Book Image

Mastering LOB Development for Silverlight 5: A Case Study in Action

Book Image

Mastering LOB Development for Silverlight 5: A Case Study in Action

Overview of this book

Microsoft Silverlight is fully established as a powerful tool for creating and delivering Rich Internet Applications and media experiences on the Web. This book will help you dive straight into utilizing Silverlight 5, which now more than ever is a top choice in the Enterprise for building Business Applications. "Mastering LOB Development for Silverlight 5: A Case Study in Action" focuses on the development of a complete Silverlight 5 LOB application, helping you to take advantage of the powerful features available along with expert advice. Fully focused on LOB development, this expert guide takes you from the beginning of designing and implementing a Silverlight 5 LOB application, all the way through to completion. Accompanied by a gradually built upon case study, you will learn about data access via RIA and Web services, architecture with MEF and MVVM applied to LOB development, testing and error control, and much more.With "Mastering LOB Development for Silverlight 5: A Case Study in Action" in hand, you will be fully equipped to expertly develop your own Silverlight Line of Business application, without dwelling on the basics of Enterprise Silverlight development.
Table of Contents (19 chapters)
Mastering LOB Development for Silverlight 5: A Case Study in Action
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Client-side security


In this case, let's suppose that our web application will be downloaded and executed in a remote machine, something that can be considered as a hostile environment. We have just provided an alleged malicious user with a perfect laboratory with which he/she can try to manipulate our application since:

  • He/she will be able to see the binary code and resources (for example, binary XAML) by simply renaming the XAP file to ZIP

  • It will be possible for him/her to access its source code by using a tool, such as a reflector (http://bit.ly/apbHRB)

  • The original libraries could be replaced in the XAP content by others with he same interface, but containing malware

  • It is also feasible to extract any critical data in the client code or configuration files

It cannot be forgotten that these issues are also found in different development technologies, such as HTML and JavaScript (where the code is directly exposed) or in a desktop application.

Consequently, our server must never trust the...