P_Index

for RuBoard
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

P/Invoke methods   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
pages element   2nd   3rd   4th   5th   6th  
pascal case  
Passport  
passport authentication   2nd   3rd   4th  
PasswordDeriveBytes class   2nd   3rd  
PE File Format Validation   2nd   3rd   4th   5th   6th   7th  
PE Verify  
PE/COFF (Portable Executable/Common Object File Format)   2nd   3rd   4th  
PerformanceCounterPermission class  
permission sets   2nd   3rd   4th   5th   6th   7th   8th   9th  
       adding   2nd   3rd   4th   5th  
       adding with the Caspol tool   2nd   3rd   4th  
       administration   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  
       changing with the Caspol tool   2nd  
       copying   2nd  
       creating   2nd   3rd   4th  
       custom permission sets   2nd   3rd   4th  
       declarative security   2nd   3rd   4th  
       deleting   2nd   3rd   4th   5th   6th   7th  
       deleting with the Caspol tool   2nd   3rd   4th  
       duplicating   2nd  
       editing   2nd   3rd  
       imperative security   2nd   3rd   4th  
       moving   2nd  
       operations   2nd  
       renaming   2nd  
       states   2nd   3rd  
       uses  
       viewing   2nd   3rd  
permissions
       assembly-level permission requests   2nd  
       built-in permissions   2nd   3rd   4th   5th   6th   7th  
       CAS permissions   2nd  
       classes
               ReflectionPermissionAttribute class  
               SecurityPermission class   2nd  
       code access permissions   2nd  
       code groups   2nd   3rd  
       custom permissions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th   65th   66th   67th   68th   69th   70th   71st   72nd   73rd   74th   75th   76th   77th   78th   79th   80th   81st   82nd   83rd   84th   85th   86th   87th   88th   89th   90th   91st   92nd   93rd   94th   95th   96th  
       declarative and imperative security   2nd   3rd   4th   5th  
       declarative security   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd  
        execution-time permission enforcement   2nd   3rd   4th   5th  
       identity permissions   2nd   3rd   4th   5th   6th   7th  
       imperative security   2nd   3rd   4th   5th   6th   7th  
       interfaces  
       IPermission interface   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
       ISecurityEncodable interface   2nd   3rd   4th   5th  
       Isolated Storage   2nd   3rd   4th  
       IUnrestrictedPermission interface   2nd   3rd  
       non-CAS permissions   2nd  
       operations   2nd  
       permission demands   2nd  
       PrincipalPermission   2nd  
       security actions   2nd   3rd   4th   5th   6th   7th  
       security custom attributes   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       security policy   2nd   3rd   4th  
       semi-trusted applications   2nd   3rd   4th   5th   6th   7th   8th  
       standard permissions  
       states   2nd   3rd   4th  
       uses   2nd  
PermissionSet class  
PermitOnly security action  
PermView utility   2nd  
PEVerify  
PEVerify tool  
PKIs (public key infrastructures )  
platform invoke
       CryptoAPI 1.0 functions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th  
       CryptoAPI 2.0 functions  
Platform/Invoke methods   2nd   3rd   4th   5th   6th  
policies
       security policy
               policy levels  
               setting  
       Windows Software Restriction Policies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
policy assemblies   2nd   3rd   4th   5th   6th   7th   8th  
Policy Assemblies List   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
policy engine  
policy levels   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  
       code group hierarchy   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th  
       creating a new policy level   2nd  
       features   2nd   3rd   4th   5th   6th   7th   8th   9th  
       intersecting permissions  
       opening a policy level configuration file   2nd   3rd   4th  
       permission sets   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  
       policy assemblies   2nd   3rd   4th   5th   6th   7th   8th  
       undoing changes   2nd  
Policy Manager   2nd   3rd   4th   5th   6th   7th   8th  
policy resolution  
PolicyLevel class  
polymorphism  
Portable Executable/Common Object File Format (PE/COFF)   2nd   3rd   4th  
preventing all assembly of a software publisher from running across an enterprise   2nd  
preventing an assembly from running across an enterprise   2nd   3rd  
PrincipalPermission class  
printers
       access control   2nd   3rd  
PrintingPermission class  
private keys   2nd   3rd   4th  
privileges.   [See permissions]
PRNGs (pseudo-random number generators)   2nd   3rd   4th   5th   6th  
processModel element  
protected modules   2nd   3rd  
protecting resources   2nd   3rd   4th   5th   6th  
pseudo-random number generators (PRNGs)   2nd   3rd   4th   5th   6th  
public key algorithms  
public key encryption  
public key infrastructure (PKIs)  
public keys   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
public/private key pairs   2nd   3rd   4th  
PublisherIdentityPermission class  

for RuBoard


. NET Framework Security
.NET Framework Security
ISBN: 067232184X
EAN: 2147483647
Year: 2000
Pages: 235

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net