What authorization methods do you use to secure your applications? Are you using a trusted subsystem model or the impersonation/delegation model? This webcast is the third of a three-part series about the importance of application
security and its best practices and guidelines. This part specifically addresses authorization in the context of secure application development. After an overview of the costs of inadequate security and the benefits of developing secure applications, we concentrate
on authorization as part of a larger security solution, examining trusted subsystem model authorization techniques and best practices.
Presenter: Ron Cundiff, Developer Community Champion, Microsoft Corporation
Ron Cundiff is the Developer Community Champion supporting the MidAmerica district. Ron has worked within the IT industry for nearly 10 years, most recently as a Developer Evangelist in the MidAmerica district
for Microsoft. Before joining Microsoft in December 2002, he worked for an ISV and was responsible for the design and implementation of a global online commodities exchange system. He has also held management and technical leadership positions with a Microsoft
Partner. His certifications include MCSD, MCSE, MCDBA, MCP+I+SB--and he's working on more. He lives with his wife Lisa in Memphis, TN, and has two children, Kayla and Ryan.
Register now to view this on-demand webcast, download a .wmv of the webcast, and download a copy of the presentation.
You will be directed to the on-demand webcast and also shortly receive a confirmation email with links to the downloads.
To Launch the PPT Presentation -
To Download the PPT file to your desktop –
To avoid possible problems, we suggest you temporarily disable pop-up blocker software before viewing the webcast.