|
X.509 certificates
Authenticode signing, Authenticode Signing, Incorporate Authenticode Signing in Your Build Process
elements of, X.509 Certificate
obtaining, Obtain an X.509 Certificate from a Certificate Authority
purpose of, X.509 Certificate
sample application, Strong Naming, Certificates, and Signing Exercise
setup packages, Strong Naming, Certificates, and Signing Exercise
SignCode.exe, signing with, Strong Naming, Certificates, and Signing Exercise
Software Publisher Certificates, Strong Naming, Certificates, and Signing Exercise
test certificate creation, Strong Naming, Certificates, and Signing Exercise
timestamp services, Strong Naming, Certificates, and Signing Exercise
viewing, Strong Naming, Certificates, and Signing Exercise
XCopy deployment
overview, XCopy Deployment
sandbox with, Table 10-2: Deployment Techniques and Use of the Sandbox
when to use, Table 10-1: Deployment Techniques and When to Use Them_ (continued)
XML
GXA, Global XML Architecture
vulnerability from, Create Scenarios Based on Inroads for Attack
Xolox, Remove File-Sharing Software
xp_cmdshell command, SQL-Injection Attacks
xp_cmdshell stored procedure, Locking Down SQL Server
XSS attacks., see cross-site scripting attacks
|