Home > Store

Developing Secure Applications with Visual Basic

Register your product to gain access to bonus material or receive a coupon.

Developing Secure Applications with Visual Basic


  • Your Price: $27.99
  • List Price: $34.99
  • We're temporarily out of stock, but order now and we'll send it to you later.


  • Copyright 2000
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 608
  • Edition: 1st
  • Book
  • ISBN-10: 0-672-31836-9
  • ISBN-13: 978-0-672-31836-8

Using client-proven methods, and over 15 years of programming experience, expert author Davis Chapman empowers developers to create powerful, secure applications. Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own applications using the Microsoft CryptoAPI, and the new security features of Windows 2000. Developers who have been confused by the high-end, academic style of other encryption books and cryptography theory will delight with Chapman's understandable style and hands-on methods. This book covers security topics developers want and need to know including File Encryption, Encrypted Communications, Working with Certificates, Digital Signatures, SChannel Communications (SSL), Secure E-Mail, and much more.



All the files used for the examples in the book - 256 KB --code.zip

Sample Content

Table of Contents


1. Understanding Encryption and Application Security.

Exploring Encryption. Using Certificates with Encryption. Digital Signatures. Message Enveloping. Secure Sockets Layer (SSL). Security and Audit Logs. Summary.

2. Getting Started with the CryptoAPI.

CryptoAPI and Cryptographic Service Providers. Listing CSPs and CSP Types. Summary.

3. Symmetric and Password Encryption.

Generating Hashes of Strings and Messages. Generating Symmetric Keys. Understanding Basic Encryption and Decryption. Building a Simple Encryption Application. Building a File Encryption/Decryption Utility. Summary.

4. Public/Private Key Communications.

Block Versus Stream Algorithms. Generating, Saving, and Retrieving Public/Private Keys. Exporting and Importing Keys. Building a Secure Messaging Utility. Summary.

5. Requesting and Retrieving Certificates.

Digital Certificates Explained. Acquiring Certificates. Building a Certificate Request Utility. Summary.

6. Working with Certificates.

Managing Certificate Stores. Managing Certificates and Certificate Contexts. Getting Information from Certificates. Building a Certificate Maintenance Utility. Summary.

7. Working with Certificate Revocation Lists.

Verifying Certificates Against a CA. Building and Maintaining a Certificate Revocation List. Managing a Certificate Revocation List. Summary.

8. Using Digital Signatures.

What Are Digital Signatures? Signing Messages and Verifying Signatures. Enveloping Messages. Building a Signing Utility. Summary.

9. DCOM Through SSL.

RDS and HTTP. DCOM Tunneling Through TCP/IP. Building a DCOM-HTTPS Application. Summary.

10. Understanding Windows 2000 Security and Security Descriptors.

Windows 2000 Security Overview. Fundamental Security Data Structures. Trustee-Based Access Control. Impersonating a Client. Summary.

11. Using NT Login Authentication.

Validating a Domain Login. Granting Account Permissions. Building a Login Validation Utility. Summary.

12. Working with Active Directory Security (ADSI) and an LDAP Server.

Active Directory and Security. Active Directory Object Schemas. Network Groups and Users. Examining Groups and Users. Summary.

13. Active Directory Security and Searching.

Active Directory Object Security. Searching Active Directory. Examining Active Directory Objects. Summary.

14. Developing with COM+ Security.

What Is COM+? COM+ and Security. Building Security-Aware COM+ Components. Summary.

15. Microsoft Certificate Server.

How Certificate Authorities Work. Generating a Root Certificate. Issuing, Managing, and Revoking Certificates. Summary.

16. Security Standards.

C2 Security. DES and RSA. PGP and Kerberos. Smart Cards and Tokens. Emerging Technologies and Standards. Summary.

17. Legal Issues of Digital Signatures and Encryption.

The Legal Implications of Digital Signatures: Is a Digital Signature a Legal Signature? Using Digital Certificates with Your Application. Encryption and Export Issues. Summary.

Appendix A. Cryptographic Service Providers.



Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership