|
early detection of attacks, Early Detection
elevation of privilege attacks, Table 14-1: STRIDE Threat Categories
employee management system sample, Practice Files
Employee Management System sample application, Appendix A: Guide to the Code Samples, Employee Management System
clsEmployee class, Employee Management System
database for, Appendix A: Guide to the Code Samples, Employee Database Structure, Migrating the Employee Database to SQL Server 2000
frmAddNew, Employee Management System
frmDashboard, Employee Management System
frmManage, Employee Management System
frmMyInfo, Employee Management System
frmRemoveUser, Employee Management System
valid usernames for, Employee Management System, Table A-1: List of Valid Usernames
Employee Management Web sample application, Employee Management Web
EmployeeDatabase.mdb, Practice Files, Appendix A: Guide to the Code Samples, Employee Database Structure, Migrating the Employee Database to SQL Server 2000
encryption
baseball example, Chapter 1: Encryption
brute force attacks, Keeping Private Keys Safe
defined, Chapter 1: Encryption
export restrictions on, Export Restrictions on Encryption
file integrity, verifying, Encryption in the Real World
folders, of, Format Disk Drives Using NTFS
goals of, Chapter 1: Encryption
insecure transport, as solution for, Encryption in the Real World
Internet transmissions using, Encryption in the Real World
key-based. , see private key encryption
private key. , see private key encryption
public key. , see public key encryption
purposes of, Encryption in the Real World
encryption demo
location of, Appendix A: Guide to the Code Samples
purpose of, Encryption Demo
encrytion
SSL. , see ssl (secure sockets layer)
Environment keyword, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)
environment variable permissions, Table 3-2: Permissions for Each Zone, Table 3-4: Permissions for Local Intranet and Trusted Sites Zones
error messages
flawed, Exception Handling
ErrorProvider class, Validation Tools Available to Windows Forms Applications
errors., see exceptions
Ethereal, Chapter 5: Securing Web Applications
event log permission, Table 3-2: Permissions for Each Zone, Table 3-4: Permissions for Local Intranet and Trusted Sites Zones
events
viewing logs of, Viewing the Event Log Remotely
evidence, code-access, How Actions Are Considered Safe or Unsafe, Security Zones and Trust Levels
exception handlers
detecting attacks with, Detecting That an Attack Has Taken Place or Is in Progress
exceptions, Chapter 8: Handling Exceptions
adding handlers, Exception Handling, Global Exception Handlers
bubbling up of, Global Exception Handlers
causes of, Where Exceptions Occur
COM interop– based , Global Exception Handlers
crashes as causes of, Where Exceptions Occur
database-generated, Exception Handling
encryption, logging, Logging Exceptions
error messages reporting, Exception Handling
file related, Where Exceptions Occur
Finally clauses, Try…Catch or On Error GoTo
global exception handlers, Global Exception Handlers
handling, rules for, Exception Handling
handling. , see handling exceptions
help for users, Exception Handling
input related, Where Exceptions Occur
logging, Exception Handling, Viewing the Event Log Remotely
multiuser conflicts, Where Exceptions Occur
network errors causing, Where Exceptions Occur
On ErrorGoTo statements, Try…Catch or On Error GoTo, Exception Handling
purpose of, Chapter 8: Handling Exceptions
real-world considerations, Exception Handling in the Real World
resources, lack of causing, Where Exceptions Occur
sample application with, Exception Handling
security issues arising from, Where Exceptions Occur
stress causing, Where Exceptions Occur
Try...Catch blocks, Try…Catch or On Error GoTo, Exception Handling
Execute keyword, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)
existing software design challenge, Design Challenges
exploits
defined, Is It a Bug, or an Attack from a Criminal Mastermind?
export restrictions on encryption, Export Restrictions on Encryption
extensibility, dangers of, Plan of Attack—The Test Plan
|