Book Image

Mastering LOB Development for Silverlight 5: A Case Study in Action

Book Image

Mastering LOB Development for Silverlight 5: A Case Study in Action

Overview of this book

Microsoft Silverlight is fully established as a powerful tool for creating and delivering Rich Internet Applications and media experiences on the Web. This book will help you dive straight into utilizing Silverlight 5, which now more than ever is a top choice in the Enterprise for building Business Applications. "Mastering LOB Development for Silverlight 5: A Case Study in Action" focuses on the development of a complete Silverlight 5 LOB application, helping you to take advantage of the powerful features available along with expert advice. Fully focused on LOB development, this expert guide takes you from the beginning of designing and implementing a Silverlight 5 LOB application, all the way through to completion. Accompanied by a gradually built upon case study, you will learn about data access via RIA and Web services, architecture with MEF and MVVM applied to LOB development, testing and error control, and much more.With "Mastering LOB Development for Silverlight 5: A Case Study in Action" in hand, you will be fully equipped to expertly develop your own Silverlight Line of Business application, without dwelling on the basics of Enterprise Silverlight development.
Table of Contents (19 chapters)
Mastering LOB Development for Silverlight 5: A Case Study in Action
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Server-side and communication security


In the previous section, we learned how to try and secure our application on the client side, and that it is nearly impossible to avoid any malicious attack or manipulation.

Now, we are going to learn how to add security on the server side, the last frontier a hacker has to face and the one where we have more control.

Validations

As we saw earlier, the server must not trust the validity of the information that comes from the client, as it can never be guaranteed that the data came from our application. These could come from a pretender, or even another application of ours, which shares the service. Therefore, it may have ignored all the validations implemented in our Silverlight application.

Due to this, the validations of the server must be repeated. To avoid heavy weather, the developer could feel tempted to omit client-side validations, which would not be incorrect nor may suppose a security risk. However, it is essential to recognize the value of these...