Friday, December 16, 2011

Free eBook on Claims based Identity and Access Control

Starts with discussing basics of claims based identity and moves to advanced topics.

Following industry standards are discussed :

  • Security Assertion Markup Language (SAML)
  • Security Association Management Protocol (SAMP)
    and Internet Security Association
    and Key Management Protocol (ISAKMP)
  • WS-Federation
  • WS-Federation: Passive Requestor Profile
  • WS-Security
  • WS-SecureConversation
  • WS-Trust

Download the eBook

..Read more!

Thursday, December 15, 2011

What’s new in ASP.NET 4.0 ?

image

Here is a very useful whitepaper which covers what’s new in ASP.NET 4.0 and Visual Studio 2010 for Web Development.

http://www.asp.net/whitepapers/aspnet4

..Read more!

Thursday, July 14, 2011

On Demand training on latest web technologies

image

 

Programming with HTML5 and related technologies

http://www.microsoft.com/showcase/en/in/details/4f39070b-c435-4de5-9f50-0d2852c1dfbe

Visual Studio 2010 SP1 for Web Developers

http://www.microsoft.com/showcase/en/in/details/90b79e80-eae9-47c8-a4f4-a2431e62178d

ASP.NET MVC3 Development with Visual Studio 2010

http://www.microsoft.com/showcase/en/in/details/fd907f28-bcbd-4a00-871f-4be5965d3764

Code-First Development with Entity Framework

http://www.microsoft.com/showcase/en/in/details/966167f3-9da3-422b-ab7c-0ecedd3ae5f2

Web Sockets & Indexed DB

http://www.microsoft.com/showcase/en/in/details/83478b2d-e2c2-427d-8a05-7e795efa03f0

Building cross browser compatible websites

http://www.microsoft.com/showcase/en/in/details/0ed592c6-cf3b-495b-8e22-48f530f89f3b

..Read more!

Wednesday, July 13, 2011

Feedback on Visual Studio ALM or TFS

image

Now you can directly provide feedback on TFS to the team in terms of new features which you want to see in next version. You can also vote on existing new features requested.

Reach to this site for providing feedback

http://visualstudioalm.uservoice.com/forums/100197-visual-studio-alm

..Read more!

Whitepaper on exploit mitigation technologies

image

A new whitepaper has been recently published which discusses about various exploit mitigation technologies and how to use them. Release by Microsoft Security Engineering Center.

A must for every person on software development team. Covers following:

  • economics of exploitation – attacker’s return on investment
  • Tactics behind exploit mitigation technologies like enforcing variants, creating artificial diversity, leveraging knowledge deficits
  • exploit mitigation technologies like
    • Stack buffer overrun detection
    • Data execution prevention (DEP)
    • Address Space Layout Randomization (ASLR)
    • SAFESEH and Structured Exception Handler Overwrite Protection (SEHOP)
    • Heap metadata protection
    • Enhanced Mitigation Experience Toolkit (EMET)
  • For each technology it also mentions following:
    • Overview
    • How to use
    • Proof point
    • Performance consideration
    • Compatibility considerations
    • Availability on various OS/platforms including browser versions

Download the whitepaper from here http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=26788

..Read more!