


Search:
What's New - What's Hot
TechNet Webcast: Implementing Application Security (Level 300)     
Total Hits: 411  |  Today: 0Author: Microsoft      Rating:  
Read Reviews | Write Review |  Your Rating: 

Tune into this webcast for an overview of how to help protect your applications from security threats. Learn about the defense-in-depth approach to security and why application security matters. Find out what dependencies affect application security and the best practices for securing your application server....

Support WebCast: Microsoft ASP.NET Security     
Total Hits: 185  |  Today: 0Author: Microsoft      Rating:  
Read Reviews | Write Review |  Your Rating: 

In this session, we will talk about Microsoft ASP.NET security and how it works with IIS security. We will also talk about Authentication (Forms, Windows, Passport, Default), Authorization (URL and file based), Impersonation, and different ways of implementing them. We will discuss how to implement role-based security....

MSDN Webcast: Advances in Threat Modeling (Level 300)     
Total Hits: 289  |  Today: 0Author: Michael Howard      Rating:  
Read Reviews | Write Review |  Your Rating: 

Over the past two years, Microsoft has learned a great deal about how to make threat modeling more useful to non-security engineers. Tune in as we cover some of those advances, including better data flow analysis, better threat identification, attack surface analysis and reduction and finer grained analysis. The motto for threat modeling is now, "Do DFD, turn crank." Come see what we mean and understand how you can identify your threats to build more secure systems. This session was one of the t...

Mind Those Passwords!     
Total Hits: 348  |  Today: 0Author: Keith Brown      Rating:  
Read Reviews | Write Review |  Your Rating: 

Passwords are necessary evils. The way most password-based authentication works these days, the length and complexity of your password is directly related to how difficult it would be for an attacker to impersonate you. For example, if you choose "password" as your password, an attacker will usually guess this on his second try (his first try would probably be an empty string). Even if you were to use a six-character randomly generated password like 2=w\Z9, the entropy would be less than 40 bits...

TechNet Webcast: Secure Collaboration with Antigen (Level 200)     
Total Hits: 373  |  Today: 0Author: Microsoft      Rating:  
Read Reviews | Write Review |  Your Rating: 

Find out how you can help protect your messaging and collaboration servers from viruses, worms, spam, and inappropriate content with Antigen. This webcast explains what Antigen is and describes how it is tightly integrated with Microsoft Exchange Server, SharePoint Products and Technologies, and Live Communications Server to help ensure strong protection and centralized control without taxing server or network infrastructure performance. Learn how the content and file filtering technologies in A...

TechNet Webcast: Safe and Legal: Common Legal and Regulatory Requirements in the Security Space     
Total Hits: 347  |  Today: 0Author: Microsoft      Rating:  
Read Reviews | Write Review |  Your Rating: 

Many laws and regulations in the United States and around the world require the implementation of many security elements, such as audit logging, sign-on and access controls, and robust accessibility of certain types of data within very short periods of time. In this webcast, Don McGowan, security attorney at Microsoft, explains the obligations created by regulatory legislation like the Sarbanes-Oxley Act, the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act...

TechNet Webcast: Protecting Privacy on the Microsoft Platform (Level 300)     
Total Hits: 260  |  Today: 0Author: Microsoft      Rating:  
Read Reviews | Write Review |  Your Rating: 

In the era of proliferating privacy regulations worldwide, encryption requirements are everywhere. However, "encryption" does not necessarily mean protection: If we hand over the keys to a robber, then he is going to enter our house despite the lock on the doors. In this webcast, we discuss various encryption approaches that organizations have proposed or implemented, and distinguish between those that merely satisfy a simple "checkmark" on a privacy auditor's list, and those that actually provi...

MSDN Webcast: Microsoft ASP.NET and Web Services Security     
Total Hits: 692  |  Today: 0Author: Alex Reich      Rating:  
Read Reviews | Write Review |  Your Rating: 

Helping to protect Web sites against unauthorized access is a critical, complex issue for Web developers. This webcast aims to answer your questions about security and Microsoft ASP.NET. Topics include Forms authentication; Windows authentication, and Microsoft Passport authentication. Learn how to use Microsoft Internet Information Services to authenticate the user in ASP.NET. The differences between Microsoft Windows 2003, Windows XP, and Windows 2000 in terms of how each operating system appr...

Support WebCast: Microsoft ASP.NET Security     
Total Hits: 873  |  Today: 0      Rating:  
Read Reviews | Write Review |  Your Rating: 

November 20, 2001

In this session, we will talk about Microsoft ASP.NET security and how it works with IIS security. We will also talk about Authentication (Forms, Windows, Passport, Default), Authorization (URL and file based), Impersonation, and different ways of implementing them. We will discuss how to implement role-based security....

TechNet Webcast: Enabling Secure Remote Access in Your Environment (Level 300)     
Total Hits: 324  |  Today: 0Author: Microsoft      Rating:  
Read Reviews | Write Review |  Your Rating: 

Enabling remote connections for business partners and employees extends your network's perimeter across the globe, often into networks that you know very little about. Because remote access to corporate networks is critical for many businesses, it is essential that you take the necessary steps to protect your own network and remote clients from threats. This webcast outlines the requirements for basic protection, including not only strong user authentication but also knowledge of the remote comp...



Disclaimer - Privacy
© 2002-2017 DevASP.net