|
hackers
tools available to, What Happens Next?
handling exceptions, Exception Handling
database exceptions, Exception Handling
error reports to users, Exception Handling
global exceptions, Global Exception Handlers
help for users, Exception Handling
logging, Exception Handling, Viewing the Event Log Remotely
On ErrorGoTo, Try…Catch or On Error GoTo, Exception Handling
real world considerations, Exception Handling in the Real World
rules for, Exception Handling
sample application, Exception Handling
Try...Catch, Try…Catch or On Error GoTo, Exception Handling
hardware inventories, Detecting That an Attack Has Taken Place or Is in Progress
hash digests
algorithms for, How Does a Hash Digest Work?
collisions, How Does a Hash Digest Work?
defined, Hash Digests
function for, Hash Digests
function returning, Hash Digests
password protection with, Hash Digests
PublicKeyToken, Strong Names vs. Weak Names
storing, Hash Digests
strong-name signatures with, Strong-Name Signing
verifying passwords, Hash Digests
hash value security policy attribute, Table 10-4: Attributes Used to Grant Permissions
hashes
collisions, How Does a Hash Digest Work?
defined, Chapter 1: Encryption
digests, Hash Digests
display format for, Hash Digests
function returning digests, Hash Digests
SHA-1, Hash Digests
spoofing, Hash Digests
storing hash digests, Hash Digests
verifying passwords with, Hash Digests
hidden field vulnerability, Create Scenarios Based on Inroads for Attack, Example: Create a Test Tool for Testing Web Applications
hiding user input fields, Hiding Unnecessary Information
highly-trusted applications, How Actions Are Considered Safe or Unsafe
highly-untrusted applications, How Actions Are Considered Safe or Unsafe
hops, Chapter 5: Securing Web Applications
hotfixes, Step 10: Design for Maintenance
HTML script attacks., see cross-site scripting attacks
HtmlEncode method, Web Application Input
HTTP
verbs, limiting, Step 4: Design a Secure Architecture
HTTP headers, viewing, Table 9-3: Test Tools
https\
//, Secure Sockets Layer, How SSL Works
human factors in attack detection, Humans: The Key to Success
humans as a design challenge, Design Challenges
|