Index_H


H

hackers

tools available to, What Happens Next?

handling exceptions, Exception Handling

database exceptions, Exception Handling

error reports to users, Exception Handling

global exceptions, Global Exception Handlers

help for users, Exception Handling

logging, Exception Handling, Viewing the Event Log Remotely

On ErrorGoTo, Try…Catch or On Error GoTo, Exception Handling

real world considerations, Exception Handling in the Real World

rules for, Exception Handling

sample application, Exception Handling

Try...Catch, Try…Catch or On Error GoTo, Exception Handling

hardware inventories, Detecting That an Attack Has Taken Place or Is in Progress

hash digests

algorithms for, How Does a Hash Digest Work?

collisions, How Does a Hash Digest Work?

defined, Hash Digests

function for, Hash Digests

function returning, Hash Digests

password protection with, Hash Digests

PublicKeyToken, Strong Names vs. Weak Names

storing, Hash Digests

strong-name signatures with, Strong-Name Signing

verifying passwords, Hash Digests

hash value security policy attribute, Table 10-4: Attributes Used to Grant Permissions

hashes

collisions, How Does a Hash Digest Work?

defined, Chapter 1: Encryption

digests, Hash Digests

display format for, Hash Digests

function returning digests, Hash Digests

SHA-1, Hash Digests

spoofing, Hash Digests

storing hash digests, Hash Digests

verifying passwords with, Hash Digests

hidden field vulnerability, Create Scenarios Based on Inroads for Attack, Example: Create a Test Tool for Testing Web Applications

hiding user input fields, Hiding Unnecessary Information

highly-trusted applications, How Actions Are Considered Safe or Unsafe

highly-untrusted applications, How Actions Are Considered Safe or Unsafe

hops, Chapter 5: Securing Web Applications

hotfixes, Step 10: Design for Maintenance

HTML script attacks., see cross-site scripting attacks

HtmlEncode method, Web Application Input

HTTP

verbs, limiting, Step 4: Design a Secure Architecture

HTTP headers, viewing, Table 9-3: Test Tools

https\

//, Secure Sockets Layer, How SSL Works

human factors in attack detection, Humans: The Key to Success

humans as a design challenge, Design Challenges




Security for Microsoft Visual Basic  .NET
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net