Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Encryption
Figure 1-1: Encrypting and decrypting a secret message
Figure 1-2: SHA-1 hash digests
Figure 1-3: Private key encryption
Figure 1-4: Public key encryption and decryption
Chapter 2: Role-Based Authorization
Figure 2-1: Employees and roles
Figure 2-2: Buttons are hidden based on roles
Figure 2-3: Jane’s permissions
Chapter 3: Code-Access Security
Figure 3-1: An attempt to perform an action must pass through several security checks
Figure 3-2: Standard symbols representing each zone
Figure 3-3: The Opening Mail Attachment warning dialog box
Chapter 4: ASP.NET Authentication
Figure 4-1: Forms authentication
Chapter 5: Securing Web Applications
Figure 5-1: 13 hops to Yahoo
Figure 5-2: Intercepting TCP/IP packets
Figure 5-3: Trusted certificate authorities in Internet Explorer
Chapter 6: Application Attacks and How to Avoid Them
Figure 6-1: The user name and password fields injected by the attacker’s user name
Chapter 7: Validating Input
Figure 7-1: The error displayed by the
RegularExpressionValidator
control
Chapter 8: Handling Exceptions
Figure 8-1: View the event log on a user’s computer
Chapter 9: Testing for Attack- Resistant Code
Figure 9-1: An attacker’s blueprint of your application
Figure 9-2: The sample test page to be viewed by WebTester
Figure 9-3: Five steps to get a hacker’s view of your Web page
Figure 9-4: A hacker’s view of your ASP.NET-generated Web page
Chapter 10: Securing Your Application for Deployment
Figure 10-1: Elements of an X.509 certificate.
Chapter 11: Locking Down Windows, Internet Information Services, and .NET
Figure 11-1: The Microsoft Baseline Security Analyzer
Figure 11-2: The IIS Lockdown tool
Chapter 12: Securing Databases
Figure 12-1: Results of three identifier methods
Figure 12-2: Adding a user to a database
Figure 12-3: Securing VBA code in a Microsoft Access database
Figure 12-4: Turn on auditing in SQL Server Enterprise Manager
Chapter 13: Ten Steps to Designing a Secure Enterprise System
Figure 13-1: Secure Web application architecture 1
Figure 13-2: Secure Web application architecture 2
Figure 13-3: Secure intranet Web architecture
Figure 13-4: Secure client-server architecture
Figure 13-5: What is the right decision?
Figure 13-6: Give the user a chance to back out
Chapter 15: Threat Analysis Exercise
Figure 15-1: Employee management system Web design diagram for user logon scenario
Chapter 16: Future Trends
Figure 16-1: Press the button to flood the town below
Appendix A: Guide to the Code Samples
Figure A-1: The
frmLogin
form
Figure A-2: The
frmDashboard
form
Figure A-3: The
frmMyInfo
form
Figure A-4: The
frmAddNew
form
Figure A-5: The
frmRemoveUser
form
Figure A-6: The
frmManage
form
Figure A-7: The default.aspx Web form
Figure A-8: The login.aspx Web form
Figure A-9: Voila! The page finally opens
Figure A-10: Editing a profile
Figure A-11: Encryption Demo
Figure A-12: Changing the Passport environment to pre-production
Figure A-13: EmployeeDatabase data model
Previous page
Table of content
Next page
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168
BUY ON AMAZON
Data Structures and Algorithms in Java
Summary
Projects
Sparse Arrays
Summary
D.1. Data Structures and Algorithms
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Remove a Character from a String
How to Attach a File to a Rich Text Object
Working with @DBLookup
Composite Application Development Tools
Endnotes
Programming Microsoft ASP.NET 3.5
ASP.NET Core Server Controls
Paging Through Data Sources
The HTTP Request Context
ASP.NET Security
Working with Web Services
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Introduction to SQL*Plus
Generating Reports with SQL*Plus
Master/Detail Reports
Using Substitution Variables
Advanced Scripting
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Add-Ins
Conclusion
Introduction
Properties Merged from OLEObject or OLEControl
Writing a COM Add-In Using Visual Studio
Python Programming for the Absolute Beginner, 3rd Edition
Menus
Building a Better Mouse Trap
Reversing Sequences
Regular Expression Matching
Using Python Classes in C
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies