View Complete Post
Here the author answers questions regarding the Entity Framework and provides an understanding of how and why it was developed.
MSDN Magazine July 2008
I have a data modeling question that hopefully this fictious example will help explain. My application is data driven and the classes reflect the tables to a large degree. In this example my database has two tables:
The VendorContact table also has a Foreign Key of VendorID in order to associate the contact with a specific Vendor. In this example a Vendor can only have one contact.
My question is how to represent these two tables in terms of classes. In my current design I have two classes:
In order to represent the relationship between a VendorMaster and VendorContact, my VendorMaster class contains a property called VendorContact.
My questions are about the VendorContact class and how it represents the relationship between a VendorMaster and itself.
The VendorContact class should contain an int property of VendorID
The VendorContact class should contain a VendorMaster Property
I am not sure which option is the 'best' option to take. My concern is that if I go with option #2 that I would create a cyclical relationship between the VendorMaster and Vendo
This article explores the use of threat modeling to address security concerns in your applications.
MSDN Magazine September 2009
Listen in on a chat between a developer and security pro that delves into some of the major Security Development Lifecycle (SDL) requirements we impose on product teams here at Microsoft
MSDN Magazine May 2009
The Security Development Lifecycle (SDL) threat modeling tool helps you develop great threat models as a backbone of your security process. We'll show you how it works.
MSDN Magazine January 2009
In this column the author outlines some approaches to threat modeling that can be employed by development teams of any size.
Web Service Software Factory: Modeling Edition is a collection of resources for modeling and building Web services for Windows Communication Foundation and ASMX.
Gerardo de Geest and Gerben van Loon
MSDN Magazine Launch 2008
Whenever you build a new system you should consider how an inÃÂ¬truder might go about attacking it and then build in appropriate defenses at design time.
Shawn Hernan, Scott Lambert, Tomasz Ostwald, Adam Shostack
MSDN Magazine November 2006