[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] C# syntax, converting to Visual Basic syntax call stack 2nd [See also stack walk] CanTransformMultipleBlocks property CAS (code-access security) application domains and ASP.NET and classes code-access permissions Code-Access Security Policy tool enforcing evidence extensions, assembly trust and isolated storage and .NET Framework Configuration tool overview permissions assembly scope attributes attribute class definitions creating custom dll creation enforcing security example custom class example custom class definition example custom class enumeration IPermission interface ISecurityEncodable interface IUnrestrictedPermission interface overview Permissions View tool security policy statements imperative security overview turning on/off user policy level Windows security and case sensitivity, C# Caspol.exe 2nd CAS, turning on/off execution permission checks, turning on/off forcing securing changes isolated storage security policy evaluation policy level administration code groups fully trusted assemblies named permission sets target code group resetting policies catalogue (COM+), viewing CBC (Cipher Block Chaning) cipher mode Certificate Creation tool certificates publisher X509, creating CFB (Cipher Feedback) cipher mode Check method IMembershipCondition interface CheckExecutionRights property child code groups (security policies) Children property, CodeGroup objects Cipher Block Chaining (CBC) cipher mode Cipher Feedback (CFB) cipher mode cipher functions 2nd [See also algorithms] block padding CFB (Cipher Feedback) cipher block chaining ECB XTEA cipher modes CFB (Cipher Feedback) Cipher Block Chaining (CBC) ECB (Electronic Codebook) symmetric algorithms, configuring ciphertext class hierarchies (quick-reference) class libraries, trust levels classes AsymmetricAlgorithm AsymmetricExchangeDeformatter AsymmetricExchangeFormatter AsymmetricSignatureDeformatter AsymmetricSignatureFormatter attribute, defining AuthorMembershipCondition example C#/Visual Basic syntax code-access permission custom membership condition defining ElGamalOAEKeyExchangeFormatter ElGamalOAEPKeyExchangeDeformatter ElGamalPKCS1SignatureFormatter ElGamalSignature Evidence evidence implementation standard evidence classes Hash class identity permission IMembershipCondition interface and namespace quick reference and .NET Framework, COM+ and permission attribute permission statements permissions, programming considerations RandomNumberGenerator SecurityElement signature formatter classes, digital signatures SignedXML Site class StrongName Url XMLDSIG Zone classesPublisher client certificate authentication, IIS CloseDefect method CLR (Common Language Runtime) application domains 2nd configuration evidence identity security policy and application execution and ASP.NET applications runtime evidence application domains assemblies identities, application domains Internet Explorer and non-type-safe code operating system, shell command execution security policy, application domains and type-safe code verification, application deployment and Code Access Security Policy tool code groups attributes, policy resolution Caspol.exe and Code-Access Security Policy tool and creating 2nd 3rd creating manually importing, from file selects membership conditions, programming named permission sets and policy levels policy statements, programming code-access security [See CAS] Code-Access Security Policy tool 2nd code-access security, turning on/off execution permission checks, turning on/off forcing security changes 2nd policy level administration code groups fully trusted assemblies named permission sets target code group resetting policies CodeAccessPermission class interfaces methods removing stack walk overrides CodeAccessSecurityAttribute class CodeGroup class methods and properties COM+ application management application roles, populating application types specifying applications, installing attributes ApplicationAccessControl ComponentAccessControl SecureMethod SecurityRole catalogue, viewing component management configuration Maeshaller role PAS (process-access security) authentication impersonation RBS (role-based security) compatibility with .NET role-based security roles, scope serviced components, creating command line, Code-Access Security Policy tool compiling assemblies creating GAC and 2nd decompiling assemblies protecting against Component Services explorer (COM+) ComponentAccessControl attribute (COM+) ComputeHash method streamed data ComputeSignature method confidentiality cryptography symmetric encryption configuration application domains ASP.NET files <location\\> element logon page security-related configuration elements COM+ forms authentication IIS authentication modes security policy 2nd SecurityPermissionAttribute class, properties shared assemblies and symmetric algorithms cipher modes Key and IV properties KeySize and BlockSize properties WindowsPrincipal class configured classes (COM+) ControlDomainPolicy permission ControlEvidence permission System.Security.SecurityException ControlPolicy permission Copy method IPermission interface cracker (roles) Create method hashing algorithms SymmetricAlgorithm class CreateDecryptor method CreateDirectory method CreateEncryptor method 2nd CreateEventSource method, registering event sources CreateFromUrl factory method CreateKeyExchange method CreateKeyPair method CreateNewDefect method CreatePermission method CreateSignature method credentials, RBS and cryptanalysis Crypto API (Windows) cryptographic hash code cryptographic key pairs cryptographic keys complexity CreateKeyExchange method creating algorithm classes and key-derivation protocol random number generator and ElGamal encryption functions ElGamalOAEPKeyExchangeFormatter class key exchanges, encryption overview persistence session keys encryption symmetric algorithms symmetric key exchange Cryptographic Service Provider (CSP) cryptography 2nd attacks on, types of authentication birthday attacks brute force attacks confidentiality hash functions hashing algorithms creating hash code lengths message size limits integrity key management message collisions software weaknesses Cryptography.DSA class CreateSignature method VerifySignature method CryptoStream class XTEA (Extended Tiny Encryption Algorithm) CSP (Cryptographic Service Provider) CurrentPrincipal property, IPrincipal interface custom event logs, creating custom evidence Author assembly constructors creating identity permissions immutability Object.ToString method serializing uses custom runtime hosts |