Book Image

Mastering LOB Development for Silverlight 5: A Case Study in Action

Book Image

Mastering LOB Development for Silverlight 5: A Case Study in Action

Overview of this book

Microsoft Silverlight is fully established as a powerful tool for creating and delivering Rich Internet Applications and media experiences on the Web. This book will help you dive straight into utilizing Silverlight 5, which now more than ever is a top choice in the Enterprise for building Business Applications. "Mastering LOB Development for Silverlight 5: A Case Study in Action" focuses on the development of a complete Silverlight 5 LOB application, helping you to take advantage of the powerful features available along with expert advice. Fully focused on LOB development, this expert guide takes you from the beginning of designing and implementing a Silverlight 5 LOB application, all the way through to completion. Accompanied by a gradually built upon case study, you will learn about data access via RIA and Web services, architecture with MEF and MVVM applied to LOB development, testing and error control, and much more.With "Mastering LOB Development for Silverlight 5: A Case Study in Action" in hand, you will be fully equipped to expertly develop your own Silverlight Line of Business application, without dwelling on the basics of Enterprise Silverlight development.
Table of Contents (19 chapters)
Mastering LOB Development for Silverlight 5: A Case Study in Action
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 11. Security

Security is a crucial and complex aspect which can fill several books in itself. It must be considered from the very beginning of a project, as well as taken into account for all decisions to be made. Nevertheless, in our case, for the sake of didacticism, it has been postponed to the final chapter so that we have all the pieces in the jigsaw of which our application consists. Two application areas can be distinguished:

  • Client-side security: Applications run in a client machine, with all the derived risks of this practice. Basically, it exposes our code to its analysis and possible exploits.

  • Server-side and communication security: Our applications communicate with a backend located in the server to retrieve and store data. In this case, security must be added for the data not to be exposed to unauthorized users or operations.

Even though this is a comprehensive topic, in this chapter, we will try to cover the basics about what can affect a business application, both...