Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Encryption
Figure 1-1: Encrypting and decrypting a secret message
Figure 1-2: SHA-1 hash digests
Figure 1-3: Private key encryption
Figure 1-4: Public key encryption and decryption
Chapter 2: Role-Based Authorization
Figure 2-1: Employees and roles
Figure 2-2: Buttons are hidden based on roles
Figure 2-3: Jane’s permissions
Chapter 3: Code-Access Security
Figure 3-1: An attempt to perform an action must pass through several security checks
Figure 3-2: Standard symbols representing each zone
Figure 3-3: The Opening Mail Attachment warning dialog box
Chapter 4: ASP.NET Authentication
Figure 4-1: Forms authentication
Chapter 5: Securing Web Applications
Figure 5-1: 13 hops to Yahoo
Figure 5-2: Intercepting TCP/IP packets
Figure 5-3: Trusted certificate authorities in Internet Explorer
Chapter 6: Application Attacks and How to Avoid Them
Figure 6-1: The user name and password fields injected by the attacker’s user name
Chapter 7: Validating Input
Figure 7-1: The error displayed by the
RegularExpressionValidator
control
Chapter 8: Handling Exceptions
Figure 8-1: View the event log on a user’s computer
Chapter 9: Testing for Attack- Resistant Code
Figure 9-1: An attacker’s blueprint of your application
Figure 9-2: The sample test page to be viewed by WebTester
Figure 9-3: Five steps to get a hacker’s view of your Web page
Figure 9-4: A hacker’s view of your ASP.NET-generated Web page
Chapter 10: Securing Your Application for Deployment
Figure 10-1: Elements of an X.509 certificate.
Chapter 11: Locking Down Windows, Internet Information Services, and .NET
Figure 11-1: The Microsoft Baseline Security Analyzer
Figure 11-2: The IIS Lockdown tool
Chapter 12: Securing Databases
Figure 12-1: Results of three identifier methods
Figure 12-2: Adding a user to a database
Figure 12-3: Securing VBA code in a Microsoft Access database
Figure 12-4: Turn on auditing in SQL Server Enterprise Manager
Chapter 13: Ten Steps to Designing a Secure Enterprise System
Figure 13-1: Secure Web application architecture 1
Figure 13-2: Secure Web application architecture 2
Figure 13-3: Secure intranet Web architecture
Figure 13-4: Secure client-server architecture
Figure 13-5: What is the right decision?
Figure 13-6: Give the user a chance to back out
Chapter 15: Threat Analysis Exercise
Figure 15-1: Employee management system Web design diagram for user logon scenario
Chapter 16: Future Trends
Figure 16-1: Press the button to flood the town below
Appendix A: Guide to the Code Samples
Figure A-1: The
frmLogin
form
Figure A-2: The
frmDashboard
form
Figure A-3: The
frmMyInfo
form
Figure A-4: The
frmAddNew
form
Figure A-5: The
frmRemoveUser
form
Figure A-6: The
frmManage
form
Figure A-7: The default.aspx Web form
Figure A-8: The login.aspx Web form
Figure A-9: Voila! The page finally opens
Figure A-10: Editing a profile
Figure A-11: Encryption Demo
Figure A-12: Changing the Passport environment to pre-production
Figure A-13: EmployeeDatabase data model
Previous page
Table of content
Next page
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Project Size
Phase: Envision
Practice: Performance Requirements Cards
Explore Summary
A Hub Organizational Structure
Certified Ethical Hacker Exam Prep
Key Terms
Key Terms
System Hacking
Glossary
Software and Documentation
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Project Risk
Managing Project Risk
Appendix A Selected Detail From the PERIL Database
Managing Enterprise Systems with the Windows Script Host
Networking Resources
Application Automation
Network Administration/WMI
System Administration
Exchange Server
Microsoft VBScript Professional Projects
Data Collection, Notification, and Error Reporting
Project Case Study Desktop Customization and Deployment
Customizing the Desktop
Project Case Study Creating a Centralized Report Management Station
Building the Registration and Configuration Settings Page
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Connector Types and Uses
Planning a Structured Wiring Installation
Distributed Video Basics
Home Access Control Systems
Appendix B Home Technology Integration Glossary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies