Book Image

Enterprise Application Architecture with .NET Core

By : Ganesan Senthilvel, Adwait Ullal, Ovais Mehboob Ahmed Khan, Habib Qureshi
Book Image

Enterprise Application Architecture with .NET Core

By: Ganesan Senthilvel, Adwait Ullal, Ovais Mehboob Ahmed Khan, Habib Qureshi

Overview of this book

If you want to design and develop enterprise applications using .NET Core as the development framework and learn about industry-wide best practices and guidelines, then this book is for you. The book starts with a brief introduction to enterprise architecture, which will help you to understand what enterprise architecture is and what the key components are. It will then teach you about the types of patterns and the principles of software development, and explain the various aspects of distributed computing to keep your applications effective and scalable. These chapters act as a catalyst to start the practical implementation, and design and develop applications using different architectural approaches, such as layered architecture, service oriented architecture, microservices and cloud-specific solutions. Gradually, you will learn about the different approaches and models of the Security framework and explore various authentication models and authorization techniques, such as social media-based authentication and safe storage using app secrets. By the end of the book, you will get to know the concepts and usage of the emerging fields, such as DevOps, BigData, architectural practices, and Artificial Intelligence.
Table of Contents (12 chapters)

Security

In the computing industry, security is one of the most important principles in an enterprise application. As distributed computing is based on the cluster of the computers, it is highly recommended that you build a stronger security policy here.

Goals

In general, computer security has four goals:

  • Privacy
  • Secrecy
  • Authenticity
  • Integrity

Privacy is considered the information to be used only for the intended purpose, not beyond that. Let's look at a simple example. In the financial industry, there is a term called PII (Personally Identifiable Information). It can be used on its own or with its supplementary information to identify the individual in context. As per the US privacy law and information security, it is mandatory to protect this type of data...