Catálogo de publicaciones - libros
Pro ASP.NET 2.0 Website Programming
Damon Armstrong
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Software Engineering/Programming and Operating Systems
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2005 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-1-59059-546-6
ISBN electrónico
978-1-4302-0104-5
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2005
Información sobre derechos de publicación
© Apress 2005
Cobertura temática
Tabla de contenidos
Uploading Files
Damon Armstrong
From reports, spreadsheets, and documents to images, videos, and presentations, companies routinely depend on files for business. Inevitably, you’ll work on a project where uploading files is an important feature, and this chapter has prepared you for that encounter. You’ve learned the pros and cons of storing files in the file system versus a database. You implemented single-file and multiple-file upload pages. You also saw an example of how to serve files from a database. There are countless reasons that you may need to upload files in an application, but now you should be able to handle anything you come across.
Pp. 473-493
Security and Encryption
Damon Armstrong
Whether from external hackers trying to gain access to your data or a vengeful employee on the inside, your business data is under constant threat of theft or loss. Protecting your information is a constant battle, but with appropriately layered security, you can increase the changes of thwarting an attack. In this chapter, you learned a great deal about the ASP.NET security model, authentication, authorization, NTFS access permissions, and ways to protect information using one-way and two-way encryption.
Security, of course, does not end with the ability to configure accounts and implement encryption. You can also look into protecting your systems with firewalls, intrusion-detection systems, and appropriate user training to make sure people know the value of not giving out or writing down passwords. And never forget physical security, such as a lock on the sever room door. There’s no point in spending thousands of dollars of encryption and network configuration security when someone can hijack your server the old-fashioned way.
Pp. 495-555
Using HTTP Handlers: Request Processing, Image Generation, and Content Management
Damon Armstrong
It should be obvious at this point that HTTP Handlers can be used to accomplish a variety of different tasks. In this chapter alone, you have seen them used to ensure files download with the appropriate names, generate reports, create thumbnail images, and even implement a content-management system.
Keep HTTP Handlers in the back of your mind when you’re analyzing business issues because they can be very powerful solutions in certain situations. You may also want to look into HTTP Modules and Handler Factories if you want a more in-depth understanding of the HTTP Pipeline and how you can use it to your advantage.
Pp. 557-611