Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Enterprise Application Architecture with .NET Core

You're reading from   Enterprise Application Architecture with .NET Core An architectural journey into the Microsoft .NET open source platform

Arrow left icon
Product type Paperback
Published in Apr 2017
Publisher Packt
ISBN-13 9781786468888
Length 564 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (4):
Arrow left icon
Ganesan Senthilvel Ganesan Senthilvel
Author Profile Icon Ganesan Senthilvel
Ganesan Senthilvel
Adwait Ullal Adwait Ullal
Author Profile Icon Adwait Ullal
Adwait Ullal
Habib Qureshi Habib Qureshi
Author Profile Icon Habib Qureshi
Habib Qureshi
Ovais Mehboob Ahmed Khan Ovais Mehboob Ahmed Khan
Author Profile Icon Ovais Mehboob Ahmed Khan
Ovais Mehboob Ahmed Khan
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Enterprise Architecture Concepts FREE CHAPTER 2. Principles and Patterns 3. Distributed Computing 4. Software Development Life Cycle 5. Enterprise Practices in Software Development 6. Layered Approach to Solution Architecture 7. SOA Implementation with .NET Core 8. Cloud-Based Architecture and Integration with .NET Core 9. Microservices Architecture 10. Security Practices with .NET Core 11. Modern AI Offerings by Microsoft

Security

In the computing industry, security is one of the most important principles in an enterprise application. As distributed computing is based on the cluster of the computers, it is highly recommended that you build a stronger security policy here.

Goals

In general, computer security has four goals:

  • Privacy
  • Secrecy
  • Authenticity
  • Integrity

Privacy is considered the information to be used only for the intended purpose, not beyond that. Let's look at a simple example. In the financial industry, there is a term called PII (Personally Identifiable Information). It can be used on its own or with its supplementary information to identify the individual in context. As per the US privacy law and information security, it is mandatory to protect this type of data...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime