Using client-proven methods, and over 15 years of programming experience, expert author Davis Chapman empowers developers to create powerful, secure applications. Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own applications using the Microsoft CryptoAPI, and the new security features of Windows 2000. Developers who have been confused by the high-end, academic style of other encryption books and cryptography theory will delight with Chapman's understandable style and hands-on methods. This book covers security topics developers want and need to know including File Encryption, Encrypted Communications, Working with Certificates, Digital Signatures, SChannel Communications (SSL), Secure E-Mail, and much more.
1. Understanding Encryption and Application Security.
Exploring Encryption. Using Certificates with Encryption. Digital Signatures. Message Enveloping. Secure Sockets Layer (SSL). Security and Audit Logs. Summary.
CryptoAPI and Cryptographic Service Providers. Listing CSPs and CSP Types. Summary.
Generating Hashes of Strings and Messages. Generating Symmetric Keys. Understanding Basic Encryption and Decryption. Building a Simple Encryption Application. Building a File Encryption/Decryption Utility. Summary.
Block Versus Stream Algorithms. Generating, Saving, and Retrieving Public/Private Keys. Exporting and Importing Keys. Building a Secure Messaging Utility. Summary.
Digital Certificates Explained. Acquiring Certificates. Building a Certificate Request Utility. Summary.
Managing Certificate Stores. Managing Certificates and Certificate Contexts. Getting Information from Certificates. Building a Certificate Maintenance Utility. Summary.
Verifying Certificates Against a CA. Building and Maintaining a Certificate Revocation List. Managing a Certificate Revocation List. Summary.
What Are Digital Signatures? Signing Messages and Verifying Signatures. Enveloping Messages. Building a Signing Utility. Summary.
RDS and HTTP. DCOM Tunneling Through TCP/IP. Building a DCOM-HTTPS Application. Summary.
Windows 2000 Security Overview. Fundamental Security Data Structures. Trustee-Based Access Control. Impersonating a Client. Summary.
Validating a Domain Login. Granting Account Permissions. Building a Login Validation Utility. Summary.
Active Directory and Security. Active Directory Object Schemas. Network Groups and Users. Examining Groups and Users. Summary.
Active Directory Object Security. Searching Active Directory. Examining Active Directory Objects. Summary.
What Is COM+? COM+ and Security. Building Security-Aware COM+ Components. Summary.
How Certificate Authorities Work. Generating a Root Certificate. Issuing, Managing, and Revoking Certificates. Summary.
C2 Security. DES and RSA. PGP and Kerberos. Smart Cards and Tokens. Emerging Technologies and Standards. Summary.
The Legal Implications of Digital Signatures: Is a Digital Signature a Legal Signature? Using Digital Certificates with Your Application. Encryption and Export Issues. Summary.