[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
P/Invoke methods 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
pages element 2nd 3rd 4th 5th 6th
pascal case
Passport
passport authentication 2nd 3rd 4th
PasswordDeriveBytes class 2nd 3rd
PE File Format Validation 2nd 3rd 4th 5th 6th 7th
PE Verify
PE/COFF (Portable Executable/Common Object File Format) 2nd 3rd 4th
PerformanceCounterPermission class
permission sets 2nd 3rd 4th 5th 6th 7th 8th 9th
adding 2nd 3rd 4th 5th
adding with the Caspol tool 2nd 3rd 4th
administration 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
changing with the Caspol tool 2nd
copying 2nd
creating 2nd 3rd 4th
custom permission sets 2nd 3rd 4th
declarative security 2nd 3rd 4th
deleting 2nd 3rd 4th 5th 6th 7th
deleting with the Caspol tool 2nd 3rd 4th
duplicating 2nd
editing 2nd 3rd
imperative security 2nd 3rd 4th
moving 2nd
operations 2nd
renaming 2nd
states 2nd 3rd
uses
viewing 2nd 3rd
permissions
assembly-level permission requests 2nd
built-in permissions 2nd 3rd 4th 5th 6th 7th
CAS permissions 2nd
classes
ReflectionPermissionAttribute class
SecurityPermission class 2nd
code access permissions 2nd
code groups 2nd 3rd
custom permissions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th
declarative and imperative security 2nd 3rd 4th 5th
declarative security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd
execution-time permission enforcement 2nd 3rd 4th 5th
identity permissions 2nd 3rd 4th 5th 6th 7th
imperative security 2nd 3rd 4th 5th 6th 7th
interfaces
IPermission interface 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
ISecurityEncodable interface 2nd 3rd 4th 5th
Isolated Storage 2nd 3rd 4th
IUnrestrictedPermission interface 2nd 3rd
non-CAS permissions 2nd
operations 2nd
permission demands 2nd
PrincipalPermission 2nd
security actions 2nd 3rd 4th 5th 6th 7th
security custom attributes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
security policy 2nd 3rd 4th
semi-trusted applications 2nd 3rd 4th 5th 6th 7th 8th
standard permissions
states 2nd 3rd 4th
uses 2nd
PermissionSet class
PermitOnly security action
PermView utility 2nd
PEVerify
PEVerify tool
PKIs (public key infrastructures )
platform invoke
CryptoAPI 1.0 functions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
CryptoAPI 2.0 functions
Platform/Invoke methods 2nd 3rd 4th 5th 6th
policies
security policy
policy levels
setting
Windows Software Restriction Policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
policy assemblies 2nd 3rd 4th 5th 6th 7th 8th
Policy Assemblies List 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
policy engine
policy levels 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
code group hierarchy 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th
creating a new policy level 2nd
features 2nd 3rd 4th 5th 6th 7th 8th 9th
intersecting permissions
opening a policy level configuration file 2nd 3rd 4th
permission sets 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
policy assemblies 2nd 3rd 4th 5th 6th 7th 8th
undoing changes 2nd
Policy Manager 2nd 3rd 4th 5th 6th 7th 8th
policy resolution
PolicyLevel class
polymorphism
Portable Executable/Common Object File Format (PE/COFF) 2nd 3rd 4th
preventing all assembly of a software publisher from running across an enterprise 2nd
preventing an assembly from running across an enterprise 2nd 3rd
PrincipalPermission class
printers
access control 2nd 3rd
PrintingPermission class
private keys 2nd 3rd 4th
privileges. [See permissions]
PRNGs (pseudo-random number generators) 2nd 3rd 4th 5th 6th
processModel element
protected modules 2nd 3rd
protecting resources 2nd 3rd 4th 5th 6th
pseudo-random number generators (PRNGs) 2nd 3rd 4th 5th 6th
public key algorithms
public key encryption
public key infrastructure (PKIs)
public keys 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
public/private key pairs 2nd 3rd 4th
PublisherIdentityPermission class