|
maintenance
application upgrades, Step 10: Design for Maintenance
designing for, Step 10: Design for Maintenance
hotfixes, Step 10: Design for Maintenance
off switch design, Step 10: Design for Maintenance
service packs, Step 10: Design for Maintenance
maintenance challenges, Design Challenges
maintenance, security, Fundamental Lockdown Principles
managed code, Microsoft Initiatives
manual testing, Table 9-2: General Testing Approaches, Ad Hoc, or Manual, Testing
MaxLength property of TextBox, Validation Tools Available to Windows Forms Applications
MBSA (Microsoft Baseline Security Analyzer), Automated Tools
auto logon detection, Disable Auto Logon
client services, detecting unnecessary, Turn Off Unnecessary Services
IIS sample site detection, Remove Samples
NTFS detection, Format Disk Drives Using NTFS
overview, Automated Tools, Figure 11-1: The Microsoft Baseline Security Analyzer
Medium Trust security level
effects of, Run Your Code in Different Security Zones
permissions with, Security Zones and Trust Levels
setting to, Cooperating with the Security System
memory starvation attacks, Table 6-1: Forms of DoS Attacks, Table 6-2: DoS Defensive Techniques, Defending Against Memory and Resource DoS Attacks
MessageQueuePermission, Table 3-3: Full Trust Permissions Granted to My Computer Zone
Microsoft Access
authentication, Microsoft Access Authentication and Authorization, Microsoft Access User-Level Security Models
authorization, Microsoft Access User-Level Security Models
database sample for exercises, Practice Files
EmployeeDatabase.mdb, Appendix A: Guide to the Code Samples
Full Rights model, Microsoft Access User-Level Security Models
locking down, Locking Down Microsoft Access
None authentication option, Microsoft Access Authentication and Authorization
Owner-Admin model, Microsoft Access User-Level Security Models
password authentication, Microsoft Access Authentication and Authorization
permissions, Microsoft Access User-Level Security Models
service packs for, Locking Down Microsoft Access
setting up authentication, Microsoft Access User-Level Security Models
user-level security, Microsoft Access Authentication and Authorization, Microsoft Access User-Level Security Models
VBA code protection, Locking Down Microsoft Access
Windows NT file protection, Locking Down Microsoft Access
workgroup creation, Microsoft Access User-Level Security Models
Microsoft Application Center Test (ACT), Stress Testing, Table 9-3: Test Tools
Microsoft Group Policy, Deploy .NET Enterprise Security Policy Updates
Microsoft Internet Explorer., see internet explorer
Microsoft Security Baseline Analyzer., see mbsa (microsoft baseline security analyzer)
Microsoft security initiatives, Microsoft Initiatives
Microsoft SQL Server Profiler, Table 9-3: Test Tools
Microsoft Systems Management Server (SMS), Deploy .NET Enterprise Security Policy Updates
Microsoft Trustworthy Computing initiative, Testing in the Real World
Microsoft Visual Studio .NET Deployment Wizard, Windows Installer Deployment
mitigating threats, Prevent Attacks by Mitigating Threats, Table 14-2: Example of Common Attacks and Techniques to Mitigate Them
Mitnick, Kevin, Chapter 14: Threats—Analyze, Prevent, Detect, and Respond
Mixed Mode SQL Server authentication, SQL Server Authentication
MkDir keyword, Table 15-1: Visual Basic .NET Keywords to Look For_ (continued)
money limitations, Design Challenges
MSFTPSVC service, Turn Off Unnecessary Services
MSN Messenger
Passport authentication for, Passport Authentication
multiuser conflicts, Where Exceptions Occur
exceptions caused by, Where Exceptions Occur
My Computer zone
defined, Security Zones and Trust Levels
Full Trust permissions, Security Zones and Permissions, Table 3-3: Full Trust Permissions Granted to My Computer Zone
permissions, Security Zones and Permissions
sandbox, outside of, Deploy and Run Your Application in the .NET Security Sandbox, Table 10-2: Deployment Techniques and Use of the Sandbox
|