Chapter 9. Adding Security to Your Applications

In the days preceding the Internet, computing devices were islands of functionality with little interconnectivity. Nowadays, it is hard to tell whether a device is "on the network" even if all cables to it are unplugged. In order for the device to be useful, at least one software entity must be running—and then this device is a candidate for attack via the same channels and primitives that enable connectivity for that software entity.

When computing devices were invented, software functionality and features were the prime areas of consumer interest. Today, the same consumers seek trust in the feature-rich software that they use.

Management in application development houses has traditionally viewed ...

Get Designing Enterprise Applications with Microsoft® Visual Basic® .NET now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.