Summary
In this chapter, you learned how take control of the .NET security with advanced techniques. You saw how to use stream-based encryption to protect stored data and the query string. In the next chapter, you’ll learn how to use powerful techniques to extend the ASP.NET security model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Editor information
Rights and permissions
Copyright information
© 2006 Laurence Moroney, Matthew MacDonald (Ed.), K. Scott Allen, James Avery, Russ Basiura, Mike Batongbacal, Marco Bellinaso, Matt Butler, Andreas Eide, Daniel Cazzulino, Michael Clark, Richard Conway, Robert Eisenberg, Brady Gaster, James Greenwood, Kevin Hoffman, Erik Johansson, Angelo Kastroulis, Dan Kent, Sitaraman Lakshminarayanan, Don Lee, Christopher Miller, Matt Milner, Jan Narkiewicz, Matt Odhner, Ryan O’Keefe, Andrew Reid, Matthew Reynolds, Enrico Sabbadin, Bill Sempf, Doug Seven, Srinivasa Sivkumar, Thiru Thangarathinam, Doug Thews
About this chapter
Cite this chapter
(2006). Cryptography. In: Moroney, L., MacDonald, M. (eds) Pro ASP.NET 2.0 in VB 2005. Apress. https://doi.org/10.1007/978-1-4302-0118-2_25
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0118-2_25
Publisher Name: Apress
Print ISBN: 978-1-59059-563-3
Online ISBN: 978-1-4302-0118-2
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)